While I understand you may have good reasons to look for specific malware samples, Bleeping Computer is not the place to ask for assistance on how to obtain them. One of the primary goals of Bleeping Computer is to assist victims of malware infection with removal and to prevent the spread of malicious programs
, not encourage them. Therefore, we will not provide links to malware samples or malicious sites where infections have been contracted and spread. Others reading this topic may use the information for nefarious purposes
or an unwitting novice user may accidentally click a link and end up infecting their own computer.
If your intention is to infect a Virtual Machine (VM)
for the purposes of testing, be aware that not all malware will work
in that environment by intention. Malware writers have been able to create malicious files which can detect if it is running in a VM. When detected as such, the malware is able to change its behavior by not running any malicious code which can infect the operating system. This is a deliberate technique to make analysis/detection more difficult for security researchers who use VMs to study infections in order to understand the attack methodology used and develop disinfection solutions.
* Threats to virtual environments
* Malware no longer avoids virtual machines