Hello Pedro and welcome to Bleeping Computer.
One of the primary goals of Bleeping Computer is to assist victims of malware infection with removal and to prevent the spread of malicious programs
, not encourage them. Therefore, we will not provide links to malware samples or malicious sites where infections have been contracted and spread. Others reading this topic may use the information for nefarious purposes
or an unwitting novice user may accidentally click a link and end up infecting their own computer.
Bleeping Computer's main mission is to help people rid their computers of malware not infect them. For legal and liability purposes we do not endorse or permit the sharing of malware samples via the forums. There are plenty of 'in the wild' samples available by using unsafe browsing tactics.
The main goal of BleepingComputer is to help users resolve various computer problems, not to distribute malware samples for whatever purpose. Requesting and/or providing links to live malware or live malware samples does not fall under that objective and is for that reason not something we allow or encourage.
Warez and crack sites are a good source and should only be used from a virtual machine. That's the best information and most specific information we can provide.
For those and other obvious reasons, we are not going to provide more specific information in a public forum. There are a number of sites specialized in malware samples where questions like yours can be asked. You can perform a simple Google search to find them or even search on "how to infect my computer on purpose
" which will provide information such as these articles.
You can also read this topic
which explains the most common ways malware (ransomware) is contracted, spread and identifies the types of sites where you can easily get infected by not following the advice provided to protect yourself.
While I understand you may have good reasons to look for specific malware samples, Bleeping Computer is not the place to ask for assistance on how to obtain them.
BTW...if your intention is to infect a Virtual Machine (VM)
for the purposes of testing, be aware that not all malware will work
in that environment by intention. Malware writers have been able to create malicious files which can detect if it is running in a VM. When detected as such, the malware is able to change its behavior by not running any malicious code which can infect the operating system. This is a deliberate technique to make analysis/detection more difficult for security researchers who use VMs to study infections in order to understand the attack methodology used and develop disinfection solutions. So just because you test a program in a VM and it does not behave maliciously...that does not necessarily mean it is not malicious.
The BC Staff