Submit Malware Samples
Help improve malware analysis and contribute to the DFIR community. All submissions are handled securely and anonymously.
Submission Guidelines
Package Safely
Compress in a password-protected ZIP or 7z archive. Use the password: infected
Include Details
Provide source, observed behavior, and any relevant context about the sample.
Stay Safe
Never execute malware on your primary system. Use isolated VMs or sandboxes.
Verify Hash
Include the SHA256 hash to help us verify integrity and check known samples.
How to Submit
📧 Email Submission
Send your password-protected archive to:
practical4n6@gmail.com Open Email Subject format: [Malware Submission] - Brief Description
☁️ Large Files (>25 MB)
Upload to a secure cloud service (Google Drive, Dropbox, WeTransfer) and email us the link with your submission details.
What to Include
- Password-protected archive containing the malware sample
- SHA256 hash of the original file
- Source/origin (URL, email attachment, etc.)
- Date discovered
- Observed behavior or symptoms
- Contact info (optional, for follow-up)
- Any additional context or notes
Example Submission Email
Hello,
I'm submitting a malware sample for analysis.
Details:
- Sample Name: suspicious_script.js
- SHA256: a1b2c3d4e5f6...
- Source: Phishing email received 2025-01-15
- Behavior: Attempts to download additional payload from remote host
- Archive Password: infected
Attached: malware_sample.zip (password: infected)
Best regards,
[Your Name]
FAQ
Will you share my personal information?
No. Any contact information you provide is used solely for follow-up and is never shared publicly.
What happens to submitted samples?
Samples are analyzed in isolated environments and may be shared with trusted security research communities to improve detection.
Do you provide analysis reports?
We may not report on every submission, but interesting findings may be featured in anonymized blog posts.