Description
- Probable Name: Pony/Trojan.Valyria
- MD5: d9f77f23fce07ee24ce54debed65b16a
- SHA1: 96b9fff268be13e7aace7d1425794ffd9714e6e2
- SHA256: 084d3a4bc57f531c81cc8b022a9f4cd112ee29ae978af1965c09be8dc596a731
- Password of zip file: infected
Duration: 23 mins
- VirusTotal
- HybridAnalysis
RobotHash

Files
- .capinfos
- .dnstop
- mitm.out
- Mitm proxy interception file of http and https
- .mitm.weblog
- This is the HTTP and HTTPS web log that includes Labels. This is the preferred file for web analysis.
- This file includes a header with the columns names. There are two new columns defined by us:
- Column id: This number is unique for all the weblogs generated inside the same TCP connection. When a TCP connection is opened and several GET/POST, etc., requests are made inside it, all of them are assigned the same Id in this file.
- Column timestamp_end: This is the timestamp when the weblog ended. If you use this with the id column you can compute the total duration of the TCP connection that generated all the weblogs. Similar to the duration of a hypothetical CONNECT request if this would have been done using a proxy.
- .passivedns
- .pcap
- .rrd
- .weblogng
- WEB log of http traffic only. Generated with justsniffer
- .exe.zip
- bro
- Folder with all the bro output files
- .biargus
- Argus binary file. Bidirectional flows, 3600s of report time.
- .binetflow
- Argus text file with bidirectional flows. Report time 3600 secs.
- .uniargus
- Argus binary file. Unidirectional flows, 5s of report time.
- .uninetflow
- Argus text file with unidirectional flows. Report time 5 secs. TAB as column separator.
IP Addresses
- Infected host: 192.168.1.106
- Default GW: 192.168.1.2
Timeline
Thu Apr 20 16:29:23 CEST 2017
started win23
Thu Apr 20 16:37:23 CEST 2017
infected
Thu Apr 20 16:40:23 CEST 2017
Follow the steps mentioned in the document and Enable Editing and Enable Content
Sun Jun 25 00:45:36 CEST 2017
power off