Jump to content

Recommended Posts

Ok. I get that it's going to take some time to get Malware Hunter status and access to samples. That's cool, I am patient. Anyway, in the meantime, I want to finish getting my virtual tank ready for malware observation. So far, I only have software to detect registry changes, not actively running commands or file system changes.

I want to start catching wild samples and doing my own analysis of them, and of course submit to Research Center. I'm somewhat advanced with technology, but new at malware examination. Any tips or advice?

Link to post
Share on other sites

Already got a few links to get some samples from. I now have an app at my disposal to reverse win code to binary...but I'm somewhat lost on what actually is being shown, and have no way of telling if a malware is "packed". Any advice on that? Also looking for a good file system monitor, that can detect changes.

Thanks in advance,

Wanna-be-RAV-Hunter

Link to post
Share on other sites

Hi -

I am sorry to inform you that Malwarebytes will not release any malware for private use -

The malware hunters group on this site only report on infections that are caught 'in the wild' and not from supplied information -

Any P2P site will infect you soon enough, if you are that desperate for samples -

Thank You -

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.