![]() | Name | Last modified | Size | Description |
---|---|---|---|---|
![]() | Parent Directory | - | ||
![]() | bro/ | 2017-07-11 15:51 | - | |
![]() | capture_win24.weblogng | 2017-07-11 15:51 | 232 | |
![]() | capture_win24.capinfos | 2017-07-11 15:51 | 1.1K | |
![]() | capture_win24.tcpdstat | 2017-07-11 15:51 | 1.7K | |
![]() | README.md | 2017-07-11 15:54 | 3.7K | |
![]() | capture_win24.passivedns | 2017-07-11 15:51 | 3.7K | |
![]() | README.html | 2017-07-11 15:54 | 4.4K | |
![]() | capture_win24.dnstop | 2017-07-11 15:51 | 5.2K | |
![]() | fast-flux-dga-first-analysis.txt | 2017-07-11 15:51 | 5.6K | |
![]() | mitm.out | 2017-07-11 15:33 | 8.2K | |
![]() | capture_win24.binetflow | 2017-07-11 15:51 | 1.3M | |
![]() | capture_win24.biargus | 2017-07-11 15:51 | 1.9M | |
![]() | capture_win24.pcap | 2017-07-11 15:51 | 7.3M | |
![]() | Win24-test.rrd | 2017-07-11 15:52 | 8.0M | |
Description: This Win7 computer was installed in a network were another computer was infected with wannacry. After some seconds this computer was infected by the files were not encrypted. The capture of the original infected computer is CTU-284-1
RobotHash
Passive DNS file
- Infected host: 192.168.1.135
- Default GW: 192.168.1.2
started win24
The hostsnames www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com and www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com were redirected to 127.0.0.1 in the hosts file of the windows computer.
infected
After reciving the attack from 192.168.1.112, this computer got infected. However, the files in this computer were not encrypted.
This IP started to scan and attack on port 445/tcp.
power off
These files were generated in the Stratosphere Lab as part of the Malware Capture Facility Project in the CVUT University, Prague, Czech Republic. The goal is to store long-lived real botnet traffic and to generate labeled netflows files. Any question feel free to contact us: Sebastian Garcia: sebastian.garcia@agents.fel.cvut.cz
You are free to use these files as long as you reference this project and the authors as follows: Garcia, Sebastian. Malware Capture Facility Project. Retrieved from https://stratosphereips.org