Index of /publicDatasets/CTU-Malware-Capture-Botnet-69

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]24dcfdb1f46e4018500db101234f6cd7.exe.zip2015-12-16 10:26 226K 
[   ]2014-04-07_capture-win17.biargus2015-09-25 14:49 58M 
[   ]2014-04-07_capture-win17.binetflow2015-09-25 14:49 58M 
[   ]2014-04-07_capture-win17.capinfos2015-08-29 16:47 768  
[   ]2014-04-07_capture-win17.dnstop2015-08-29 16:47 15K 
[TXT]2014-04-07_capture-win17.html2015-10-23 17:03 425K 
[   ]2014-04-07_capture-win17.json2015-10-23 17:03 156K 
[   ]2014-04-07_capture-win17.passivedns2015-08-29 16:47 109K 
[   ]2014-04-07_capture-win17.pcap2014-04-06 09:51 650M 
[   ]2014-04-07_capture-win17.rrd2014-04-07 12:12 8.0M 
[   ]2014-04-07_capture-win17.tcpdstat2017-01-16 10:54 1.8K 
[   ]2014-04-07_capture-win17.weblogng2016-06-15 19:06 1.8K 
[TXT]README.html2017-01-16 11:11 2.4K 
[TXT]README.md2016-03-16 14:48 1.7K 
[DIR]bro/2017-08-31 09:45 -  
[TXT]fast-flux-dga-first-analysis.txt2017-01-16 11:11 3.8M 

Description

Analysis

The DNS connections are:

An example of the DNS domains requested is:

An example of DGA subdomains that got an IP

Timeline

Sun Feb 23 11:44:48 CET 2014

started win17

Sun Feb 23 11:52:50 CET 2014

infected

Mon Apr 7 10:17:23 CEST 2014

Huge powerdown on Sun 06, at 10am... powering up now.