Index of /publicDatasets/CTU-Malware-Capture-Botnet-234-1

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]79c76007671fb99dd6a5aad02f563938.zip2017-03-25 20:27 7.7K 
[   ]2017-03-25_win13.biargus2017-03-25 20:27 33K 
[   ]2017-03-25_win13.binetflow2017-03-25 20:27 15K 
[   ]2017-03-25_win13.capinfos2017-03-25 20:27 1.1K 
[   ]2017-03-25_win13.dnstop2017-03-25 20:27 2.4K 
[TXT]2017-03-25_win13.html2017-03-25 20:31 370K 
[   ]2017-03-25_win13.json2017-03-25 20:31 17K 
[   ]2017-03-25_win13.mitm.weblog2017-03-25 20:27 2.5K 
[   ]2017-03-25_win13.passivedns2017-03-25 20:27 1.1K 
[   ]2017-03-25_win13.pcap2017-03-25 20:27 171K 
[   ]2017-03-25_win13.tcpdstat2017-03-25 20:27 1.5K 
[   ]2017-03-25_win13.uniargus2017-03-25 20:27 125K 
[   ]2017-03-25_win13.uninetflow2017-03-25 20:27 63K 
[   ]2017-03-25_win13.weblogng2017-03-25 20:27 3.7K 
[TXT]README.html2017-03-25 20:31 3.0K 
[TXT]README.md2017-03-25 20:36 2.3K 
[   ]Win13-test.rrd2017-03-25 20:28 8.0M 
[TXT]a.txt2018-03-02 11:13 5.5K 
[DIR]bro/2017-03-25 20:27 -  
[TXT]fast-flux-dga-first-analysis.txt2017-03-25 20:27 1.6K 
[   ]mitm.out2017-03-16 15:33 18K 

Description

Files

IP Addresses

- Infected host: 192.168.1.123
- Default GW: 192.168.1.2

Timeline

Thu Mar 16 15:23:00 CET 2017

started win13

Thu Mar 16 15:31:42 CET 2017

infected

Sat Mar 25 20:24:57 CET 2017

power off