wutwutwat
25 days ago
So let me get this straight. The malware source code was uploaded to github for people to view, but it's all in zip and 7z files, requiring you to download and execute the files in order to see their contents. 7z itself just had a RCE cve last week, and who would ever download malware files and unzip them trying to view the source code. This repo is not something to be trusted in its current state
https://github.com/vxunderground/MalwareSourceCode/tree/main...
somat
25 days ago
When your threat model includes distrust of your tools, you can run your tools in a vm then exfiltrate the files from there. perhaps even fingerprint the whole vm to analyze if there were shenanigans afoot in the archive. If your threat model also includes distrust of your vm, which is reasonable, vm's are not the security panacea some try to sell them as. Then yeah, stay away from it. or start investing in throwaway one use machines and depend on the network isolation keeping you safe.