⚠️ Important Warning

Only submit actual malware samples for legitimate research purposes. Do NOT submit personal files, false positives, or files you don't have permission to share.

Submission Guidelines

📦

Package Safely

Compress the malware in a password-protected archive (ZIP or 7z). Use the password: infected

📝

Include Details

Provide information about where you found the sample, its behavior, and any relevant context

🔒

Stay Safe

Never execute malware on your primary system. Use isolated virtual machines or sandboxed environments

Verify Hash

Include the SHA256 hash of the sample to help us verify integrity and check against known samples

How to Submit

📧 Email Submission

Send your password-protected archive to:

Subject Line Format: [Malware Submission] - Brief Description

☁️ Cloud Upload

For large files (>25MB), upload to a secure cloud service (Google Drive, Dropbox, WeTransfer) and send us the link

What to Include in Your Submission

  • ✓ Password-protected archive containing the malware sample
  • ✓ SHA256 hash of the original file
  • ✓ Source/origin of the sample (URL, email, etc.)
  • ✓ Date discovered
  • ✓ Any observed behavior or symptoms
  • ✓ Your contact information (optional, for follow-up)
  • ✓ Any additional context or notes

Example Submission Email

Frequently Asked Questions

Will you share my personal information?

No. We respect your privacy. Any contact information you provide is used solely for follow-up purposes and is never shared.

What happens to submitted samples?

Samples are analyzed in isolated environments and may be shared with trusted security research communities to improve malware detection.

Do you provide analysis reports?

While we may not provide detailed reports for every submission, interesting findings may be featured in our blog posts (anonymized).

Ready to Submit?

Follow the guidelines above and send your sample to our team

Submit via Email