Index of /publicDatasets/CTU-Malware-Capture-Botnet-67-2

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]2014-06-06_capture-win14.capinfos2022-08-25 16:52 1.2K 
[   ]2014-06-06_capture-win14.dnstop2022-08-25 16:48 15K 
[   ]2014-06-06_capture-win14.pcap2022-08-25 16:48 1.0G 
[   ]2014-06-06_capture-win14.rrd2014-06-06 09:23 8.0M 
[TXT]README.html2022-08-25 17:02 3.2K 
[TXT]README.md2022-08-25 16:58 2.6K 
[DIR]bro/2022-08-25 16:51 -  
[   ]here2022-08-25 16:56 3.1K 
[DIR]suricata/2022-08-25 16:52 -  



Generic Dataset name: CTU-Malware-Capture-Botnet-67-2

IP Addresses

- Infected host:
- Default GW: -


Mon, 07 Apr 2014 09:21:26 GMT



These files were generated in the Stratosphere Lab as part of the Malware Capture Facility Project in the CVUT University, Prague, Czech Republic. The goal is to store long-lived real botnet traffic and to generate labeled netflows files. Any question feel free to contact us: Sebastian Garcia:

You are free to use these files as long as you reference this project and the authors as follows: Garcia, Sebastian. Malware Capture Facility Project. Retrieved from

Suricata run with rules updated on 2022-08-25