|
1 | 1 | <div align="center">
|
2 | 2 |
|
3 |
| -# [Malware-Samples Repository](https://cybersight-security.github.io/Malware-Samples) |
| 3 | +# Malware Samples |
4 | 4 |
|
5 |
| -Welcome to the Malware-Samples repository! |
6 |
| -This repository contains various malware and ransomware samples for research and analysis purposes. |
7 |
| -All RAR files are password-locked with the password "**infected**". |
8 |
| -Please ensure you use caution and follow appropriate safety measures when handling these samples. |
| 5 | + |
9 | 6 |
|
10 |
| -</div> |
11 |
| - |
12 |
| -### Usage |
13 |
| - |
14 |
| -1. Clone the repository to your local machine: |
| 7 | +The Cybersight Security Malware Samples repository is a curated collection of malicious software specimens for cybersecurity research and analysis. This repository provides security professionals with real-world samples to study malware behavior, develop detection techniques, and enhance defensive strategies. |
15 | 8 |
|
16 |
| -``` |
17 |
| -git clone https://github.com/ThatSINEWAVE/Malware-Samples.git |
18 |
| -``` |
| 9 | +</div> |
19 | 10 |
|
20 |
| -2. Use the password "**infected**" to unlock the RAR files containing the malware samples. |
| 11 | +## Features: |
| 12 | +- Comprehensive collection of real malware samples |
| 13 | +- Password-protected archives (password: "infected") for safe handling |
| 14 | +- Categorized by malware type (RATs, ransomware, trojans) |
| 15 | +- Detailed descriptions of each sample |
| 16 | +- Regular updates with new specimens |
| 17 | +- Research-focused organization |
21 | 18 |
|
22 |
| -3. Analyze the samples using appropriate tools and techniques. Remember to do this in a controlled environment to prevent any unintended consequences. |
| 19 | +**Important Note:** All samples are contained within password-protected archives and should only be handled in secure, isolated environments. The attack simulations and behaviors described are real malware capabilities - extreme caution is required when working with these samples. |
23 | 20 |
|
24 |
| -<div align="center"> |
| 21 | +## Sample Categories |
25 | 22 |
|
26 |
| -## ☕ [Support my work on Ko-Fi](https://ko-fi.com/thatsinewave) |
| 23 | +### Remote Access Trojans (RATs) |
| 24 | +- 888RAT - Advanced remote control capabilities |
| 25 | +- DarkComet - Comprehensive surveillance features |
| 26 | +- Nanocore - Robust feature set for system manipulation |
| 27 | +- 20+ additional RAT variants |
27 | 28 |
|
28 |
| -</div> |
| 29 | +### Ransomware |
| 30 | +- WannaCry - Global epidemic ransomware |
| 31 | +- LockBit - Ransomware-as-a-service platform |
| 32 | +- Petya - Master boot record encryptor |
| 33 | +- 20+ additional ransomware variants |
29 | 34 |
|
30 |
| -### Warning |
| 35 | +### Trojans |
| 36 | +- AgentTesla - Advanced information stealer |
| 37 | +- QakBot - Persistent banking trojan |
| 38 | +- FakeAV - Rogue antivirus malware |
| 39 | +- 20+ additional trojan variants |
31 | 40 |
|
32 |
| -- **Caution**: Malware samples can cause harm to your computer system and compromise your security. Handle these samples with extreme care and only in isolated environments. Do not execute these samples on any system connected to the internet or any network containing sensitive information. |
| 41 | +## Technical Implementation |
33 | 42 |
|
34 |
| -- **Please note**: The maintainer and contributors of this repository, both past, present, and future, are not responsible for any loss of data, system damage, or other consequences resulting from the mishandling of the samples provided herein. Caution is advised when testing any file present in this repository. |
| 43 | +### Sample Handling |
| 44 | +- All samples password-protected ("infected") |
| 45 | +- Archived in RAR format for additional security |
| 46 | +- Detailed metadata included for each sample |
| 47 | +- Regular integrity checks performed |
35 | 48 |
|
36 |
| -# Future Improvements |
| 49 | +### Research Environment Recommendations |
| 50 | +- Use isolated virtual machines |
| 51 | +- Disable network connectivity |
| 52 | +- Employ memory-only analysis tools |
| 53 | +- Utilize sandbox environments |
37 | 54 |
|
38 |
| -We aim to continuously enhance the usability and value of this repository. Here are some planned improvements: |
| 55 | +## Installation and Usage |
39 | 56 |
|
40 |
| -1. **Dedicated README Files**: Each sample will have its dedicated README file, providing specific instructions, insights, and context about the sample. These README files will complement the general repository README and offer targeted guidance for analyzing individual samples. |
| 57 | +### Requirements |
| 58 | +- Virtualization software (VMware, VirtualBox) |
| 59 | +- Archive utility supporting RAR (WinRAR, 7-Zip) |
| 60 | +- Isolated laboratory environment |
| 61 | +- Malware analysis tools |
41 | 62 |
|
42 |
| -## List of Samples |
| 63 | +### Setup Instructions |
| 64 | +1. **Clone the repository:** |
| 65 | + ```bash |
| 66 | + git clone https://github.com/cybersight/malware-samples.git |
| 67 | + cd malware-samples |
| 68 | + ``` |
43 | 69 |
|
44 |
| -### RATs (Remote Access Trojans) |
45 |
| -1. **888RAT** - A remote access trojan (RAT) known for its versatility and ability to control infected computers remotely. |
46 |
| -2. **Adwind** - A cross-platform RAT capable of infecting multiple operating systems, including Windows, macOS, and Linux. |
47 |
| -3. **ArdaMax** - A RAT with various spying capabilities, including key-logging, screen capture, and remote desktop control. |
48 |
| -4. **CyberGate** - A remote administration tool (RAT) used by cybercriminals to gain unauthorized access to infected systems and execute malicious actions remotely. |
49 |
| -5. **DarkComet** - A remote access trojan (RAT) notorious for its surveillance features, including key-logging, webcam monitoring, and file system access, often used in cyber espionage operations. |
50 |
| -6. **DarkCloud** - A malware variant known for its stealthy behavior and data exfiltration capabilities, often used in targeted espionage campaigns. |
51 |
| -7. **Gh0stRAT** - A remote access trojan (RAT) used by cybercriminals to gain unauthorized access to infected systems, allowing them to steal data, monitor activities, and execute commands remotely. |
52 |
| -8. **Glupteba** - A sophisticated malware strain known for its stealthy behavior and multiple functionalities, including cryptocurrency mining, information stealing, and proxy tunneling. |
53 |
| -9. **MetamorpherRAT** - A remote access trojan (RAT) known for its ability to evade detection by changing its characteristics, making it challenging for security software to detect and remove. |
54 |
| -10. **Nanocore** - A remote access trojan (RAT) known for its robust feature set, including key-logging, remote desktop control, and file system manipulation, often used in cyber espionage and data theft campaigns. |
55 |
| -11. **NETWire** - A remote access trojan (RAT) known for its extensive feature set, including key-logging, webcam capture, and file system manipulation, often used in cyber espionage and data theft operations. |
56 |
| -12. **Quasar** - A remote access trojan (RAT) known for its extensive feature set, including key-logging, remote desktop control, and file system manipulation, often used in targeted cyberattacks. |
57 |
| -13. **Remcos** - A remote access trojan (RAT) known for its extensive feature set, including remote desktop control, file management, and surveillance capabilities, often used in targeted cyberattacks. |
58 |
| -14. **RevangeRAT** - A remote access trojan (RAT) known for its surveillance capabilities, including key-logging, screen capture, and webcam monitoring, often used in cyber espionage operations. |
59 |
| -15. **SectopRAT** - A remote access trojan (RAT) known for its surveillance capabilities, including key-logging, screen capture, and remote desktop control, often used in cyber espionage operations. |
60 |
| -16. **WarzoneRAT** - A remote access trojan (RAT) known for its surveillance capabilities, including key-logging, screen capture, and remote desktop control, often used in cyber espionage operations. |
61 |
| -17. **WSHRAT** - A remote access trojan (RAT) named after its use of Windows Script Host (WSH) for execution, allowing attackers to gain unauthorized access to infected systems. |
62 |
| -18. **XenorRat** - A remote access trojan (RAT) designed for Windows systems, allowing attackers to remotely control infected devices, steal data, and execute malicious commands. |
63 |
| -19. **ZGRat** - A remote access trojan (RAT) known for its surveillance capabilities, including key-logging, screen capture, and remote desktop control, often used in cyber espionage operations. |
64 |
| -20. **Happy99** - Also known as Ska, is a type of malware that spreads via email attachments and infects Windows systems. |
65 |
| -21. **NJRAT** - NJRAT (also known as Nanocore or Nano Core RAT) is a remote access trojan designed to provide unauthorized access and control over infected systems. |
| 70 | +2. **Extract samples:** |
| 71 | + - Use password "infected" for all archives |
| 72 | + - Only extract in secure environments |
66 | 73 |
|
67 |
| -### Ransomware |
68 |
| -1. **Cerber** - A notorious ransomware known for encrypting files on infected computers and demanding payment in cryptocurrency for decryption. |
69 |
| -2. **Cryptowall** - A pervasive ransomware strain that encrypts files on infected machines and demands payment in cryptocurrency for decryption, causing significant data loss and financial damage. |
70 |
| -3. **Djvu** - A prolific ransomware strain that encrypts files on compromised computers and demands payment in cryptocurrency for decryption, often distributed through malicious email attachments and fake software downloads. |
71 |
| -4. **Jigsaw** - A ransomware strain named after the antagonist in the movie "Saw," known for deleting files incrementally until a ransom is paid, aiming to pressure victims into payment. |
72 |
| -5. **LockBit** - A ransomware-as-a-service (RaaS) platform used by cybercriminals to encrypt files on infected systems and demand ransom payments for decryption keys. |
73 |
| -6. **Locky** - A notorious ransomware strain that gained notoriety for its large-scale distribution through spam emails containing malicious attachments, encrypting files on infected systems. |
74 |
| -7. **Mamba** - A ransomware variant known for its unique encryption technique, encrypting entire hard drives instead of individual files, making it more destructive and difficult to recover from. |
75 |
| -8. **Petrwrap** - A variant of the Petya ransomware, known for its destructive capabilities, encrypting entire hard drives and rendering infected systems inaccessible until a ransom is paid. |
76 |
| -9. **Petya** - A ransomware strain that gained notoriety for its ability to encrypt entire hard drives, causing widespread damage and disruption to infected systems, often propagated through phishing emails and exploit kits. |
77 |
| -10. **NotPetya** - A destructive malware strain that caused widespread havoc and financial losses to organizations worldwide. |
78 |
| -11. **Radamant** - A ransomware variant known for its encryption capabilities and targeted attacks against businesses and organizations, often demanding large ransom payments for decryption keys. |
79 |
| -12. **Satana** - A ransomware variant known for its destructive capabilities, encrypting files on infected systems and modifying the master boot record (MBR) to render the system unbootable until a ransom is paid. |
80 |
| -13. **Sodinokibi** - A ransomware-as-a-service (RaaS) platform used by cybercriminals to encrypt files on infected systems and demand ransom payments for decryption keys. |
81 |
| -14. **TearDrop** - A malware variant known for its stealthy behavior and advanced evasion techniques, often used for data theft and espionage purposes. |
82 |
| -15. **TeslaCrypt** - A ransomware variant known for encrypting files on infected systems and demanding payment for decryption, often distributed through malicious email attachments and exploit kits. |
83 |
| -16. **Thanos** - A ransomware variant known for its advanced encryption techniques and capability to encrypt files on both Windows and Linux systems, causing widespread damage and disruption. |
84 |
| -17. **WannaCry** - A ransomware worm that spread globally in 2017, encrypting files on infected systems and demanding ransom payments for decryption, exploiting a vulnerability in Windows systems. |
85 |
| -18. **WannaCryPlus** - A variant or evolution of the original WannaCry ransomware, possibly featuring additional functionalities or modifications to its encryption techniques. |
86 |
| -19. **GoldenEye** - A sophisticated ransomware strain that poses a significant threat to computer systems and networks worldwide. |
87 |
| -20. **BadRabbit** - A malicious ransomware strain that gained notoriety for its widespread attacks, particularly targeting organizations in various sectors. |
88 |
| -21. **Annabelle** - A sophisticated and dangerous ransomware strain that has garnered attention for its destructive capabilities in the cybersecurity landscape. |
89 |
| -22. **MonsterV1** - A potent malware strain that poses a significant threat to the cybersecurity landscape, capable of causing extensive damage to computer systems and networks. |
90 |
| -23. **MonsterV2** - This variant of MonsterV1 is highly advanced malware variant that represents a significant threat to the cybersecurity landscape, leveraging sophisticated techniques to infiltrate and compromise computer systems. |
91 |
| -24. **Pikachu** - a notorious malware strain known for its disruptive activities and widespread infections across computer systems. |
| 74 | +3. **Analyze samples:** |
| 75 | + - Use appropriate analysis tools |
| 76 | + - Maintain strict isolation protocols |
| 77 | + - Never execute on production systems |
92 | 78 |
|
93 |
| -### Trojans |
94 |
| -1. **AgentTesla** - A keylogger and information stealer used by cybercriminals to capture sensitive data such as login credentials and financial information. |
95 |
| -2. **Akira** - A malware strain primarily designed for stealing cryptocurrency wallets and credentials from infected devices. |
96 |
| -3. **Amadey** - A modular trojan often used in phishing campaigns to steal personal and financial information from victims. |
97 |
| -4. **BanLoad** - A banking trojan designed to steal sensitive banking information, such as login credentials and account details, from infected devices. |
98 |
| -5. **Berbew** - A trojan primarily targeting banking and financial institutions, aiming to steal sensitive information related to online banking transactions. |
99 |
| -6. **Blankgrabber** - A data-stealing malware focused on capturing sensitive information, like login credentials and financial data, from infected devices. |
100 |
| -7. **Coper** - A banking trojan specializing in stealing financial data, such as credit card details and online banking credentials, from compromised systems. |
101 |
| -8. **Dirdex** - A trojan malware known for its ability to steal sensitive information from infected systems and spread through network shares and removable drives. |
102 |
| -9. **ICEDid** - A banking trojan designed to steal sensitive information from infected systems, including login credentials and financial data, primarily distributed through phishing campaigns and exploit kits. |
103 |
| -10. **Imminent** - A malware variant known for its stealthy infiltration and destructive capabilities, often used to deploy ransomware and steal sensitive data from compromised systems. |
104 |
| -11. **Matiex** - A trojan malware designed to steal sensitive information, such as login credentials and financial data, from infected systems, often distributed through phishing campaigns. |
105 |
| -12. **Matsnu** - A sophisticated malware strain known for its polymorphic capabilities and multiple functionalities, including information stealing, credential harvesting, and system manipulation. |
106 |
| -13. **Pony** - A data-stealing malware focused on capturing sensitive information, such as login credentials and financial data, from infected systems, often used in credential stuffing attacks and identity theft. |
107 |
| -14. **Pysilon** - A trojan malware designed to steal sensitive information from infected systems, including login credentials and financial data, often distributed through malicious email attachments and drive-by downloads. |
108 |
| -15. **QakBot** - A banking trojan known for its persistence and stealthy behavior, capable of stealing sensitive information, such as login credentials and financial data, from infected systems. |
109 |
| -16. **QNodeService** - A trojan malware known for its stealthy behavior and ability to evade detection, often used for data theft and remote access to infected systems. |
110 |
| -17. **Rex** - A trojan malware known for its ability to steal sensitive information from infected systems, such as login credentials and financial data, often distributed through phishing campaigns and malicious downloads. |
111 |
| -18. **StealC** - A data-stealing malware variant focused on capturing sensitive information, such as login credentials and financial data, from infected systems, often distributed through malicious websites and phishing emails. |
112 |
| -19. **Yunsip** - A trojan malware designed to steal sensitive information from infected systems, such as login credentials and financial data, often distributed through phishing campaigns and malicious downloads. |
113 |
| -20. **Magistr** - A polymorphic computer virus that spreads through email attachments and network shares. |
114 |
| -21. **Bonzify** - A malicious trojan horse program designed to infiltrate computer systems stealthily and perform various harmful actions. |
115 |
| -22. **000** - A notorious malware known for its malicious activities across various computer systems. |
116 |
| -23. **Madal** - A trojan that infiltrates systems through deceptive means, such as email attachments, software downloads, or compromised websites. |
117 |
| -24. **FakeAV** - FakeAV, also known as Rogue Antivirus, is a type of malware that deceives users into believing their systems are infected with malicious software. |
| 79 | +## Warning and Safety Protocols |
118 | 80 |
|
119 |
| -<div align="center"> |
| 81 | +- **Critical Warning:** These samples are live malware and will infect unprotected systems |
| 82 | +- Always work in isolated virtual environments |
| 83 | +- Never analyze samples on internet-connected systems |
| 84 | +- Use dedicated research machines when possible |
| 85 | +- Follow all organizational security policies |
120 | 86 |
|
121 |
| -## [Join my Discord server](https://discord.gg/2nHHHBWNDw) |
| 87 | +## License |
122 | 88 |
|
123 |
| -</div> |
| 89 | +This project is licensed under the GNU General Public License (GPL). This means you are free to: |
124 | 90 |
|
125 |
| -### Contributing |
| 91 | +- Use the samples for research purposes |
| 92 | +- Study the malware behavior |
| 93 | +- Develop detection and prevention mechanisms |
126 | 94 |
|
127 |
| -Contributions to this repository are welcome! If you have additional malware samples to share, please submit a pull request with the necessary information and password-protected archives files. |
| 95 | +The full license text is included in the repository. |
128 | 96 |
|
129 |
| -### Disclaimer |
| 97 | +## About Cybersight Security |
130 | 98 |
|
131 |
| -The samples provided in this repository are for educational and research purposes only. |
132 |
| -The maintainer and contributors of this repository are not responsible for any misuse or damage caused by these samples. Use at your own risk. |
| 99 | +Cybersight Security is a leading provider of cybersecurity solutions, helping organizations protect their digital assets against evolving threats. Our Malware Samples Repository is part of our commitment to security research and education. |
133 | 100 |
|
134 |
| -**Remember: Stay safe and ethical in your research and analysis endeavors!** |
| 101 | +**Disclaimer:** This repository contains real malicious software. Cybersight Security is not responsible for any damage caused by improper handling of these samples. Use exclusively for legitimate research purposes in controlled environments. By accessing this repository, you assume all responsibility for safe handling of these materials. |
0 commit comments