Skip to content

ActiveState/MalwareArchivist

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

16 Commits
 
 
 
 
 
 
 
 

Repository files navigation

malware-archivist (ma)

Tool to aid security researchers in dissecting malware. Often, repository maintainers will remove malicious packages entirely from their repositories in order to protect their users. This can be frustrating for security researchers who need access to malware source code for forensic analysis.

ActiveState is maintaining a mirror of many such repositories to facilitate the ActiveState Platform and has a policy of never removing source code, only marking it as unavailable. This tool allows security researchers to download the archived source code to malware ActiveState has mirrored, assuming they know the ecosystem it came from and the name of the package.

Currently, the ActiveState catalog mirrors PyPI (Python), CPAN (Perl), RubyGems (Ruby), Packagist (PHP) and maintains a list of packages for Tcl.

DISCLAIMER

This tool is provided for security researchers looking to dissect and understand malicious software. Handling the software accessed with this tool is the equivalent of chainsaw juggling - don't do it unless you REALLY know what you're doing with it. ActiveState disclaims any liability for damages incurred by using this tool or the software accessed with it.

ActiveState is providing this service as a resource for security researchers. Abuse of this tool and ActiveState's APIs are covered by the ActiveState Platform Terms of Service. Use of the platform in general is also covered by the above and our Privacy Policy.

The APIs this tool uses are under constant development. ActiveState reserves the right to modify this tool, the underlying APIs and access to them in the future.

Feedback

Feedback on this tool is welcome! Please raise issues here if there are features you'd like to see or there's malware you'd like to see that we don't have an archive of.

Prerequisites

  1. An ActiveState platform account
  2. This repo
  3. The ActiveState state tool

Download 2 and 3 directly:

sh <(curl -q https://platform.activestate.com/dl/cli/106007066.1611950122_pdli01/install.sh) -c'state activate --default ActiveState/Malware-Archivist'

for linux/mac, or

powershell -Command "& $([scriptblock]::Create((New-Object Net.WebClient).DownloadString('https://platform.activestate.com/dl/cli/106007066.1611950122_pdli01/install.ps1'))) -c'state activate --default ActiveState/Malware-Archivist'"

for Windows

Usage

state activate
ma --ecosystem ECOSYSTEM --name NAME --version VERSION

or

state run ma --ecosystem ECOSYSTEM --name NAME --version VERSION

Where ECOSYSTEM can be one of perl, python, tcl, ruby or php

if VERSION is omitted, list the available versions

Examples

to list the available versions of ecopower:

ma --ecosystem python --name ecopower

to download ActiveState's mirrored source for ecopower 1.3:

ma --ecosystem python --name ecopower --version 1.3

Try some of these other malware python packages:

  • are
  • aryi
  • hipid
  • noblesse
  • noblesse2
  • noblessev2
  • suffer

TODO

  1. Add a facility to browse the ActiveState catalog for all known malware
  2. Add mirrors for more ecosystems (NPM, Maven, LuaRocks etc.)

About

Download archived malware from ActiveState's source code mirror

Resources

License

Security policy

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages