Estos resultados han sido (parcialmente) financiados por la Cátedra Internacional UMA 2023, la cual forma parte del Programa Global de Innovación en Seguridad para la promoción de Cátedras de Ciberseguridad en España financiado por la Unión Europea Fondos NextGeneration-EU, a través del Instituto Nacional de Ciberseguridad (INCIBE).
This repository serves as a comprehensive malware analysis framework that combines automated orchestration, hybrid analysis (static and dynamic), and systematic malware categorization. It contains real malware samples organized by families to facilitate cybersecurity research, threat intelligence, and malware behavior analysis using honeypot-collected specimens.
The project provides an end-to-end automated workflow for malware analysis, from sample acquisition through honeypot deployment to detailed forensic examination in isolated virtual environments.
The repository is organized into 8 major malware categories, containing 65+ malware families with real-world samples:
- Adwares/ (10 families): Adload, Auslogics, Generic, InstalleRex, InstallUnion, Koutodoor, LoadMoney, Neoreklami, Qjwmonkey, Techsnab
- Botnet/ (5 families): Amadey, IRCbot, Lu0Bot, OriginBotnet, Quakbot
- Gusanos/ (Worms, 4 families): Blaster, Magistr, MyDoom, Phorpiex, Sasser
- Keyloggers/ (5 families): a310Logger, AgentTesla, MassLogger, SnakeKeyLogger, VIPKeyLogger
- Ransomwares/ (9 families): Akira, BQTLock, Cephalus, Chaos, GlobeImposter, INC, Medusa, Petya, Vatican
- Rootkits/ (5 families): DiskWritter, Duqu, FuRootkit, r77, ZeroAccess
- Spywares/ (9 families): DarkCloud, DarkTortilla, GCleaner, HawkEye, Loki, LummaStelear, RedLineStealer, Rhadamanthys, Vidar
- Troyanos/ (Trojans, 7 families): AsyncRAT, AtlasAgent, DarkVNC, GuLoader, IcedID, QuasarRAT, ValleyRAT
- Virus/ (7 families): AntiExe, Brain, CIH, Hopper, Jerusalem, Junkie, Melissa
Each malware family contains:
- Actual malware binary (PE executable format for Windows)
- Metadata file (
Readme.md) with SHA256/MD5 hashes and VirusTotal links
CRITICAL: This repository contains real, dangerous malware samples.
- Samples must ONLY be handled in isolated, air-gapped environments
- Recommended: Use virtual machines (FlareVM) with no internet connectivity
- ZIP password:
infected - File format: Primarily Windows PE executables (
.exe,.dll,.sys,.scr,.com,.bin) - Improper handling can result in system compromise, data loss, or network infection
The repository includes two PowerShell automation scripts that implement a complete malware analysis pipeline:
Hybrid Malware Analysis Engine
Performs comprehensive static and dynamic analysis on malware samples within a FlareVM environment:
- Hash Calculation: MD5, SHA1, SHA256
- String Extraction: FLOSS (FireEye Labs Obfuscated String Solver) for extracting obfuscated/encrypted strings
- Packer Detection: Detect It Easy (DIEC) for identifying packers, compilers, and obfuscation techniques
- Metadata Collection: OS, compiler, language detection
- Manual Analysis Support: CFF Explorer (PE resources, manifests, certificates), Ghidra/Binary Ninja (decompilation)
- Process Monitoring: Procmon captures system calls, registry modifications, file operations
- Memory Forensics: ProcDump generates memory dumps for Volatility analysis
- Network Simulation: FakeNet-NG intercepts network communications
- Traffic Capture: Tshark/Wireshark PCAP generation for network behavior analysis
- Behavioral Tracking: Complete artifact collection for post-analysis
Generates a comprehensive JSON report containing:
- Sample metadata (filename, size, hashes, acquisition timestamp)
- Environment details (FlareVM, T-Pot honeypot, network configuration)
- Static analysis results (strings count, packer signatures, compiler info)
- Dynamic analysis artifacts (Procmon logs, memory dumps, PCAPs, FakeNet logs)
- All artifacts archived in a ZIP file for transport
Configurable Parameters:
.\Analyzer.ps1 -DynamicTime 120 # Run dynamic analysis for 120 secondsAutomated Sample Processing Orchestrator
Manages the complete malware analysis lifecycle using VirtualBox automation:
- Sample Queue Management: Monitors
C:\LabShare\Malwarefor pending samples - VM State Control: Manages FlareVM via VBoxManage CLI
- Snapshot Restoration: Reverts to clean "baseline" snapshot before each analysis
- Analysis Execution: Launches
Analyzer.ps1inside the VM using VirtualBox Guest Control - Report Monitoring: Waits for analysis completion (JSON report generation)
- Cleanup: Shuts down VM, deletes processed sample, prepares for next iteration
- Loop: Continues until all samples are analyzed
$vmName = "FlareVM" # VirtualBox VM name
$snapshotName = "baseline" # Clean snapshot identifier
$shareRoot = "C:\LabShare" # Shared folder for samples/reports
$guestUser = "FlareVM" # VM guest OS username
$guestPass = "password" # VM guest OS password- Automatic VM lifecycle management (start, snapshot restore, shutdown)
- Guest OS boot detection (waits for GuestAdditions RunLevel 3)
- Report generation verification
- Timeout handling (600 seconds per sample)
- Sequential processing with state isolation
- OS: Windows with PowerShell 5.1+
- Hypervisor: Oracle VirtualBox with Guest Additions
- Storage: Shared folder configuration between host and VM
- Image: FlareVM (FLARE VM malware analysis distribution)
- Tools: FLOSS, DIEC, Procmon, ProcDump, FakeNet-NG, Wireshark/Tshark
- Network: Isolated network adapter (for controlled analysis)
- Snapshot: Clean baseline snapshot for restoration
- Platform: T-Pot (multi-honeypot platform)
- Purpose: Malware sample collection from live attacks
- Integration: Samples transferred to analysis queue
- Threat Intelligence: Build malware signature databases from real-world samples
- Behavioral Analysis: Study malware execution patterns, persistence mechanisms, C2 communications
- Detection Engineering: Develop YARA rules, SIGMA rules, and IDS signatures
- Forensic Training: Educational resource for malware analysis techniques
- Honeypot Research: Automated processing of honeypot-captured threats
- Incident Response: Rapid analysis pipeline for suspicious binaries
This framework was developed as part of a cybersecurity research project at Universidad de Málaga, focusing on:
- Automated malware analysis pipelines
- Honeypot-driven threat collection
- Hybrid analysis methodologies (static + dynamic)
- Reproducible malware research workflows
Each malware sample includes a standardized Readme.md:
# [Malware Family Name]
- **SHA256**: [64-character hash]
- **MD5**: [32-character hash]
- **VirusTotal**: https://www.virustotal.com/gui/file/[SHA256]This repository is intended exclusively for authorized cybersecurity research, education, and defensive security purposes. Unauthorized distribution, execution, or use of these samples for malicious purposes is illegal and unethical. Users assume full responsibility for compliance with local laws and regulations.