Index of /publicDatasets/CTU-Malware-Capture-Botnet-241-1

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]7c919970a593c41ec104fa2fb7f0d12b.zip2017-03-25 16:36 238K 
[   ]2017-3-30_win9.biargus2017-03-30 21:27 3.9M 
[   ]2017-3-30_win9.binetflow2017-03-30 21:27 1.3M 
[   ]2017-3-30_win9.capinfos2017-03-30 21:27 1.1K 
[   ]2017-3-30_win9.dnstop2017-03-30 21:27 11K 
[TXT]2017-3-30_win9.html2017-03-30 21:30 5.9M 
[   ]2017-3-30_win9.json2017-03-30 21:30 12M 
[   ]2017-3-30_win9.mitm.weblog2017-03-30 21:27 2.6M 
[   ]2017-3-30_win9.passivedns2017-03-30 21:27 28K 
[   ]2017-3-30_win9.pcap2017-03-30 21:27 88M 
[   ]2017-3-30_win9.rrd2017-03-30 21:18 8.0M 
[   ]2017-3-30_win9.tcpdstat2017-03-30 21:27 1.7K 
[   ]2017-3-30_win9.uniargus2017-03-30 21:27 22M 
[   ]2017-3-30_win9.uninetflow2017-03-30 21:27 7.7M 
[   ]2017-3-30_win9.weblogng2017-03-30 21:27 32K 
[TXT]README.html2017-06-25 20:48 3.0K 
[TXT]README.md2017-06-25 20:48 2.3K 
[DIR]bro/2017-03-25 16:36 -  
[TXT]fast-flux-dga-first-analysis.txt2017-03-25 16:36 8.7K 
[   ]mitm.out2017-03-30 21:15 42M 

Description

Files

IP Addresses

- Infected host: 192.168.1.119
- Default GW: 192.168.1.2

Timeline

Tue Mar 7 18:48:15 CET 2017

started win9

Tue Mar 7 18:50:27 CET 2017

infected

Thu Mar 30 21:16:51 CEST 2017

power off