Blogspot - contagiodump.blogspot.com - contagio
General Information:
Latest News:
DeepEnd Research: List of malware pcaps, samples, and indicators for the Library of Malware Traffic Patterns 9 Aug 2013 | 07:36 pm
The library of malware traffic patterns have been popular. We found it very useful as well ourselves and we encourage you to send your contributions. I know at some point the spreadsheet will become u...
Defcon 21 Archives Speaker Materials 7 Aug 2013 | 09:43 pm
Hope it is not a copyright violation and won't cause too much hate. I know Defcon will post better and complete data soon but many / most attendees did not receive the presentation CDs to their great ...
DeepEnd Research: Under this rock... Vulnerable Wordpress/Joomla sites... Overview of the RFI botnet malware arsenal 1 Jun 2013 | 10:19 am
Exploits directed at Wordpress and/or Joomla content management systems(CMS) have been increasing at a dramatic rate over the past year. Internet blogs and forums are flooded with posts about hacked C...
DeepEnd Research - Library of Malware Traffic Patterns 29 Apr 2013 | 10:17 am
Traffic analysis has been the primary method of malware identification and thousands of IDS signatures developed are the daily proof. Signatures definitely help but ability to visually recognize malw...
CVE-2013-0640 samples listing 25 Apr 2013 | 06:03 am
This is a detailed MD5 listing of CVE-2013-0640 pdf files that were posted earlier. I got a few requests for samples that were already posted as a pack in this post ( 16,800 clean and 11,960 malicious...
Collection of Pcap files from malware analysis 22 Apr 2013 | 05:39 pm
I did some spring cleaning yesterday and came up with these malware and exploit pcaps. Such pcaps are very useful for IDS and signature testing and development, general education, and malware identifi...
CVE-2013-0804 Novell GroupWise 2012 Multiple Untrusted Pointer Dereferences Exploitation by Brian Mariani & Frédéric Bourla 17 Apr 2013 | 09:55 am
This is another excellent publication by Brian Mariani & Frédéric Bourla (High Tech Bridge) describing their discovery and research of CVE-2013-0804 Novell GroupWise 2012 Multiple Untrusted Pointer D...
16,800 clean and 11,960 malicious files for signature testing and research. 25 Mar 2013 | 05:06 am
Signature and security product testing often requires large numbers of sorted malicious and clean files to eliminate false positives and negatives. They are not always easy to find, but here are some ...
DarkSeoul - Jokra - MBR wiper samples 21 Mar 2013 | 09:21 am
If all you needed for happiness is to destroy a few virtual machines, here are the samples for today's headline maker. The malware overwrites master boot record (MBR) as described here: * Trojan.Jokra...
Mandiant APT1 samples categorized by malware families 4 Mar 2013 | 10:23 pm
These are the samples described in the Mandiant Report APT1, in the Indicators of Compromise (IOCs). Each file is named according to the malware family, so you can run your own detection and signature...