Index of /publicDatasets/CTU-Malware-Capture-Botnet-247-1

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]0afaa4f4137b846e456e52f72faf9aa0.zip2017-04-17 20:54 228K 
[   ]2017-04-17_win14.biargus2017-04-17 20:53 55M 
[   ]2017-04-17_win14.binetflow2017-04-17 20:53 8.7M 
[   ]2017-04-17_win14.capinfos2017-04-17 20:53 1.1K 
[   ]2017-04-17_win14.dnstop2017-04-17 20:45 3.8K 
[TXT]2017-04-17_win14.html2017-04-17 20:56 425K 
[   ]2017-04-17_win14.json2017-04-17 20:56 154K 
[   ]2017-04-17_win14.passivedns2017-04-17 20:45 4.0K 
[   ]2017-04-17_win14.pcap2017-04-17 20:45 142M 
[   ]2017-04-17_win14.rrd2017-04-17 19:47 8.0M 
[   ]2017-04-17_win14.tcpdstat2017-04-17 20:53 1.7K 
[   ]2017-04-17_win14.uniargus2017-04-17 20:53 67M 
[   ]2017-04-17_win14.uninetflow2017-04-17 20:53 25M 
[   ]2017-04-17_win14.weblogng2017-04-17 20:53 709  
[TXT]README.html2017-06-25 20:32 3.0K 
[TXT]README.md2017-06-25 20:32 2.3K 
[DIR]bro/2017-04-17 20:53 -  
[TXT]fast-flux-dga-first-analysis.txt2017-04-17 20:54 3.9K 
[   ]mitm.out2017-04-17 19:35 25M 

Description

Files

IP Addresses

- Infected host: 192.168.1.124
- Default GW: 192.168.1.2

Timeline

Tue Mar 14 15:44:38 CET 2017

started win14

Tue Mar 14 15:47:54 CET 2017

infected

Mon Apr 17 19:47:17 CEST 2017

power off