Author Topic: Honeypot malware archives  (Read 26883 times)

0 Members and 1 Guest are viewing this topic.

February 18, 2013, 03:02:33 pm
Read 26883 times

mc

  • Newbie

  • Offline
  • *

  • 1
Hello everyone,

I would like share with you for educational purposes and without any commercial purpose, data collected by the my homemade honeypot. Nothing new, nothing shocking, nothing sensational... but I think can be of interest to newcomers to the world of analysis of malware, botnets, etc... maybe for a thesis.

The files collected (http://www.nothink.org/honeypots/malware-archives/) are divided into zip archives, in alphabetical order, with password (which must be request via email). Some details:

- Honeypot ISP: AS3269 Interbusiness (Telecom Italia)
- Honeypot software: amun, dionaea
- Total files: 7085
- Period of time: Aug 2009 - Feb 2013
- Type of files: ASCII, data, HTML, MS-DOS, PE32 (dll, gui, Mono/.Net)

More information can be viewed here: http://www.nothink.org/honeypots.php
Always from this page, daily, some logs are available for download, parsabili easily and used for statistical purposes.

Cheers,
Matteo Cantoni