This repo is a public collection of malware samples and related dissection/analysis information, maintained by InQuest. It gathers various kinds of malicious artifacts, executables, scripts, macros, obfuscated documents, etc., with metadata (e.g., VirusTotal reports), file carriers, and sample hashes. It’s intended for malware analysts/researchers to help study how malware works, how they are delivered, and how it evolves.
Features
- Wide variety of sample types — includes executables, scripts, Office docs with macros, obfuscated payloads, etc.
- Associated metadata / reports — many samples come with JSON / VirusTotal reports and sometimes decompiled sources or analysis.
- Organized chronologically / by campaign — samples are grouped by date, malware family, and campaign name.
- File-carrier examples — shows how malware is delivered (e.g. via Office docs, PowerShell, SWF, etc.).
- Open source with permissive license — MIT license, which allows reuse / study.
- Linkage to external resources — connects to blog posts, dissection writeups, interactive searchable interfaces (InQuest Labs DFI), etc.
Categories
SecurityLicense
MIT LicenseFollow malware-samples
You Might Also Like
Create and run cloud-based virtual machines.
Computing infrastructure in predefined or custom machine sizes to accelerate your cloud transformation. General purpose (E2, N1, N2, N2D) machines provide a good balance of price and performance. Compute optimized (C2) machines offer high-end vCPU performance for compute-intensive workloads. Memory optimized (M2) machines offer the highest memory and are great for in-memory databases. Accelerator optimized (A2) machines are based on the A100 GPU, for very demanding applications.
Rate This Project
Login To Rate This Project
User Reviews
Be the first to post a review of malware-samples!