Skip to content

Commit a6cebd6

Browse files
committed
rewrote readme file
1 parent 8c32da7 commit a6cebd6

File tree

3 files changed

+73
-106
lines changed

3 files changed

+73
-106
lines changed

README.md

Lines changed: 73 additions & 106 deletions
Original file line numberDiff line numberDiff line change
@@ -1,134 +1,101 @@
11
<div align="center">
22

3-
# [Malware-Samples Repository](https://cybersight-security.github.io/Malware-Samples)
3+
# Malware Samples
44

5-
Welcome to the Malware-Samples repository!
6-
This repository contains various malware and ransomware samples for research and analysis purposes.
7-
All RAR files are password-locked with the password "**infected**".
8-
Please ensure you use caution and follow appropriate safety measures when handling these samples.
5+
![Cybersight Security Malware Samples](assets/logo.png)
96

10-
</div>
11-
12-
### Usage
13-
14-
1. Clone the repository to your local machine:
7+
The Cybersight Security Malware Samples repository is a curated collection of malicious software specimens for cybersecurity research and analysis. This repository provides security professionals with real-world samples to study malware behavior, develop detection techniques, and enhance defensive strategies.
158

16-
```
17-
git clone https://github.com/ThatSINEWAVE/Malware-Samples.git
18-
```
9+
</div>
1910

20-
2. Use the password "**infected**" to unlock the RAR files containing the malware samples.
11+
## Features:
12+
- Comprehensive collection of real malware samples
13+
- Password-protected archives (password: "infected") for safe handling
14+
- Categorized by malware type (RATs, ransomware, trojans)
15+
- Detailed descriptions of each sample
16+
- Regular updates with new specimens
17+
- Research-focused organization
2118

22-
3. Analyze the samples using appropriate tools and techniques. Remember to do this in a controlled environment to prevent any unintended consequences.
19+
**Important Note:** All samples are contained within password-protected archives and should only be handled in secure, isolated environments. The attack simulations and behaviors described are real malware capabilities - extreme caution is required when working with these samples.
2320

24-
<div align="center">
21+
## Sample Categories
2522

26-
## [Support my work on Ko-Fi](https://ko-fi.com/thatsinewave)
23+
### Remote Access Trojans (RATs)
24+
- 888RAT - Advanced remote control capabilities
25+
- DarkComet - Comprehensive surveillance features
26+
- Nanocore - Robust feature set for system manipulation
27+
- 20+ additional RAT variants
2728

28-
</div>
29+
### Ransomware
30+
- WannaCry - Global epidemic ransomware
31+
- LockBit - Ransomware-as-a-service platform
32+
- Petya - Master boot record encryptor
33+
- 20+ additional ransomware variants
2934

30-
### Warning
35+
### Trojans
36+
- AgentTesla - Advanced information stealer
37+
- QakBot - Persistent banking trojan
38+
- FakeAV - Rogue antivirus malware
39+
- 20+ additional trojan variants
3140

32-
- **Caution**: Malware samples can cause harm to your computer system and compromise your security. Handle these samples with extreme care and only in isolated environments. Do not execute these samples on any system connected to the internet or any network containing sensitive information.
41+
## Technical Implementation
3342

34-
- **Please note**: The maintainer and contributors of this repository, both past, present, and future, are not responsible for any loss of data, system damage, or other consequences resulting from the mishandling of the samples provided herein. Caution is advised when testing any file present in this repository.
43+
### Sample Handling
44+
- All samples password-protected ("infected")
45+
- Archived in RAR format for additional security
46+
- Detailed metadata included for each sample
47+
- Regular integrity checks performed
3548

36-
# Future Improvements
49+
### Research Environment Recommendations
50+
- Use isolated virtual machines
51+
- Disable network connectivity
52+
- Employ memory-only analysis tools
53+
- Utilize sandbox environments
3754

38-
We aim to continuously enhance the usability and value of this repository. Here are some planned improvements:
55+
## Installation and Usage
3956

40-
1. **Dedicated README Files**: Each sample will have its dedicated README file, providing specific instructions, insights, and context about the sample. These README files will complement the general repository README and offer targeted guidance for analyzing individual samples.
57+
### Requirements
58+
- Virtualization software (VMware, VirtualBox)
59+
- Archive utility supporting RAR (WinRAR, 7-Zip)
60+
- Isolated laboratory environment
61+
- Malware analysis tools
4162

42-
## List of Samples
63+
### Setup Instructions
64+
1. **Clone the repository:**
65+
```bash
66+
git clone https://github.com/cybersight/malware-samples.git
67+
cd malware-samples
68+
```
4369

44-
### RATs (Remote Access Trojans)
45-
1. **888RAT** - A remote access trojan (RAT) known for its versatility and ability to control infected computers remotely.
46-
2. **Adwind** - A cross-platform RAT capable of infecting multiple operating systems, including Windows, macOS, and Linux.
47-
3. **ArdaMax** - A RAT with various spying capabilities, including key-logging, screen capture, and remote desktop control.
48-
4. **CyberGate** - A remote administration tool (RAT) used by cybercriminals to gain unauthorized access to infected systems and execute malicious actions remotely.
49-
5. **DarkComet** - A remote access trojan (RAT) notorious for its surveillance features, including key-logging, webcam monitoring, and file system access, often used in cyber espionage operations.
50-
6. **DarkCloud** - A malware variant known for its stealthy behavior and data exfiltration capabilities, often used in targeted espionage campaigns.
51-
7. **Gh0stRAT** - A remote access trojan (RAT) used by cybercriminals to gain unauthorized access to infected systems, allowing them to steal data, monitor activities, and execute commands remotely.
52-
8. **Glupteba** - A sophisticated malware strain known for its stealthy behavior and multiple functionalities, including cryptocurrency mining, information stealing, and proxy tunneling.
53-
9. **MetamorpherRAT** - A remote access trojan (RAT) known for its ability to evade detection by changing its characteristics, making it challenging for security software to detect and remove.
54-
10. **Nanocore** - A remote access trojan (RAT) known for its robust feature set, including key-logging, remote desktop control, and file system manipulation, often used in cyber espionage and data theft campaigns.
55-
11. **NETWire** - A remote access trojan (RAT) known for its extensive feature set, including key-logging, webcam capture, and file system manipulation, often used in cyber espionage and data theft operations.
56-
12. **Quasar** - A remote access trojan (RAT) known for its extensive feature set, including key-logging, remote desktop control, and file system manipulation, often used in targeted cyberattacks.
57-
13. **Remcos** - A remote access trojan (RAT) known for its extensive feature set, including remote desktop control, file management, and surveillance capabilities, often used in targeted cyberattacks.
58-
14. **RevangeRAT** - A remote access trojan (RAT) known for its surveillance capabilities, including key-logging, screen capture, and webcam monitoring, often used in cyber espionage operations.
59-
15. **SectopRAT** - A remote access trojan (RAT) known for its surveillance capabilities, including key-logging, screen capture, and remote desktop control, often used in cyber espionage operations.
60-
16. **WarzoneRAT** - A remote access trojan (RAT) known for its surveillance capabilities, including key-logging, screen capture, and remote desktop control, often used in cyber espionage operations.
61-
17. **WSHRAT** - A remote access trojan (RAT) named after its use of Windows Script Host (WSH) for execution, allowing attackers to gain unauthorized access to infected systems.
62-
18. **XenorRat** - A remote access trojan (RAT) designed for Windows systems, allowing attackers to remotely control infected devices, steal data, and execute malicious commands.
63-
19. **ZGRat** - A remote access trojan (RAT) known for its surveillance capabilities, including key-logging, screen capture, and remote desktop control, often used in cyber espionage operations.
64-
20. **Happy99** - Also known as Ska, is a type of malware that spreads via email attachments and infects Windows systems.
65-
21. **NJRAT** - NJRAT (also known as Nanocore or Nano Core RAT) is a remote access trojan designed to provide unauthorized access and control over infected systems.
70+
2. **Extract samples:**
71+
- Use password "infected" for all archives
72+
- Only extract in secure environments
6673

67-
### Ransomware
68-
1. **Cerber** - A notorious ransomware known for encrypting files on infected computers and demanding payment in cryptocurrency for decryption.
69-
2. **Cryptowall** - A pervasive ransomware strain that encrypts files on infected machines and demands payment in cryptocurrency for decryption, causing significant data loss and financial damage.
70-
3. **Djvu** - A prolific ransomware strain that encrypts files on compromised computers and demands payment in cryptocurrency for decryption, often distributed through malicious email attachments and fake software downloads.
71-
4. **Jigsaw** - A ransomware strain named after the antagonist in the movie "Saw," known for deleting files incrementally until a ransom is paid, aiming to pressure victims into payment.
72-
5. **LockBit** - A ransomware-as-a-service (RaaS) platform used by cybercriminals to encrypt files on infected systems and demand ransom payments for decryption keys.
73-
6. **Locky** - A notorious ransomware strain that gained notoriety for its large-scale distribution through spam emails containing malicious attachments, encrypting files on infected systems.
74-
7. **Mamba** - A ransomware variant known for its unique encryption technique, encrypting entire hard drives instead of individual files, making it more destructive and difficult to recover from.
75-
8. **Petrwrap** - A variant of the Petya ransomware, known for its destructive capabilities, encrypting entire hard drives and rendering infected systems inaccessible until a ransom is paid.
76-
9. **Petya** - A ransomware strain that gained notoriety for its ability to encrypt entire hard drives, causing widespread damage and disruption to infected systems, often propagated through phishing emails and exploit kits.
77-
10. **NotPetya** - A destructive malware strain that caused widespread havoc and financial losses to organizations worldwide.
78-
11. **Radamant** - A ransomware variant known for its encryption capabilities and targeted attacks against businesses and organizations, often demanding large ransom payments for decryption keys.
79-
12. **Satana** - A ransomware variant known for its destructive capabilities, encrypting files on infected systems and modifying the master boot record (MBR) to render the system unbootable until a ransom is paid.
80-
13. **Sodinokibi** - A ransomware-as-a-service (RaaS) platform used by cybercriminals to encrypt files on infected systems and demand ransom payments for decryption keys.
81-
14. **TearDrop** - A malware variant known for its stealthy behavior and advanced evasion techniques, often used for data theft and espionage purposes.
82-
15. **TeslaCrypt** - A ransomware variant known for encrypting files on infected systems and demanding payment for decryption, often distributed through malicious email attachments and exploit kits.
83-
16. **Thanos** - A ransomware variant known for its advanced encryption techniques and capability to encrypt files on both Windows and Linux systems, causing widespread damage and disruption.
84-
17. **WannaCry** - A ransomware worm that spread globally in 2017, encrypting files on infected systems and demanding ransom payments for decryption, exploiting a vulnerability in Windows systems.
85-
18. **WannaCryPlus** - A variant or evolution of the original WannaCry ransomware, possibly featuring additional functionalities or modifications to its encryption techniques.
86-
19. **GoldenEye** - A sophisticated ransomware strain that poses a significant threat to computer systems and networks worldwide.
87-
20. **BadRabbit** - A malicious ransomware strain that gained notoriety for its widespread attacks, particularly targeting organizations in various sectors.
88-
21. **Annabelle** - A sophisticated and dangerous ransomware strain that has garnered attention for its destructive capabilities in the cybersecurity landscape.
89-
22. **MonsterV1** - A potent malware strain that poses a significant threat to the cybersecurity landscape, capable of causing extensive damage to computer systems and networks.
90-
23. **MonsterV2** - This variant of MonsterV1 is highly advanced malware variant that represents a significant threat to the cybersecurity landscape, leveraging sophisticated techniques to infiltrate and compromise computer systems.
91-
24. **Pikachu** - a notorious malware strain known for its disruptive activities and widespread infections across computer systems.
74+
3. **Analyze samples:**
75+
- Use appropriate analysis tools
76+
- Maintain strict isolation protocols
77+
- Never execute on production systems
9278

93-
### Trojans
94-
1. **AgentTesla** - A keylogger and information stealer used by cybercriminals to capture sensitive data such as login credentials and financial information.
95-
2. **Akira** - A malware strain primarily designed for stealing cryptocurrency wallets and credentials from infected devices.
96-
3. **Amadey** - A modular trojan often used in phishing campaigns to steal personal and financial information from victims.
97-
4. **BanLoad** - A banking trojan designed to steal sensitive banking information, such as login credentials and account details, from infected devices.
98-
5. **Berbew** - A trojan primarily targeting banking and financial institutions, aiming to steal sensitive information related to online banking transactions.
99-
6. **Blankgrabber** - A data-stealing malware focused on capturing sensitive information, like login credentials and financial data, from infected devices.
100-
7. **Coper** - A banking trojan specializing in stealing financial data, such as credit card details and online banking credentials, from compromised systems.
101-
8. **Dirdex** - A trojan malware known for its ability to steal sensitive information from infected systems and spread through network shares and removable drives.
102-
9. **ICEDid** - A banking trojan designed to steal sensitive information from infected systems, including login credentials and financial data, primarily distributed through phishing campaigns and exploit kits.
103-
10. **Imminent** - A malware variant known for its stealthy infiltration and destructive capabilities, often used to deploy ransomware and steal sensitive data from compromised systems.
104-
11. **Matiex** - A trojan malware designed to steal sensitive information, such as login credentials and financial data, from infected systems, often distributed through phishing campaigns.
105-
12. **Matsnu** - A sophisticated malware strain known for its polymorphic capabilities and multiple functionalities, including information stealing, credential harvesting, and system manipulation.
106-
13. **Pony** - A data-stealing malware focused on capturing sensitive information, such as login credentials and financial data, from infected systems, often used in credential stuffing attacks and identity theft.
107-
14. **Pysilon** - A trojan malware designed to steal sensitive information from infected systems, including login credentials and financial data, often distributed through malicious email attachments and drive-by downloads.
108-
15. **QakBot** - A banking trojan known for its persistence and stealthy behavior, capable of stealing sensitive information, such as login credentials and financial data, from infected systems.
109-
16. **QNodeService** - A trojan malware known for its stealthy behavior and ability to evade detection, often used for data theft and remote access to infected systems.
110-
17. **Rex** - A trojan malware known for its ability to steal sensitive information from infected systems, such as login credentials and financial data, often distributed through phishing campaigns and malicious downloads.
111-
18. **StealC** - A data-stealing malware variant focused on capturing sensitive information, such as login credentials and financial data, from infected systems, often distributed through malicious websites and phishing emails.
112-
19. **Yunsip** - A trojan malware designed to steal sensitive information from infected systems, such as login credentials and financial data, often distributed through phishing campaigns and malicious downloads.
113-
20. **Magistr** - A polymorphic computer virus that spreads through email attachments and network shares.
114-
21. **Bonzify** - A malicious trojan horse program designed to infiltrate computer systems stealthily and perform various harmful actions.
115-
22. **000** - A notorious malware known for its malicious activities across various computer systems.
116-
23. **Madal** - A trojan that infiltrates systems through deceptive means, such as email attachments, software downloads, or compromised websites.
117-
24. **FakeAV** - FakeAV, also known as Rogue Antivirus, is a type of malware that deceives users into believing their systems are infected with malicious software.
79+
## Warning and Safety Protocols
11880

119-
<div align="center">
81+
- **Critical Warning:** These samples are live malware and will infect unprotected systems
82+
- Always work in isolated virtual environments
83+
- Never analyze samples on internet-connected systems
84+
- Use dedicated research machines when possible
85+
- Follow all organizational security policies
12086

121-
## [Join my Discord server](https://discord.gg/2nHHHBWNDw)
87+
## License
12288

123-
</div>
89+
This project is licensed under the GNU General Public License (GPL). This means you are free to:
12490

125-
### Contributing
91+
- Use the samples for research purposes
92+
- Study the malware behavior
93+
- Develop detection and prevention mechanisms
12694

127-
Contributions to this repository are welcome! If you have additional malware samples to share, please submit a pull request with the necessary information and password-protected archives files.
95+
The full license text is included in the repository.
12896

129-
### Disclaimer
97+
## About Cybersight Security
13098

131-
The samples provided in this repository are for educational and research purposes only.
132-
The maintainer and contributors of this repository are not responsible for any misuse or damage caused by these samples. Use at your own risk.
99+
Cybersight Security is a leading provider of cybersecurity solutions, helping organizations protect their digital assets against evolving threats. Our Malware Samples Repository is part of our commitment to security research and education.
133100

134-
**Remember: Stay safe and ethical in your research and analysis endeavors!**
101+
**Disclaimer:** This repository contains real malicious software. Cybersight Security is not responsible for any damage caused by improper handling of these samples. Use exclusively for legitimate research purposes in controlled environments. By accessing this repository, you assume all responsibility for safe handling of these materials.

assets/badge.png

51 KB
Loading

assets/logo.png

48 KB
Loading

0 commit comments

Comments
 (0)