Index of /publicDatasets/CTU-Malware-Capture-Botnet-260-1

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]0243c9bb903d6f89d7eeadae882cf591.zip2017-05-16 16:56 107K 
[   ]2017-15-05_win11.biargus2017-05-16 16:56 11M 
[   ]2017-15-05_win11.binetflow2017-05-16 16:56 1.5M 
[   ]2017-15-05_win11.capinfos2017-05-16 16:56 1.1K 
[   ]2017-15-05_win11.dnstop2017-05-16 16:53 3.5K 
[TXT]2017-15-05_win11.html2017-05-16 17:04 422K 
[   ]2017-15-05_win11.json2017-05-16 17:04 152K 
[   ]2017-15-05_win11.passivedns2017-05-16 16:53 6.7K 
[   ]2017-15-05_win11.pcap2017-05-16 16:53 33M 
[   ]2017-15-05_win11.rrd2017-05-16 16:42 8.0M 
[   ]2017-15-05_win11.tcpdstat2017-05-16 16:56 1.7K 
[   ]2017-15-05_win11.uniargus2017-05-16 16:56 17M 
[   ]2017-15-05_win11.uninetflow2017-05-16 16:56 5.6M 
[   ]2017-15-05_win11.weblogng2017-05-16 16:56 809  
[TXT]README.html2017-06-16 10:21 3.0K 
[TXT]README.md2017-06-16 10:20 2.3K 
[DIR]bro/2017-05-16 16:56 -  
[TXT]fast-flux-dga-first-analysis.txt2017-05-16 16:56 2.5K 
[   ]mitm.out2017-05-16 16:42 55K 
[DIR]suricata/2017-06-23 11:11 -  

Description

Files

IP Addresses

- Infected host: 192.168.1.121
- Default GW: 192.168.1.2

Timeline

Tue Apr 18 20:00:01 CEST 2017

started win11

Tue Apr 18 20:03:34 CEST 2017

infected

Tue May 16 16:42:08 CEST 2017

power off