malware-archivist (ma)
Tool to aid security researchers in dissecting malware. Often, repository maintainers will remove malicious packages entirely from their repositories in order to protect their users. This can be frustrating for security researchers who need access to malware source code for forensic analysis.
ActiveState is maintaining a mirror of many such repositories to facilitate the ActiveState Platform and has a policy of never removing source code, only marking it as unavailable. This tool allows security researchers to download the archived source code to malware ActiveState has mirrored, assuming they know the ecosystem it came from and the name of the package.
Currently, the ActiveState catalog mirrors PyPI (Python), CPAN (Perl), RubyGems (Ruby), Packagist (PHP) and maintains a list of packages for Tcl.
DISCLAIMER
This tool is provided for security researchers looking to dissect and understand malicious software. Handling the software accessed with this tool is the equivalent of chainsaw juggling - don't do it unless you REALLY know what you're doing with it. ActiveState disclaims any liability for damages incurred by using this tool or the software accessed with it.
ActiveState is providing this service as a resource for security researchers. Abuse of this tool and ActiveState's APIs are covered by the ActiveState Platform Terms of Service. Use of the platform in general is also covered by the above and our Privacy Policy.
The APIs this tool uses are under constant development. ActiveState reserves the right to modify this tool, the underlying APIs and access to them in the future.
Feedback
Feedback on this tool is welcome! Please raise issues here if there are features you'd like to see or there's malware you'd like to see that we don't have an archive of.
Prerequisites
- An ActiveState platform account
- This repo
- The ActiveState state tool
Download 2 and 3 directly:
sh <(curl -q https://platform.activestate.com/dl/cli/106007066.1611950122_pdli01/install.sh) -c'state activate --default ActiveState/Malware-Archivist'
for linux/mac, or
powershell -Command "& $([scriptblock]::Create((New-Object Net.WebClient).DownloadString('https://platform.activestate.com/dl/cli/106007066.1611950122_pdli01/install.ps1'))) -c'state activate --default ActiveState/Malware-Archivist'"
for Windows
Usage
state activate
ma --ecosystem ECOSYSTEM --name NAME --version VERSION
or
state run ma --ecosystem ECOSYSTEM --name NAME --version VERSION
Where ECOSYSTEM can be one of perl, python, tcl, ruby or php
if VERSION is omitted, list the available versions
Examples
to list the available versions of ecopower:
ma --ecosystem python --name ecopower
to download ActiveState's mirrored source for ecopower 1.3:
ma --ecosystem python --name ecopower --version 1.3
Try some of these other malware python packages:
- are
- aryi
- hipid
- noblesse
- noblesse2
- noblessev2
- suffer
TODO
- Add a facility to browse the ActiveState catalog for all known malware
- Add mirrors for more ecosystems (NPM, Maven, LuaRocks etc.)