Index of /publicDatasets/CTU-Malware-Capture-Botnet-67-1

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]2014-04-07_capture-win14.capinfos2022-08-25 16:48 1.1K 
[   ]2014-04-07_capture-win14.dnstop2022-08-25 16:45 15K 
[   ]2014-04-07_capture-win14.pcap2022-08-25 16:45 662M 
[   ]2014-04-07_capture-win14.rrd2014-04-07 11:07 8.0M 
[TXT]README.html2022-08-25 17:02 3.2K 
[TXT]README.md2022-08-25 17:00 2.6K 
[DIR]Slips/2022-08-25 17:34 -  
[DIR]bro/2022-08-25 16:47 -  
[DIR]suricata/2022-08-25 16:48 -  



Generic Dataset name: CTU-Malware-Capture-Botnet-67-2

IP Addresses

- Infected host:
- Default GW: -


Sun, 23 Feb 2014 08:31:00 GMT



These files were generated in the Stratosphere Lab as part of the Malware Capture Facility Project in the CVUT University, Prague, Czech Republic. The goal is to store long-lived real botnet traffic and to generate labeled netflows files. Any question feel free to contact us: Sebastian Garcia:

You are free to use these files as long as you reference this project and the authors as follows: Garcia, Sebastian. Malware Capture Facility Project. Retrieved from

Suricata run with rules updated on 2022-08-25