Submit Malware Samples
Help us improve our malware analysis and contribute to Digital Forensics, Cyber Security and Fun.
⚠️ Important Warning
Only submit actual malware samples for legitimate research purposes. Do NOT submit personal files, false positives, or files you don't have permission to share.
Submission Guidelines
Package Safely
Compress the malware in a password-protected archive (ZIP or 7z).
Use the password: infected
Include Details
Provide information about where you found the sample, its behavior, and any relevant context
Stay Safe
Never execute malware on your primary system. Use isolated virtual machines or sandboxed environments
Verify Hash
Include the SHA256 hash of the sample to help us verify integrity and check against known samples
How to Submit
📧 Email Submission
Send your password-protected archive to:
practical4n6@gmail.com Subject Line Format: [Malware Submission] - Brief Description
☁️ Cloud Upload
For large files (>25MB), upload to a secure cloud service (Google Drive, Dropbox, WeTransfer) and send us the link
What to Include in Your Submission
- ✓ Password-protected archive containing the malware sample
- ✓ SHA256 hash of the original file
- ✓ Source/origin of the sample (URL, email, etc.)
- ✓ Date discovered
- ✓ Any observed behavior or symptoms
- ✓ Your contact information (optional, for follow-up)
- ✓ Any additional context or notes
Example Submission Email
Subject: [Malware Submission] - Suspicious JavaScript Downloader
Hello,
I'm submitting a malware sample for analysis.
Details:
- Sample Name: suspicious_script.js
- SHA256: a1b2c3d4e5f6...
- Source: Phishing email received on 2025-01-15
- Behavior: Attempts to download additional payload
- Archive Password: infected
Attached: malware_sample.zip (password: infected)
Best regards,
[Your Name]
Frequently Asked Questions
Will you share my personal information?
No. We respect your privacy. Any contact information you provide is used solely for follow-up purposes and is never shared.
What happens to submitted samples?
Samples are analyzed in isolated environments and may be shared with trusted security research communities to improve malware detection.
Do you provide analysis reports?
While we may not provide detailed reports for every submission, interesting findings may be featured in our blog posts (anonymized).
📊 Track Analysis Progress
Want to see what we're currently working on? Check out our tracking board to monitor the progress of all submitted samples through our analysis pipeline.
View Tracking Board →