经常有人问,我想分析的恶意样本,可是这些样本要从哪儿下载呢?看到别人的分析报告,里面有IOC信息和样本MD5,我也想分析一下,但这些样本从哪里下载?简单给大家谈谈一般恶意样本可以从哪些渠道得来?
如果你身在安全公司,有客户端类的安全产品,一般从下几个渠道可以获取:
(1)一些客户端收集用户的样本,然后保存到样本TOP库,从黑灰库中找可疑样本进行分析,说不定就可以找到惊喜
(2)用户反馈的一些样本,或你帮用户解决安全问题自己从用户电脑上收集回来的样本
(3)有些公司会有一些安全论坛,用户也会上传一些样本到论坛上,定期去查看分析
(4)如果公司有VT帐号,可以从VT上去下载相关的样本
(5)可以从内部的一些监控系统爬虫系统中找到新的样本或变种样本
如果没有客户端产品,一般都是从客户反馈收集的样本进行分析处理,或者从一些开源的样本下载网站,以及与其它公司购买交换而来
如果你不在安全公司工作,可以从以下几个渠道获取:
(1)国外样本分享网站,如:
9ebK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3y4G2L8Y4c8S2k6$3W2G2k6s2g2E0M7q4)9J5k6h3u0D9L8$3N6K6M7r3!0@1i4K6u0W2j5$3!0E0i4K6t1$3L8X3u0K6M7q4)9K6b7R3`.`.
(2)Github上去搜malware, 如:c8fK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6Y4K9i4c8Z5N6h3u0Q4x3X3g2U0L8$3#2Q4x3V1k6J5M7$3S2A6M7s2m8Q4x3V1k6S2N6$3g2K6L8$3#2W2i4K6u0V1L8h3q4D9N6$3q4J5k6g2)9J5k6r3q4F1j5h3I4&6M7$3W2K6i4K6t1$3L8X3u0K6M7q4)9K6b7W2!0q4c8W2!0n7b7#2)9^5z5q4!0q4y4q4!0n7c8q4!0m8x3q4!0q4y4g2)9^5c8W2!0m8c8W2!0q4y4q4!0n7b7W2!0m8y4g2!0q4y4W2)9^5z5g2!0n7c8g2!0q4y4g2)9^5z5q4!0n7x3q4!0q4y4g2!0n7c8g2)9^5z5q4!0q4y4g2!0m8y4q4)9&6b7g2!0q4y4W2)9^5x3#2!0n7x3#2!0q4z5q4!0m8y4W2)9^5x3g2!0q4y4#2)9&6b7g2)9^5y4q4!0q4c8W2!0n7b7#2)9^5z5b7`.`.
(3)加入Google Malware邮件组或一些TG组,里面会有人分享样本,如:mobilemalware@googlegroups.com
(4)关注一些国外安全研究人员的Twitter,每天都会分享很多新的变种样本
(5)关注一些国外大的安全公司的博客,如:
729K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4u0W2M7$3g2S2M7X3y4Z5j5$3g2F1N6r3g2J5i4K6u0W2M7r3q4D9L8$3q4D9N6r3!0F1k6i4c8%4L8%4u0C8M7#2)9J5k6h3y4G2L8b7`.`.
a4fK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6%4N6%4N6Q4x3X3g2X3K9i4u0W2k6i4W2W2i4K6u0W2j5$3!0E0i4K6u0r3j5X3I4G2k6#2)9J5k6h3S2@1L8h3H3`.
600K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4y4&6L8h3q4F1N6r3g2U0i4K6u0W2j5$3!0E0i4K6u0r3j5$3!0F1L8X3g2U0N6q4)9J5c8X3u0D9L8$3N6K6
b9bK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6T1L8r3!0Y4i4K6u0W2K9$3q4K6M7r3g2J5M7$3E0&6i4K6u0W2j5$3!0E0
2fdK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3y4&6j5X3g2J5M7$3g2U0N6i4u0A6N6s2W2E0K9h3&6#2N6r3g2Q4x3X3g2U0L8$3#2Q4x3V1k6K6k6h3y4#2M7X3W2@1P5g2)9J5k6r3u0D9L8$3N6K6i4K6u0r3M7$3!0#2M7X3y4W2i4K6u0r3g2s2u0W2L8X3c8Q4x3V1u0y4K9h3y4J5L8#2)9J5b7V1u0D9L8$3N6Q4x3V1j5`.
这上面会定期更新一些恶意样本的分析报告,有时候会放样本,没有样本可以通过HASH自己Google去找
(6)国内一些安全论坛以及安全媒体,也会有很多人上传一些样本,如看雪,卡饭,吾爱破解,FreeBuf等
(7)国内一些安全公司的论坛,不知道还有几个在持续运营了。。。。如:360杀毒论坛,金山杀毒论坛,电脑管家论坛,瑞星杀毒论坛等
(8)如果你有钱任性,完全可以自己去买个VT帐号,里面的样本你这辈子都分析不完
下面给大家分享一些在线或开源沙箱以及一些流行样本下载链接,大部分的在线沙箱都支持下载样本,不过有些是免费的,有些需要注册,有些是收费的,有些需要积分等等
1.theZoo
482K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6Y4K9i4c8Z5N6h3u0Q4x3X3g2U0L8$3#2Q4x3V1k6&6N6r3W2K6k6W2)9J5c8Y4c8Z5k6g2A6G2L8H3`.`.
2.contagio
fb4K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3y4G2L8Y4c8S2k6$3W2G2k6s2g2E0M7q4)9J5k6h3u0D9L8$3N6K6M7r3!0@1i4K6u0W2j5$3!0E0i4K6u0r3
The password scheme is infected666 followed by the last character before the zip extension. e.g abc.zip will have the password infected666c.
3.Hybrid Analysis
db8K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6%4N6%4N6Q4x3X3g2Z5P5h3u0J5K9h3c8Q4x3X3c8S2L8X3q4D9P5i4y4A6M7#2)9J5k6h3y4G2L8g2)9J5c8R3`.`.
4.AVCaesar
cceK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6S2N6X3y4S2k6i4y4S2M7W2)9J5k6h3#2S2L8s2N6S2M7X3g2Q4x3X3g2D9N6g2)9J5c8R3`.`.
5.Das Malwerk
660K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6V1j5i4y4E0j5h3I4%4k6i4u0C8i4K6u0W2k6i4g2Q4x3V1j5`.
6.KernelMode.info
17dK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6%4N6%4N6Q4x3X3g2C8k6i4u0F1k6h3I4E0L8$3c8W2i4K6u0W2K9h3&6X3L8#2)9J5c8X3k6G2M7Y4g2E0i4K6u0r3N6X3W2W2N6$3k6G2M7Y4g2E0i4K6u0W2M7r3S2H3i4K6y4r3k6W2)9K6c8o6p5$3
7.MalShare
3f2K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6E0j5h3I4K6K9r3q4J5k6g2)9J5k6h3y4G2L8g2)9J5c8R3`.`.
8.VirusBay
effK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6T1k6i4c8S2i4K6u0W2N6X3W2J5N6i4y4T1j5i4W2Q4x3X3g2A6L8#2)9J5c8R3`.`.
9.Virusign
897K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4k6A6M7Y4g2K6K9h3N6F1i4K6u0W2j5$3!0E0i4K6u0r3
10.VirusShare
559K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6$3K9i4u0#2M7%4y4Z5j5i4u0W2i4K6u0W2j5$3!0E0i4K6u0r3
11.Malwarebytes Research Center
0cfK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6X3L8%4u0#2L8i4y4Q4x3X3g2E0j5h3I4%4j5i4u0W2j5Y4W2@1k6i4y4Q4x3X3g2U0L8$3#2Q4x3V1k6X3L8%4u0#2L8g2)9J5c8U0b7@1i4K6u0V1M7X3g2K6k6h3q4J5j5$3S2Q4x3X3c8U0k6h3&6@1k6i4u0Q4x3V1j5`.
12.Mobile Malware (Google Group)
11eK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6Y4M7X3!0#2M7s2y4Q4x3X3g2Y4L8$3!0Y4L8r3g2Q4x3X3g2U0L8$3#2Q4x3V1k6X3L8%4u0#2L8g2)9J5c8W2)9J5x3#2)9J5x3h3k6G2M7Y4g2E0i4K6u0r3L8h3!0T1K9h3I4W2L8h3q4D9N6$3q4J5k6b7`.`.
13.SARVAM
564K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4y4S2M7Y4k6S2L8g2)9J5k6h3g2U0k6g2)9J5k6i4g2U0M7$3u0Q4x3X3g2W2k6s2g2Q4x3V1k6J5k6h3y4W2L8Y4b7`.
14.Malc0de
f1eK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3#2S2L8r3x3H3k6r3g2Q4x3X3g2U0L8$3#2Q4x3V1k6V1j5i4c8S2j5X3q4K6k6g2)9J5c8R3`.`.
15.VX Vault
ef3K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4k6^5N6X3q4#2L8s2c8Q4x3X3g2F1k6i4c8Q4x3V1k6h3K9i4u0A6e0r3W2K6N6q4)9J5k6i4m8Z5M7l9`.`.
16.ThreatBook
19aK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6K6i4K6u0W2N6r3S2J5k6h3q4@1j5X3!0G2K9#2)9J5k6h3y4F1i4K6u0r3
17.Intezer Analyze
86fK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6S2L8X3q4D9P5i4A6W2i4K6u0W2K9h3&6@1k6i4A6W2M7W2)9J5k6h3y4G2L8b7`.`.
18.CAPE Sandbox
b32K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6U0j5i4m8W2i4K6u0W2j5$3!0F1N6r3g2^5N6r3W2K6i4K6u0W2j5$3!0E0i4K6u0r3
19.Joe Sandbox
aa0K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6%4N6%4N6Q4x3X3g2B7L8$3g2K6j5h3&6V1j5X3!0^5i4K6u0W2j5$3!0E0i4K6u0r3
20.AppAnyRun
514K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6S2M7s2m8Q4x3X3g2S2L8Y4W2Q4x3X3g2J5N6h3&6Q4x3V1j5`.
21.VMRay
497K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6%4N6%4N6Q4x3X3g2$3L8i4u0S2P5g2)9J5k6h3y4G2L8g2)9J5c8R3`.`.
22.VirusTotal
edfK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6%4N6%4N6Q4x3X3g2$3K9i4u0#2M7%4c8G2N6r3q4D9i4K6u0W2j5$3!0E0
23.Linux开源沙箱
30aK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6Y4K9i4c8Z5N6h3u0Q4x3X3g2U0L8$3#2Q4x3V1k6E0L8$3&6F1j5i4m8H3j5e0t1J5i4K6u0r3e0r3W2E0L8$3^5`.
24.anlyz
55fK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6K6j5h3&6V1j5X3!0^5i4K6u0W2j5h3&6D9P5i4A6Q4x3X3g2A6L8H3`.`.
25.cryptam
523K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3y4J5P5i4m8@1j5h3#2Q4x3X3g2U0L8$3@1`.
26.cuckoo
c4cK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6U0N6h3y4C8L8$3!0K6j5h3&6V1j5X3!0^5i4K6u0W2L8%4u0Y4i4K6u0r3
27.detux
87aK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6Y4K9i4c8Z5N6h3u0Q4x3X3g2U0L8$3#2Q4x3V1k6V1k6i4c8#2P5s2y4S2L8X3c8T1L8%4S2Q4x3V1k6V1k6i4c8#2P5q4)9J5c8R3`.`.
28.drakvuf
20fK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6V1M7X3q4C8N6Y4g2X3i4K6u0W2j5$3!0E0i4K6u0r3
29.threatbook
e1fK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6K6i4K6u0W2N6r3S2J5k6h3q4@1j5X3!0G2K9#2)9J5k6h3y4F1i4K6u0r3
30.firmware
f8bK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3k6A6M7X3#2%4j5i4u0W2i4K6u0W2M7X3g2Q4x3V1j5`.
31.virusscan
ed7K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6$3K9i4u0#2M7%4y4U0j5h3&6Q4x3X3g2B7L8%4c8@1K9g2)9J5k6h3!0J5k6#2)9J5c8X3g2F1
32.malheur
56cK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6Y4K9i4c8Z5N6h3u0Q4x3X3g2U0L8$3#2Q4x3V1k6J5K9h3g2U0K9#2)9J5c8X3#2S2L8r3S2W2N6i4t1`.
33.malwr
a06K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6E0j5h3I4%4M7W2)9J5k6h3y4G2L8g2)9J5c8R3`.`.
Android Samples
1.Koodous
dacK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6C8L8$3!0V1L8%4g2K6i4K6u0W2j5$3!0E0i4K6u0r3
2.AndroMalShare
461K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4y4S2L8X3c8V1M7X3!0A6k6q4)9J5k6i4S2B7N6s2g2Q4x3X3g2W2k6s2g2Q4x3X3g2U0L8W2)9K6b7e0R3H3z5o6m8Q4x3V1j5`.
3.Android-Malware(Github)
e88K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6Y4K9i4c8Z5N6h3u0Q4x3X3g2U0L8$3#2Q4x3V1k6S2M7$3S2A6M7$3S2T1i4K6u0r3j5h3&6V1M7X3!0A6k6q4)9J5k6r3#2S2L8s2N6S2M7X3f1`.
4.App Sandbox
df8K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6S2M7s2m8Q4x3X3g2K6L8X3c8T1L8%4S2Q4x3X3g2U0L8$3@1`.
5.AndroidMalware_2019
f8eK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6Y4K9i4c8Z5N6h3u0Q4x3X3g2U0L8$3#2Q4x3V1k6K6K9K6y4H3N6s2u0W2i4K6u0r3b7h3&6V1M7X3!0A6k6p5#2S2L8s2N6S2M7X3g2Q4y4h3j5J5x3o6p5&6
OSX Samples
1.Objective-See Mac Malware
469K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6G2j5X3A6W2j5%4c8A6N6X3g2Q4x3X3c8K6k6h3g2Q4x3X3g2U0L8$3#2Q4x3V1k6E0j5h3I4%4j5i4u0W2i4K6u0W2K9s2c8E0L8l9`.`.
2.Manwe MAC Malware Samples
100K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6E0j5h3y4E0j5h3I4%4j5i4u0W2i4K6u0W2L8h3q4F1N6$3g2Q4x3X3g2A6L8#2)9J5c8R3`.`.
Linux Samples
1.Linux Sandbox
c1bK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6D9K9h3&6#2P5q4)9J5k6h3S2#2L8Y4c8A6L8X3N6E0j5h3I4%4j5i4u0W2i4K6u0W2j5$3!0E0i4K6u0r3j5h3&6S2L8s2W2K6K9i4y4Q4x3V1j5`.
2.Detux-The Linux Sandbox
18bK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6Y4K9i4c8Z5N6h3u0Q4x3X3g2U0L8$3#2Q4x3V1k6V1k6i4c8#2P5s2y4S2L8X3c8T1L8%4S2Q4x3V1k6V1k6i4c8#2P5l9`.`.
aa7K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6V1k6i4c8#2P5q4)9J5k6h3!0J5k6#2)9J5c8X3W2F1k6r3g2^5i4K6u0W2M7r3S2H3
恶意样本下载网站
5e7K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6Y4K9i4c8Z5N6h3u0Q4x3X3g2U0L8$3#2Q4x3V1k6u0L8W2q4#2k6i4y4@1i4K6u0r3L8h3q4D9N6$3q4J5k6g2)9J5k6s2y4S2L8i4m8D9k6i4x3`.
以上都是个人经验总结,相关的渠道和安全论坛网站还有很多,如果对恶意样本分析感兴趣的,可以去下载这些样本进行研究,可以发现一些不一样的东西
从这些网站上下载的所有样本仅供自己研究学习之用,不要传播,严禁用于非法用途,否则后果自负!
现在大多数的安全问题都是通过恶意软件进行攻击的,如果你对恶意软件感兴趣,想研究学习各类恶意样本的分析技术,想与一些专业的安全分析师与漏洞研究专家交流,欢迎加入知识星球:安全分析与研究,分享各种安全技术:应急响应、恶意样本分析、渗透测试、漏洞研究、移动安全等

欢迎关注微信公众号:安全分析与研究,会不定期分享各种安全知识与技术,因为专注,所以专业!

安全的路很长,贵在坚持......
[培训]科锐逆向工程师培训第53期2025年7月8日开班!