Skip to content

Malware samples downloaded from URLs referenced in HoneyDB data.

Notifications You must be signed in to change notification settings

foospidy/honeydb-malware-downloads

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

37 Commits
 
 
 
 
 
 
 
 

Repository files navigation

honeydb-malware-downloads

Malware samples downloaded from URLs referenced in HoneyDB data.

What is this

This repository contains files downloaded from URLs that were found in honeypot data from the HoneyDB network of honeypots.

This repository will be updated with the latest finds frequently. Eventually the process for updating this repository will be fully automated, in which case the it will be updated regularly. If you are intersted in tracking this data you should watch this repository so you will be notified when commits are made.

WARNING: The scripts and binaries in this repository are malicious! Do not execute any scripts or binaries unless you know what you are doing!

How to interpret the data

Each directory name is an MD5 hash of the URL. Within each directory, you will find the URL and the downloaded malware sample. However, in many cases, at the time of retrieval the URL was no longer valid (e.g. 404 or server offline). In these cases, you will find the details of why the retrieval failed.

The file name of retrieved malware samples will be the URL hash value. Listing of possible files:

  • url.txt - file containing the URL.
  • <URL_HASH> - malware sample file.
  • file.txt - file containing the MD5 hash of the malware sample file.
  • type.txt - description of file type (output of file command).
  • fail.txt - file containing the reason why retreival failed (curl command output).
  • 4XX.txt or 5XX.txt - file containing the output of server error codes.
  • README.md - summary of directory contents.

How to quickly find URLs and malware files

Once you clone or download this repository, the following commands may be helpful.

List all URLs:

cat downloads/*/url.txt

List hashes of all malware sample files:

cat downloads/*/file.txt

List all URLs with malware sample file hashes:

for urlhash in $(ls downloads/);
do
    if [ -f downloads/$urlhash/$urlhash ];
    then
        echo $urlhash;
        echo "- $(cat downloads/$urlhash/url.txt)";
        echo "- $(cat downloads/$urlhash/file.txt)";
    fi
done;

Encrypted binaries

All binary files are compressed/encrypted with the password honeydb.

About

Malware samples downloaded from URLs referenced in HoneyDB data.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages