首页
社区
课程
招聘
[原创]样本从哪儿来
发表于: 2019-8-15 09:56 6997

[原创]样本从哪儿来

2019-8-15 09:56
6997

经常有人问,我想分析的恶意样本,可是这些样本要从哪儿下载呢?看到别人的分析报告,里面有IOC信息和样本MD5,我也想分析一下,但这些样本从哪里下载?简单给大家谈谈一般恶意样本可以从哪些渠道得来? 


如果你身在安全公司,有客户端类的安全产品,一般从下几个渠道可以获取:

(1)一些客户端收集用户的样本,然后保存到样本TOP库,从黑灰库中找可疑样本进行分析,说不定就可以找到惊喜

(2)用户反馈的一些样本,或你帮用户解决安全问题自己从用户电脑上收集回来的样本

(3)有些公司会有一些安全论坛,用户也会上传一些样本到论坛上,定期去查看分析

(4)如果公司有VT帐号,可以从VT上去下载相关的样本

(5)可以从内部的一些监控系统爬虫系统中找到新的样本或变种样本


如果没有客户端产品,一般都是从客户反馈收集的样本进行分析处理,或者从一些开源的样本下载网站,以及与其它公司购买交换而来

如果你不在安全公司工作,可以从以下几个渠道获取:

(1)国外样本分享网站,如:

3ecK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3y4G2L8Y4c8S2k6$3W2G2k6s2g2E0M7q4)9J5k6h3u0D9L8$3N6K6M7r3!0@1i4K6u0W2j5$3!0E0i4K6t1$3L8X3u0K6M7q4)9K6b7R3`.`.

(2)Github上去搜malware, 如:1a2K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6Y4K9i4c8Z5N6h3u0Q4x3X3g2U0L8$3#2Q4x3V1k6J5M7$3S2A6M7s2m8Q4x3V1k6S2N6$3g2K6L8$3#2W2i4K6u0V1L8h3q4D9N6$3q4J5k6g2)9J5k6r3q4F1j5h3I4&6M7$3W2K6i4K6t1$3L8X3u0K6M7q4)9K6b7W2!0q4c8W2!0n7b7#2)9^5z5q4!0q4y4q4!0n7c8q4!0m8x3q4!0q4y4g2)9^5c8W2!0m8c8W2!0q4y4q4!0n7b7W2!0m8y4g2!0q4y4W2)9^5z5g2!0n7c8g2!0q4y4g2)9^5z5q4!0n7x3q4!0q4y4g2!0n7c8g2)9^5z5q4!0q4y4g2!0m8y4q4)9&6b7g2!0q4y4W2)9^5x3#2!0n7x3#2!0q4z5q4!0m8y4W2)9^5x3g2!0q4y4#2)9&6b7g2)9^5y4q4!0q4c8W2!0n7b7#2)9^5z5b7`.`.

(3)加入Google Malware邮件组或一些TG组,里面会有人分享样本,如:mobilemalware@googlegroups.com

(4)关注一些国外安全研究人员的Twitter,每天都会分享很多新的变种样本 

(5)关注一些国外大的安全公司的博客,如:

3b0K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4u0W2M7$3g2S2M7X3y4Z5j5$3g2F1N6r3g2J5i4K6u0W2M7r3q4D9L8$3q4D9N6r3!0F1k6i4c8%4L8%4u0C8M7#2)9J5k6h3y4G2L8b7`.`.

4edK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6%4N6%4N6Q4x3X3g2X3K9i4u0W2k6i4W2W2i4K6u0W2j5$3!0E0i4K6u0r3j5X3I4G2k6#2)9J5k6h3S2@1L8h3H3`.

efaK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4y4&6L8h3q4F1N6r3g2U0i4K6u0W2j5$3!0E0i4K6u0r3j5$3!0F1L8X3g2U0N6q4)9J5c8X3u0D9L8$3N6K6

3e0K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6T1L8r3!0Y4i4K6u0W2K9$3q4K6M7r3g2J5M7$3E0&6i4K6u0W2j5$3!0E0

6eaK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3y4&6j5X3g2J5M7$3g2U0N6i4u0A6N6s2W2E0K9h3&6#2N6r3g2Q4x3X3g2U0L8$3#2Q4x3V1k6K6k6h3y4#2M7X3W2@1P5g2)9J5k6r3u0D9L8$3N6K6i4K6u0r3M7$3!0#2M7X3y4W2i4K6u0r3g2s2u0W2L8X3c8Q4x3V1u0y4K9h3y4J5L8#2)9J5b7V1u0D9L8$3N6Q4x3V1j5`.

这上面会定期更新一些恶意样本的分析报告,有时候会放样本,没有样本可以通过HASH自己Google去找

(6)国内一些安全论坛以及安全媒体,也会有很多人上传一些样本,如看雪,卡饭,吾爱破解,FreeBuf等

(7)国内一些安全公司的论坛,不知道还有几个在持续运营了。。。。如:360杀毒论坛,金山杀毒论坛,电脑管家论坛,瑞星杀毒论坛等

(8)如果你有钱任性,完全可以自己去买个VT帐号,里面的样本你这辈子都分析不完

下面给大家分享一些在线或开源沙箱以及一些流行样本下载链接,大部分的在线沙箱都支持下载样本,不过有些是免费的,有些需要注册,有些是收费的,有些需要积分等等

1.theZoo

17bK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6Y4K9i4c8Z5N6h3u0Q4x3X3g2U0L8$3#2Q4x3V1k6&6N6r3W2K6k6W2)9J5c8Y4c8Z5k6g2A6G2L8H3`.`.

2.contagio

e4bK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3y4G2L8Y4c8S2k6$3W2G2k6s2g2E0M7q4)9J5k6h3u0D9L8$3N6K6M7r3!0@1i4K6u0W2j5$3!0E0i4K6u0r3

The password scheme is infected666 followed by the last character before the zip extension. e.g abc.zip will have the password infected666c.

3.Hybrid Analysis

fbcK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6%4N6%4N6Q4x3X3g2Z5P5h3u0J5K9h3c8Q4x3X3c8S2L8X3q4D9P5i4y4A6M7#2)9J5k6h3y4G2L8g2)9J5c8R3`.`.

4.AVCaesar

d87K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6S2N6X3y4S2k6i4y4S2M7W2)9J5k6h3#2S2L8s2N6S2M7X3g2Q4x3X3g2D9N6g2)9J5c8R3`.`.

5.Das Malwerk

558K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6V1j5i4y4E0j5h3I4%4k6i4u0C8i4K6u0W2k6i4g2Q4x3V1j5`.

6.KernelMode.info

d76K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6%4N6%4N6Q4x3X3g2C8k6i4u0F1k6h3I4E0L8$3c8W2i4K6u0W2K9h3&6X3L8#2)9J5c8X3k6G2M7Y4g2E0i4K6u0r3N6X3W2W2N6$3k6G2M7Y4g2E0i4K6u0W2M7r3S2H3i4K6y4r3k6W2)9K6c8o6p5$3

7.MalShare

7e0K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6E0j5h3I4K6K9r3q4J5k6g2)9J5k6h3y4G2L8g2)9J5c8R3`.`.

8.VirusBay

14bK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6T1k6i4c8S2i4K6u0W2N6X3W2J5N6i4y4T1j5i4W2Q4x3X3g2A6L8#2)9J5c8R3`.`.

9.Virusign

90fK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4k6A6M7Y4g2K6K9h3N6F1i4K6u0W2j5$3!0E0i4K6u0r3

10.VirusShare

745K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6$3K9i4u0#2M7%4y4Z5j5i4u0W2i4K6u0W2j5$3!0E0i4K6u0r3

11.Malwarebytes Research Center

4c4K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6X3L8%4u0#2L8i4y4Q4x3X3g2E0j5h3I4%4j5i4u0W2j5Y4W2@1k6i4y4Q4x3X3g2U0L8$3#2Q4x3V1k6X3L8%4u0#2L8g2)9J5c8U0b7@1i4K6u0V1M7X3g2K6k6h3q4J5j5$3S2Q4x3X3c8U0k6h3&6@1k6i4u0Q4x3V1j5`.

12.Mobile Malware (Google Group)

f39K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6Y4M7X3!0#2M7s2y4Q4x3X3g2Y4L8$3!0Y4L8r3g2Q4x3X3g2U0L8$3#2Q4x3V1k6X3L8%4u0#2L8g2)9J5c8W2)9J5x3#2)9J5x3h3k6G2M7Y4g2E0i4K6u0r3L8h3!0T1K9h3I4W2L8h3q4D9N6$3q4J5k6b7`.`.

13.SARVAM

efeK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4y4S2M7Y4k6S2L8g2)9J5k6h3g2U0k6g2)9J5k6i4g2U0M7$3u0Q4x3X3g2W2k6s2g2Q4x3V1k6J5k6h3y4W2L8Y4b7`.

14.Malc0de

321K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3#2S2L8r3x3H3k6r3g2Q4x3X3g2U0L8$3#2Q4x3V1k6V1j5i4c8S2j5X3q4K6k6g2)9J5c8R3`.`.

15.VX Vault

9dfK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4k6^5N6X3q4#2L8s2c8Q4x3X3g2F1k6i4c8Q4x3V1k6h3K9i4u0A6e0r3W2K6N6q4)9J5k6i4m8Z5M7l9`.`.

16.ThreatBook

317K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6K6i4K6u0W2N6r3S2J5k6h3q4@1j5X3!0G2K9#2)9J5k6h3y4F1i4K6u0r3

17.Intezer Analyze

4aaK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6S2L8X3q4D9P5i4A6W2i4K6u0W2K9h3&6@1k6i4A6W2M7W2)9J5k6h3y4G2L8b7`.`.

18.CAPE Sandbox

9b5K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6U0j5i4m8W2i4K6u0W2j5$3!0F1N6r3g2^5N6r3W2K6i4K6u0W2j5$3!0E0i4K6u0r3

19.Joe Sandbox

c0fK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6%4N6%4N6Q4x3X3g2B7L8$3g2K6j5h3&6V1j5X3!0^5i4K6u0W2j5$3!0E0i4K6u0r3

20.AppAnyRun

cecK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6S2M7s2m8Q4x3X3g2S2L8Y4W2Q4x3X3g2J5N6h3&6Q4x3V1j5`.

21.VMRay

0deK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6%4N6%4N6Q4x3X3g2$3L8i4u0S2P5g2)9J5k6h3y4G2L8g2)9J5c8R3`.`.

22.VirusTotal

affK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6%4N6%4N6Q4x3X3g2$3K9i4u0#2M7%4c8G2N6r3q4D9i4K6u0W2j5$3!0E0

23.Linux开源沙箱

744K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6Y4K9i4c8Z5N6h3u0Q4x3X3g2U0L8$3#2Q4x3V1k6E0L8$3&6F1j5i4m8H3j5e0t1J5i4K6u0r3e0r3W2E0L8$3^5`.

24.anlyz

1b2K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6K6j5h3&6V1j5X3!0^5i4K6u0W2j5h3&6D9P5i4A6Q4x3X3g2A6L8H3`.`.

25.cryptam

088K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3y4J5P5i4m8@1j5h3#2Q4x3X3g2U0L8$3@1`.

26.cuckoo

fbfK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6U0N6h3y4C8L8$3!0K6j5h3&6V1j5X3!0^5i4K6u0W2L8%4u0Y4i4K6u0r3

27.detux

16fK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6Y4K9i4c8Z5N6h3u0Q4x3X3g2U0L8$3#2Q4x3V1k6V1k6i4c8#2P5s2y4S2L8X3c8T1L8%4S2Q4x3V1k6V1k6i4c8#2P5q4)9J5c8R3`.`.

28.drakvuf

c67K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6V1M7X3q4C8N6Y4g2X3i4K6u0W2j5$3!0E0i4K6u0r3

29.threatbook

e83K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6K6i4K6u0W2N6r3S2J5k6h3q4@1j5X3!0G2K9#2)9J5k6h3y4F1i4K6u0r3

30.firmware

82bK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3k6A6M7X3#2%4j5i4u0W2i4K6u0W2M7X3g2Q4x3V1j5`.

31.virusscan

986K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6$3K9i4u0#2M7%4y4U0j5h3&6Q4x3X3g2B7L8%4c8@1K9g2)9J5k6h3!0J5k6#2)9J5c8X3g2F1

32.malheur

192K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6Y4K9i4c8Z5N6h3u0Q4x3X3g2U0L8$3#2Q4x3V1k6J5K9h3g2U0K9#2)9J5c8X3#2S2L8r3S2W2N6i4t1`.

33.malwr

716K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6E0j5h3I4%4M7W2)9J5k6h3y4G2L8g2)9J5c8R3`.`.

Android Samples

1.Koodous

a0aK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6C8L8$3!0V1L8%4g2K6i4K6u0W2j5$3!0E0i4K6u0r3

2.AndroMalShare

271K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4y4S2L8X3c8V1M7X3!0A6k6q4)9J5k6i4S2B7N6s2g2Q4x3X3g2W2k6s2g2Q4x3X3g2U0L8W2)9K6b7e0R3H3z5o6m8Q4x3V1j5`.

3.Android-Malware(Github)

590K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6Y4K9i4c8Z5N6h3u0Q4x3X3g2U0L8$3#2Q4x3V1k6S2M7$3S2A6M7$3S2T1i4K6u0r3j5h3&6V1M7X3!0A6k6q4)9J5k6r3#2S2L8s2N6S2M7X3f1`.

4.App Sandbox

116K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6S2M7s2m8Q4x3X3g2K6L8X3c8T1L8%4S2Q4x3X3g2U0L8$3@1`.

5.AndroidMalware_2019

5abK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6Y4K9i4c8Z5N6h3u0Q4x3X3g2U0L8$3#2Q4x3V1k6K6K9K6y4H3N6s2u0W2i4K6u0r3b7h3&6V1M7X3!0A6k6p5#2S2L8s2N6S2M7X3g2Q4y4h3j5J5x3o6p5&6


OSX Samples

1.Objective-See Mac Malware

b66K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6G2j5X3A6W2j5%4c8A6N6X3g2Q4x3X3c8K6k6h3g2Q4x3X3g2U0L8$3#2Q4x3V1k6E0j5h3I4%4j5i4u0W2i4K6u0W2K9s2c8E0L8l9`.`.

2.Manwe MAC Malware Samples

62dK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6E0j5h3y4E0j5h3I4%4j5i4u0W2i4K6u0W2L8h3q4F1N6$3g2Q4x3X3g2A6L8#2)9J5c8R3`.`.

Linux Samples

1.Linux Sandbox

34eK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6D9K9h3&6#2P5q4)9J5k6h3S2#2L8Y4c8A6L8X3N6E0j5h3I4%4j5i4u0W2i4K6u0W2j5$3!0E0i4K6u0r3j5h3&6S2L8s2W2K6K9i4y4Q4x3V1j5`.

2.Detux-The Linux Sandbox

e87K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6Y4K9i4c8Z5N6h3u0Q4x3X3g2U0L8$3#2Q4x3V1k6V1k6i4c8#2P5s2y4S2L8X3c8T1L8%4S2Q4x3V1k6V1k6i4c8#2P5l9`.`.

d99K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6V1k6i4c8#2P5q4)9J5k6h3!0J5k6#2)9J5c8X3W2F1k6r3g2^5i4K6u0W2M7r3S2H3

恶意样本下载网站

7acK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6Y4K9i4c8Z5N6h3u0Q4x3X3g2U0L8$3#2Q4x3V1k6u0L8W2q4#2k6i4y4@1i4K6u0r3L8h3q4D9N6$3q4J5k6g2)9J5k6s2y4S2L8i4m8D9k6i4x3`.

以上都是个人经验总结,相关的渠道和安全论坛网站还有很多,如果对恶意样本分析感兴趣的,可以去下载这些样本进行研究,可以发现一些不一样的东西


从这些网站上下载的所有样本仅供自己研究学习之用,不要传播,严禁用于非法用途,否则后果自负!


现在大多数的安全问题都是通过恶意软件进行攻击的,如果你对恶意软件感兴趣,想研究学习各类恶意样本的分析技术,想与一些专业的安全分析师与漏洞研究专家交流,欢迎加入知识星球:安全分析与研究,分享各种安全技术:应急响应、恶意样本分析、渗透测试、漏洞研究、移动安全等


欢迎关注微信公众号:安全分析与研究,会不定期分享各种安全知识与技术,因为专注,所以专业!


安全的路很长,贵在坚持......


[培训]内核驱动高级班,冲击BAT一流互联网大厂工作,每周日13:00-18:00直播授课

收藏
免费 4
支持
分享
最新回复 (1)
雪    币: 7663
活跃值: (3699)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
2
感谢分享
2019-8-15 10:19
0
游客
登录 | 注册 方可回帖
返回