Name | Last modified | Size | Description | |
---|---|---|---|---|
Parent Directory | - | |||
2018-12-21-15-50-14-192.168.1.195.capinfos | 2022-07-16 11:13 | 1.1K | ||
2018-12-21-15-50-14-192.168.1.195.dnstop | 2022-07-16 11:13 | 1.6K | ||
2018-12-21-15-50-14-192.168.1.195.pcap | 2019-01-30 17:57 | 120M | ||
README.html | 2022-07-16 11:13 | 2.2K | ||
README.md | 2022-07-16 11:13 | 1.6K | ||
bro/ | 2023-12-12 00:55 | - | ||
other-pcap/ | 2022-07-16 11:12 | - | ||
suricata/ | 2022-07-16 11:13 | - | ||
Description:
Probable Malware Name: Mirai
MD5: 82062b666f09fc5c0fe4f68d1ea90916
SHA1: b35d4b7980d361874e84e76eddbaff83c2c5790f
SHA256: 49fd1cb22e0325c1f9038160da534fc23672e5509e903a94ce5bcddc893eb2c0
Password of zip file: infected
Duration: 86397.071327 seconds
RobotHash
- Infected device: 192.168.1.195
- Default GW: 192.168.1.1
These files were generated in the Stratosphere Laboratory as part of the Aposemat Project for collecting IoT malware captures Done in the CVUT University, Prague, Czech Republic. The goal is to store long-lived real iot malware traffic and to generate labeled netflows files. Any question feel free to contact us at: Sebastian Garcia: sebastian.garcia@agents.fel.cvut.cz
You need authorization from the Stratosphere Lab to use these files.