Description: This wannacry infection was done to see how others computers in the network get infected. There one more computer in the same network with the IP 192.168.1.135 that got infected. The capture of the other infected computer is CTU-285-1
- Infected host: 192.168.1.112 - Default GW: 192.168.1.2
The hostsnames www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com and www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com were redirected to 127.0.0.1 in the hosts file of the windows computer.
The files in this computer were not encrypted.
Some seconds after finding the other Win 7 computer in the network with IP 192.168.1.135, it infected it. After this, the IP 192.168.1.135 started to scan and attack on port 445/tcp.
However, the files in the computer 192.168.1.135 were not encrypted.
These files were generated in the Stratosphere Lab as part of the Malware Capture Facility Project in the CVUT University, Prague, Czech Republic. The goal is to store long-lived real botnet traffic and to generate labeled netflows files. Any question feel free to contact us: Sebastian Garcia: firstname.lastname@example.org
You are free to use these files as long as you reference this project and the authors as follows: Garcia, Sebastian. Malware Capture Facility Project. Retrieved from https://stratosphereips.org