![]() | Name | Last modified | Size | Description |
---|---|---|---|---|
![]() | Parent Directory | - | ||
![]() | 2014-06-06_capture-win2.biargus | 2017-01-16 10:09 | 1.9M | |
![]() | 2014-06-06_capture-win2.binetflow | 2017-01-16 10:09 | 802K | |
![]() | 2014-06-06_capture-win2.capinfos | 2017-01-16 10:09 | 1.1K | |
![]() | 2014-06-06_capture-win2.dnstop | 2017-01-16 10:09 | 20K | |
![]() | 2014-06-06_capture-win2.html | 2018-03-14 12:52 | 18M | |
![]() | 2014-06-06_capture-win2.json | 2018-03-14 12:52 | 29M | |
![]() | 2014-06-06_capture-win2.passivedns | 2017-01-16 10:09 | 96K | |
![]() | 2014-06-06_capture-win2.pcap | 2014-06-06 00:01 | 95M | |
![]() | 2014-06-06_capture-win2.rrd | 2014-06-06 09:13 | 8.0M | |
![]() | 2014-06-06_capture-win2.tcpdstat | 2017-01-16 10:09 | 2.0K | |
![]() | 2014-06-06_capture-win2.weblogng | 2016-06-15 17:38 | 1.2M | |
![]() | README.html | 2018-03-14 13:03 | 7.2K | |
![]() | README.md | 2018-03-14 13:03 | 8.2K | |
![]() | bro/ | 2017-01-16 10:09 | - | |
![]() | fast-flux-dga-first-analysis.txt | 2017-01-16 10:11 | 160K | |
![]() | suricata/ | 2019-03-23 14:42 | - | |
Proxy Usage: This capture did not use an intermediate proxy.
RobotHash
- Infected host: 10.0.2.102
- Default GW: 10.0.2.1
started win2
Stopped win2.
Post to youtube, GET /set_awesome?el=embedded&c=web&cver=html5&cbr=Chrome&cbrver=35.0.1916.114&cos=Windows&cosver=6.1&html5=1&video_id=IoafwczHI_Q&eurl=http%3A%2F%2Fwww.siasat.pk%2Fforum%2Fshowthread.php%3F211214-quot-Terrorist-Belongs-to-MQM-Indian-Army-s-arms-recovered-from-MQM-sector-Offi&w=0.7002587705901613&l=257.137799&plid=AAT6u4ZcHLxjhUK2&ei=enaKU-K3MpPr8AOg1YCgCg&tpmt=180.090999&cpn=Cz2SMJnyPrdTmq4Z HTTP/1.1
Example of DNS requests
71065.537465 CPS4wT2EXWPPFPRPFj 10.0.2.102 52885 8.8.8.8 53 udp 13329 mlfto1401508.br.whoer.net 1 C_INTERNET 1 A 3 NXDOMAIN F F 71123.503716 Cf7jqRttrmWx5nWu9 10.0.2.102 60367 8.8.8.8 53 udp 10327 nvall1401508.br.whoer.net 1 C_INTERNET 1 A 3 NXDOMAIN F F 71123.888674 CeG8sF4egutVDQMTo8 10.0.2.102 55440 8.8.8.8 53 udp 9109 nvall1401508.br.whoer.net 1 C_INTERNET 1 A 3 NXDOMAIN F F 71124.038867 Cmffhq4cr2jkome18f 10.0.2.102 53641 8.8.8.8 53 udp 61694 nvall1401508.br.whoer.net 1 C_INTERNET 1 A 3 NXDOMAIN F F 71143.051216 C2UJS62Qe8e1xDi8n4 10.0.2.102 62286 8.8.8.8 53 udp 62997 okwad1401508.br.whoer.net 1 C_INTERNET 1 A 3 NXDOMAIN F F 71146.957131 CSXm4V3P9NKVFrUH1d 10.0.2.102 55502 8.8.8.8 53 udp 43106 okwad1401508.br.whoer.net 1 C_INTERNET 1 A 3 NXDOMAIN F F 71161.290335 C7xFG9gi00Hpxohh6 10.0.2.102 56559 8.8.8.8 53 udp 50281 zuebm1401508.br.whoer.net 1 C_INTERNET 1 A 3 NXDOMAIN F F 71161.735567 C2cjRY3uaWsu8bdhN2 10.0.2.102 53633 8.8.8.8 53 udp 15285 zuebm1401508.br.whoer.net 1 C_INTERNET 1 A 3 NXDOMAIN F F 71164.930576 CYurIe3eoj8R5XO8Jk 10.0.2.102 61219 8.8.8.8 53 udp 36323 zuebm1401508.br.whoer.net 1 C_INTERNET 1 A 3 NXDOMAIN F F 71200.746053 CkDhGv3ZdYcEuUr9Sg 10.0.2.102 56137 8.8.8.8 53 udp 59454 nktgf1401508.br.whoer.net 1 C_INTERNET 1 A 3 NXDOMAIN F F 71213.744024 CLFA9r2Os8KYkIEQe2 10.0.2.102 64121 8.8.8.8 53 udp 29960 vjbrv1401508.br.whoer.net 1 C_INTERNET 1 A 3 NXDOMAIN F F 71231.431967 Ci0hQUQQ0fJ62v0W9 10.0.2.102 52032 8.8.8.8 53 udp 21708 fzwkd1401508.br.whoer.net 1 C_INTERNET 1 A 3 NXDOMAIN F F 71250.156048 C6zQK71BhJhMJBuha5 10.0.2.102 49560 8.8.8.8 53 udp 53106 hhopx1401508.br.whoer.net 1 C_INTERNET 1 A 3 NXDOMAIN F F 71255.043131 CdxRI93Rhd6l2aSHpk 10.0.2.102 62788 8.8.8.8 53 udp 42657 hhopx1401508.br.whoer.net 1 C_INTERNET 1 A 3 NXDOMAIN F F 71255.766888 CTDQcZ2eDQK716UeO7 10.0.2.102 50366 8.8.8.8 53 udp 63199 hhopx1401508.br.whoer.net 1 C_INTERNET 1 A 3 NXDOMAIN F F 71256.775993 CTOS8I3coJRLG70tWb 10.0.2.102 60817 8.8.8.8 53 udp 49672 hhopx1401508.br.whoer.net 1 C_INTERNET 1 A 3 NXDOMAIN F F 71256.887845 CUO41vvBfZMEwMImb 10.0.2.102 57695 8.8.8.8 53 udp 34789 hhopx1401508.br.whoer.net 1 C_INTERNET 1 A 3 NXDOMAIN F F 71294.509743 Cg3uUF4q3ZYWPpn1h8 10.0.2.102 60803 8.8.8.8 53 udp 53583 bkuew1401508.br.whoer.net 1 C_INTERNET 1 A 3 NXDOMAIN F F 71335.546412 CuIqjO2Hqg2TSkiFz 10.0.2.102 62943 8.8.8.8 53 udp 59421 gsjxr1401508.br.whoer.net 1 C_INTERNET 1 A 3 NXDOMAIN F F 71356.218761 C0rjFWyatQmHvnSM9 10.0.2.102 55970 8.8.8.8 53 udp 9488 hhgsf1401508.br.whoer.net 1 C_INTERNET 1 A 3 NXDOMAIN F F 71375.414833 CkAb471J2vUFUYuFVg 10.0.2.102 58486 8.8.8.8 53 udp 39230 hoyyk1401508.br.whoer.net 1 C_INTERNET 1 A 3 NXDOMAIN F F 71393.423396 CY79Kt3DSSrH3z5Ha6 10.0.2.102 60280 8.8.8.8 53 udp 19134 oldad1401508.br.whoer.net 1 C_INTERNET 1 A 3 NXDOMAIN F F 71406.829757 C92Fra6ieomwZzte6 10.0.2.102 59150 8.8.8.8 53 udp 61548 cjmsw1401508.br.whoer.net 1 C_INTERNET 1 A 3 NXDOMAIN F F 71409.962450 CvahjGOo8uTYEJaF8 10.0.2.102 56440 8.8.8.8 53 udp 35329 cjmsw1401508.br.whoer.net 1 C_INTERNET 1 A 3 NXDOMAIN F F 71425.359776 CON7qd2PxZGLa3asR4 10.0.2.102 58626 8.8.8.8 53 udp 32955 xkwvf1401508.br.whoer.net 1 C_INTERNET 1 A 3 NXDOMAIN F F
These files were generated in the Stratosphere Lab as part of the Malware Capture Facility Project in the CVUT University, Prague, Czech Republic. The goal is to store long-lived real botnet traffic and to generate labeled netflows files. Any question feel free to contact us: Sebastian Garcia: sebastian.garcia@agents.fel.cvut.cz
You are free to use these files as long as you reference this project and the authors as follows: Garcia, Sebastian. Malware Capture Facility Project. Retrieved from https://stratosphereips.org