Disclaimer:
The malware samples and associated content provided on this website are for academic, educational, and research purposes only. The use of these materials is strictly limited to individuals who understand the potential risks and consequences associated with handling, analyzing, and interacting with malware.
By accessing, downloading, or using any of the malware samples or associated content on this website, you agree that you are doing so at your own risk and solely for educational or research purposes. You acknowledge that the materials provided may be harmful or cause damage to computer systems, networks, or data, and you agree to take all necessary precautions to prevent unauthorized or unintended use or distribution.
The owner and operator of this website shall not be held liable for any damages, losses, or consequences, whether direct or indirect, resulting from the access, download, use, or distribution of the malware samples or associated content provided on this website.
By using this website, you also agree to comply with all applicable laws, regulations, and ethical guidelines governing the use, handling, and distribution of malware samples.
If you do not agree to these terms, you are not authorized to access, download, or use any of the materials provided on this website.
For more information on responsible handling and analysis of malware samples, please visit our security research blog at https://burningmalware.com.
To obtain the password required for downloading the files, please join the Discord and ask for it.
- malware
- APT34
- Alina
- Android.CEREBRUS
- Android.Dendriod
- Android.Dendroid.B
- Andromeda
- AryanRAT_March2010
- AsyncRAT
- Athena
- BlackDream
- BshadesFusion
- Carberp
- CyberBotv2.2_October2006
- DBotv3.1_March2007
- Dendroid
- Dexter
- Dokan_Dec2008
- DopeBot.A_Dec2004
- DopeBot.B_Dec2004
- DopeBotv0.22_CrippledFeb2007
- DopeBotv0.22_UnCrippled_Feb2007
- EngRat
- ExploitKit.0x88
- ExploitKit.BlackHole.100
- ExploitKit.BlackHole.102
- ExploitKit.BleedingLife.2
- ExploitKit.CrimePack.3.1.3
- ExploitKit.DemonHunter
- ExploitKit.Eleonore.1.4.4
- ExploitKit.Fragus
- ExploitKit.Phoenix.2.5
- ExploitKit.RIG
- ExploitKit.Sakura
- ExploitKit.Sava
- Grum
- HellBotv3.0_10June2005
- IoT.Mirai
- KINS_Dec2011
- LiquidBot_May2005
- LoexBot1.3_Sep2008
- Mazar
- Miner
- NBot_July2008
- NjRAT_0.7d
- NullBot_Dec2006
- PlasmaHTTP
- PowerLoader
- Ransomware.Jigsaw
- Rovnix
- Rubilyn
- ShadowBot_Sep2008
- ShadowBotv3_March2007
- SpazBot2.12_June2007
- TinyBanker_Jan2012
- Trojan.Downloader
- VBS.Win32.Vabian
- W32.MyDoom.A
- WIN32.ZombieBoy
- WannaCry
- Win32.APT34.PoisionFrog
- Win32.AgentTesla
- Win32.BlackWorm
- Win32.Carbanak
- Win32.DiamondRAT
- Win32.LoexBot1.3
- Win32.LokiRAT
- Win32.LuxNET
- Win32.MCRYPT
- Win32.MiniPig_Nov2006
- Win32.Mirai
- Win32.Mirai.2016
- Win32.MuddyWaterC
- Win32.NinjaBot
- Win32.Pegasus
- Win32.QuasarRAT
- Win32.Remhead
- Win32.ShadowTech
- Win32.TinyBanker
- Win32.Zeus.b
- Win32.litehttp
- Win32.njRAT
- Win32.ogw0rm_Nov2008
- Win9x.LegacyASM
- X0R-USB_Jan2009
- XtremeRAT_March2009
- ZIB_Trojan
- Zemra
- ZeuS2.0.8.9_Feb2013
- ZunkerBot1.4.5_Sep2007
- andr0id_l0cker
- bashlite
- conti_locker
- gen2
- hajime
- 020f1fa6072108c79ed6f553f4f8b08e157bf17f9c260a76353300230fed09f0
- 5eddb0f1bfdbc44e516a4255ab433bc264a1f6981c6824fc64b42d6244f7416d
- 94a2a7aa7730724810b14ba9809c53fcfd3df4052f189785248142e6aa802c47
- a04ac6d98ad989312783d4fe3456c53730b212c79a426fb215708b6c6daa3de3
- a4da5369ac5e666244fbbb9f5de7485cff11284cd9baf580af6e5ca3e429e905
- d5601202dff3017db238145ff21857415f663031aca9b3d534bec8991b12179a
- da5b0fe790e5d93bd88062356d0a87ddfbd6dd697e4a749cf9b3c5e35caf5899
- ircbot
- 049274e133e6b8d900d7aba3b2647458efce216a6e70b3ac58892d8014d198f9
- 192a3cd438da2a0149bb40c229aac373d164a97587609bda3ab3ab799a82876e
- 60f720d2faea7ee35ff0696ca0968618ca0d200260215036e48a12b9ec47da50
- bdceb65a09c4c61e4fdad4e7122819f25d9a28c17aeaa96e2c0af57a2fad025b
- c178d6c641f0e5d7d664f0d9182cc3c20b920043cfc03110aab7cba1367c1c31
- ed10637d28a65897c6408131634843256c94de3b525948904702e7515182f830
- medusa
- mirai
- 024b96bc4e84e152ad0f6dd0010987bc986691268ce01a2ec11a4edbd3e0bd9c
- 0bd0bd026dadccf1c4c2bc052229cc52c688a1e3ef7ca50bdb414f58cf7b7be2
- 59d3345daff789fe5522b9cf5d7b1530efa227fe679ad8e0282403598423f237
- 7443b3707c9db0c5ed6c8acef9d60128932c8e3f3f7bdeed1d2bba4598013f81
- 746a154e5586816d0c3c63a84a7974135135b0b6b54f452018a20ad43fe11835
- 77a2c317ca9d43acc056cf8217a8c838d23af63965b33dc931877360d5919b8d
- 802a7ac3788bfe6dbfa473743aa846353b005c2dc5e6354ebd79482558aff5c4
- 8d109d29de4572b30e3ac1941b705098bdd8c73a8b87aeb5ecc2f03115cb9ec7
- aa13166a6b5409c7b08fa1e5b593e48eb92027ce23efb51f26a33751ecf32a45
- da4a2a8c5a33fc5ccf2109a534dbcc0ebbd929b783e28eaa9be78375bf921e63
- e62267f76958fdac6189aad454e9302fe60c7b29578869ff96d5d982cf0c6321
- rBot0.3.3_May2004
- v0lk
- vbBot_Jan2007
- xTBot0.0.2_2Feb2002
- xorddos
- misc