hed0x / Malware-archive

Malware Repository to be used for malware analysis

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

WARNING: These are live samples with additional payloads that can be ran without error. Use at your own risk. Maltek Labs is not responsible for any damage to systems or data resulting in misuse or improper use. These samples are to be used for learning about malware analysis through the reversing of the samples.

One of the biggest troubles for understanding or beginning malware analysis for others is the lack of having complete sample(s) as most repos only focus on the dropped executable and not the initial payload(s) as well. The aim of this repository is to have a collection of live samples with all the additional payloads or potential payloads for use in learning how to reverse engineer, deobfuscate, and improve your REM skills with the various samples that you may encounter in the wild.

The samples contained in this archive are in various formats such Powershell, JScript, Malicious Office documents, VBA Macro code, EXE, etc. These samples were obtained through various malware DBs, through archives, or on the dark web. The files have been renamed with its associating SHA256 hash or malware family name, followed by its file type, and with their file extension replaced with ".file" for your safety.

Example: ReEvil_PS.file

Samples are zipped & password protected

Password: infected

For more malware details or Security blog posts visit https://maltek-labs.com

About

Malware Repository to be used for malware analysis