{"id":1926,"date":"2021-11-18T11:52:37","date_gmt":"2021-11-18T11:52:37","guid":{"rendered":"\/cybersecurity-blog\/?p=1926"},"modified":"2025-11-13T09:01:27","modified_gmt":"2025-11-13T09:01:27","slug":"free-malware-samples-reports","status":"publish","type":"post","link":"\/cybersecurity-blog\/free-malware-samples-reports\/","title":{"rendered":"How to Get Free Malware Samples and Reports"},"content":{"rendered":"\n<p>Malware hunters often look for malicious objects to investigate threat features and build protection strategies. The hindrance for striving cybersecurity specialists is to access new malicious code samples to practice on. ANY.RUN is an excellent resource that lets get any sample malware file for testing for free. In this post, we will tell you how to do it.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Where can you get malware samples?&nbsp;&nbsp;<\/h2>\n\n\n\n<p><a aria-label=\" (opens in a new tab)\" href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=in-house&amp;utm_content=free_malware_samples\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN<\/a> is an online interactive sandbox with a vast malware sample database of <strong>6,2m public submissions<\/strong>. Each registered user can make use of these tasks to rerun and analyze a sample, get reports and IOCs, and download malware for testing. Fresh samples are delivered constantly. Researchers worldwide comprise this collection and run more than <strong>14k tasks every day.&nbsp;<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh5.googleusercontent.com\/AsNt3VdAa_yZ4gc14gTWnYrBYq2gurvFoQkIP43yTdf_If9gK-9yI1SChb_YCM8LxH1qaOikCykX99WNw7NOzrFGEnJUYKlcLOYcFSyUoOCRm9CoiaHaNhJ3hUd-hO3DTbTkiMDD\" alt=\"\"\/><\/figure>\n\n\n\n<p>The \u201cPublic submissions\u201d window is where you can dive into fresh malware samples and explore malware techniques. Here you can go through all the tasks that service users upload publicly. Users of premium subscriptions have an opportunity to analyze their tasks privately. So the window above includes only public submissions that a user chose to share with the community.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How to find a specific malware sample?&nbsp;<\/h2>\n\n\n\n<p>During the research, you may need an exact malicious program. To save your time in the search, ANY.RUN service has a helpful filter system. You can navigate through&nbsp; numerous samples using the following parameters:&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. Object&nbsp;<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Hash<\/li>\n\n\n\n<li>Run type of analyzed object (URL or file)<\/li>\n\n\n\n<li>Extensions<\/li>\n\n\n\n<li>Country<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">2. Verdict<\/h3>\n\n\n\n<p>You can also filter submissions using the sample\u2019s threat level status and the verdict. There are three types of verdicts:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Malicious. Malicious activity is detected.<\/li>\n\n\n\n<li>Suspicious. Suspicious activity was detected, and there is a possibility of the file being malicious, but it isn\u2019t proven.<\/li>\n\n\n\n<li>No threats detected. ANY.RUN has detected no malicious or suspicious activity.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">3. Specified tag&nbsp;<\/h3>\n\n\n\n<p>You can find a sample by a malware name, \u200b\u200bfamily, technique, and vulnerabilities that the malicious program exploits. Read our blog post to check <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/any.run\/cybersecurity-blog\/indicators-tags\/\" target=\"_blank\">the list of tags<\/a> and get more details about them. All the trending tags are displayed on the dashboard.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/hTe1sPQ1abTYUjE30wYZbEn4te1Jl3h_PqYF7tRKbFrTYe9V-_qK1Hqsr0ubk1H3wiDvIjCl8GJeh-oxJSJ5VxUD8zsCFaMQkhuL1vUDiu9unG145tGW0JnRsVpBIBTFpELQ3Ei9\" alt=\"\"\/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">4. Context<\/h3>\n\n\n\n<p>You can type the sample\u2019s unique data like a file hash, domain, IP address, MITRE ATT&amp;CK, and Suricata SID in the context part.&nbsp;<\/p>\n\n\n\n<p>Apply one or several parameters to find a specific malware example. Try it yourself with a possibly infected IOC \u2013&nbsp;use the filter, and similar cases will be displayed.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh6.googleusercontent.com\/YuF2T50kJM6kolyMhsFDaWr-11v2hhXmYD4qYYqUcK_tct9s0EbY65IrUmrY3eOfh8oVOMh_THpGeOSBfAs6UYTiY2rt4BLRaGrwEJbugLHhV7BcFPqtRuSDevedDYVZN8b1OIog\" alt=\"\"\/><\/figure>\n\n\n\n<p>Once you find the sample you need, you see the analysis results immediately. They are shown in the visual form of a video or a screenshot slideshow.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh4.googleusercontent.com\/kgOBJrFZ6OqYTsonhdu-HnhM9GpzBBHh3gh0uKdkzvCn8bc11KZ5zKUapP9kv5IdtSHOWeBhipty5bA-PA0r-vI6vZNNp1MSEmk4iANZxq0jQwzsR_DdquVgupJTaKheXGm9K3FI\" alt=\"\"\/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">What reports can you get?&nbsp;<\/h2>\n\n\n\n<p>Different reports on our malware samples site can help you examine the malicious object.&nbsp;Here, you can download malware samples of your interest by clicking the button &#8220;Get sample&#8221;. <\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh4.googleusercontent.com\/wolIx2Sw8fgUixn9oAz7lxi4OGpNr8XZfDuF5KfX8e0gRoCt7qGUJFylyEo5nFXacaisnkznrXk07V29GysI1MjO6W7tpE4jmfWuwELUdQHQvioNwqXCaXUlA9k4oAiO61Sti9En\" alt=\"\"\/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">1. IOCs<\/h3>\n\n\n\n<p>Summary of <a aria-label=\" (opens in a new tab)\" href=\"https:\/\/any.run\/cybersecurity-blog\/indicators-of-compromise\/\" target=\"_blank\" rel=\"noreferrer noopener\">indicators of compromise<\/a>. Check out the object\u2019s hash sums, DNS requests, connections, and HTTP\/HTTPS requests. The window allows you to copy the necessary data and filter information. Icons and the number of IOCs let you run through the report and understand what you are dealing with at once.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh4.googleusercontent.com\/jsfheFDaxLprC5MVmKS3FSR6i6XIAlh-iL4b2xBFzMm2dDIyqAYfo78jxWZCyOtSkx9p6g6dJ9kt1MVZp14-uEurYjOLB_XuV7rA-G807Ht3fPNqXED2WIf94-xrwsiMXMhz55nr\" alt=\"\"\/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">2. Text report&nbsp;<\/h3>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh5.googleusercontent.com\/laICfBXAzuJYp1MmGw_kxn-oFXbqMwqfX1jgG11ozuqk7OsULs-Jsbt94duN12I_mQN-WswZQKXTchsEKhWmuX8MpboX_WlUIm8Um4GcK58UO5DgHZUJMqt6kp2oYTIe3DNq-ewX\" alt=\"\"\/><\/figure>\n\n\n\n<p>The text reports are convenient. The most significant data is at the top, so you won\u2019t miss anything. A detailed report contains general information about a sample, behavior activities, screenshots, data about the process, registry, files, network, debug output, etc.<br><\/p>\n\n\n\n<p>You can also export or print this report in a preferable form \u2013 hide blocks by clicking on the \u201ceye\u201d icon.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/qIaWQy9eEq0k55qFrI2F6KkPv6DbGpLIA0tygMPO_ia3v2rZEe8xCgXYgC4M90XLJ38EmWBUgV5KC6uecbZ3NXFI2pJHcNOBwI2w1lB6f358BlVoJiXuxLVfjZQM3RyRaEBywhSL\" alt=\"\"\/><\/figure>\n\n\n\n<p>The export in different formats is also available:&nbsp;<br><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>JSON Summary<\/li>\n\n\n\n<li>STIX<\/li>\n\n\n\n<li>JSON IOC<\/li>\n\n\n\n<li>HTML Document<\/li>\n\n\n\n<li>Export Process Graph (SVG)<\/li>\n\n\n\n<li>JSON MISP format<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">3. Process graph&nbsp;<\/h3>\n\n\n\n<p>The best overview of a sample is to examine its events in the process graph. A brief look, and you already know what is going on here.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh4.googleusercontent.com\/jW2dxDa_S_EV6m9Nny3VUcbMCyU_3zfSE6hhMMz6kTOthErTRZ3JerMGcXcl9Rnq-tLuszxSKPyBWZih27BwaZ909UalxWl9vowazWqFKjkZ927CvMyyUfurut6kc-Y3CsydQfNT\" alt=\"\"\/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">4. MITRE ATT&amp;CK matrix<\/h3>\n\n\n\n<p>The more information you have, the better analysis you perform. <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/any.run\/cybersecurity-blog\/mitre-attack\/\" target=\"_blank\">MITRE ATT&amp;CK matrix<\/a> gives a full view of the investigated malware&#8217;s tactics.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/FVGgP25wqmUTf_QtA3sKX84Rf2Xjh0C7pzrPpB_BP8R1V8FMJEqPRelxK5jqLubdRz8YAFX-1lD_dGxqr_YiT1r6kV424nvgsIL3uXV-Ow404R2tyAzjsf8gIvzIZYoJ1I4vSSV8\" alt=\"\"\/><\/figure>\n\n\n\n<p>Of course, that is not all the details that you get. Each process has descriptive information about network stream, static discovering, and advanced information about events. You can find it out during the analysis or go through our guide on <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/any.run\/cybersecurity-blog\/how-to-use-anyrun\/\" target=\"_blank\">how to use ANY.RUN<\/a>.&nbsp;&nbsp;<br><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">5. PCAP files<\/h3>\n\n\n\n<p>You can download PCAP files from the tasks to further analyze the network traffic in programs such as Wireshark. If the task was started with HTTPS MITM Proxy on, then the SSL Key Log file will also be available for download that allows you to decrypt HTTPS traffic.<br><\/p>\n\n\n\n<p>Rerun a task that you have found in the public submissions and watch the process by yourself. With ANY.RUN\u2019s premium subscriptions \u2013 <a aria-label=\" (opens in a new tab)\" href=\"https:\/\/any.run\/cybersecurity-blog\/subscriptions-hunter-plan\/\" target=\"_blank\" rel=\"noreferrer noopener\">Hunter<\/a> and <a href=\"https:\/\/any.run\/cybersecurity-blog\/anyrun-enterprise-plan\/\" target=\"_blank\" rel=\"noreferrer noopener\">Enterprise<\/a>, you get extra features: customize configurations and see malware behavior on VM in a different environment. Check out a video to watch these plans in action:\u00a0<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"How to use Searcher and Hunter Plans of ANY.RUN malware sandbox\" width=\"770\" height=\"433\" src=\"https:\/\/www.youtube.com\/embed\/1tbxV-VtD6g?start=80&#038;feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<p>Be attentive if you want to submit a malware sample and research files with sensitive information. A <a href=\"https:\/\/any.run\/cybersecurity-blog\/subscriptions-community-plan\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Community<\/a> account\u2019s investigation is available to the public by default.<br><\/p>\n\n\n\n<p>ANY.RUN is an online sandbox that offers free malware analysis tools. But it is also a service for education and research. If you are interested in malware trends, you can take a look at our <a aria-label=\" (opens in a new tab)\" href=\"https:\/\/any.run\/malware-trends\/\" target=\"_blank\" rel=\"noreferrer noopener\">Malware Trends Tracker<\/a> to monitor malicious activity daily with its dynamic articles.&nbsp;<\/p>\n\n\n\n<p>Check out the public submissions and start your analysis of malware samples with detailed reports now!<\/p>\n\n\n\n<p>The malware samples used in the post: <a href=\"https:\/\/app.any.run\/tasks\/064e8183-009b-486c-9e5b-6d549a568612\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">https:\/\/app.any.run\/tasks\/064e8183-009b-486c-9e5b-6d549a568612\/<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/app.any.run\/tasks\/a76e4684-0d7b-46de-af71-0538a5cde0f8\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">https:\/\/app.any.run\/tasks\/a76e4684-0d7b-46de-af71-0538a5cde0f8\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Malware hunters often look for malicious objects to investigate threat features and build protection strategies. The hindrance for striving cybersecurity specialists is to access new malicious code samples to practice on. ANY.RUN is an excellent resource that lets get any sample malware file for testing for free. In this post, we will tell you how [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":3738,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[15],"class_list":["post-1926","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-lifehacks","tag-malware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Get Free Malware Samples and Reports - ANY.RUN&#039;s Cybersecurity Blog<\/title>\n<meta name=\"description\" content=\"Do you need malware samples and reports for analysis? Investigate more than 3m public submissions with ANY.RUN. Check out how to get them for free.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/free-malware-samples-reports\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ANY.RUN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\n\t    \"@context\": \"https:\/\/schema.org\",\n\t    \"@graph\": [\n\t        {\n\t            \"@type\": \"Article\",\n\t            \"@id\": \"https:\/\/any.run\/cybersecurity-blog\/free-malware-samples-reports\/#article\",\n\t            \"isPartOf\": {\n\t                \"@id\": \"https:\/\/any.run\/cybersecurity-blog\/free-malware-samples-reports\/\"\n\t            },\n\t            \"author\": {\n\t                \"name\": \"ANY.RUN\",\n\t                \"@id\": \"https:\/\/any.run\/\"\n\t            },\n\t            \"headline\": \"How to Get Free Malware Samples and Reports\",\n\t            \"datePublished\": \"2021-11-18T11:52:37+00:00\",\n\t            \"dateModified\": \"2025-11-13T09:01:27+00:00\",\n\t            \"mainEntityOfPage\": {\n\t                \"@id\": \"https:\/\/any.run\/cybersecurity-blog\/free-malware-samples-reports\/\"\n\t            },\n\t            \"wordCount\": 972,\n\t            \"commentCount\": 6,\n\t            \"publisher\": {\n\t                \"@id\": \"https:\/\/any.run\/\"\n\t            },\n\t            \"keywords\": [\n\t                \"malware\"\n\t            ],\n\t            \"articleSection\": [\n\t                \"Cybersecurity Lifehacks\"\n\t            ],\n\t            \"inLanguage\": \"en-US\",\n\t            \"potentialAction\": [\n\t                {\n\t                    \"@type\": \"CommentAction\",\n\t                    \"name\": \"Comment\",\n\t                    \"target\": [\n\t                        \"https:\/\/any.run\/cybersecurity-blog\/free-malware-samples-reports\/#respond\"\n\t                    ]\n\t                }\n\t            ]\n\t        },\n\t        {\n\t            \"@type\": \"WebPage\",\n\t            \"@id\": \"https:\/\/any.run\/cybersecurity-blog\/free-malware-samples-reports\/\",\n\t            \"url\": \"https:\/\/any.run\/cybersecurity-blog\/free-malware-samples-reports\/\",\n\t            \"name\": \"How to Get Free Malware Samples and Reports - ANY.RUN&#039;s Cybersecurity Blog\",\n\t            \"isPartOf\": {\n\t                \"@id\": \"https:\/\/any.run\/\"\n\t            },\n\t            \"datePublished\": \"2021-11-18T11:52:37+00:00\",\n\t            \"dateModified\": \"2025-11-13T09:01:27+00:00\",\n\t            \"description\": \"Do you need malware samples and reports for analysis? Investigate more than 3m public submissions with ANY.RUN. Check out how to get them for free.\",\n\t            \"breadcrumb\": {\n\t                \"@id\": \"https:\/\/any.run\/cybersecurity-blog\/free-malware-samples-reports\/#breadcrumb\"\n\t            },\n\t            \"inLanguage\": \"en-US\",\n\t            \"potentialAction\": [\n\t                {\n\t                    \"@type\": \"ReadAction\",\n\t                    \"target\": [\n\t                        \"https:\/\/any.run\/cybersecurity-blog\/free-malware-samples-reports\/\"\n\t                    ]\n\t                }\n\t            ]\n\t        },\n\t        {\n\t            \"@type\": \"BreadcrumbList\",\n\t            \"@id\": \"https:\/\/any.run\/cybersecurity-blog\/free-malware-samples-reports\/#breadcrumb\",\n\t            \"itemListElement\": [\n\t                {\n\t                    \"@type\": \"ListItem\",\n\t                    \"position\": 1,\n\t                    \"name\": \"Home\",\n\t                    \"item\": \"https:\/\/any.run\/cybersecurity-blog\/\"\n\t                },\n\t                {\n\t                    \"@type\": \"ListItem\",\n\t                    \"position\": 2,\n\t                    \"name\": \"Cybersecurity Lifehacks\",\n\t                    \"item\": \"https:\/\/any.run\/cybersecurity-blog\/category\/lifehacks\/\"\n\t                },\n\t                {\n\t                    \"@type\": \"ListItem\",\n\t                    \"position\": 3,\n\t                    \"name\": \"How to Get Free Malware Samples and Reports\"\n\t                }\n\t            ]\n\t        },\n\t        {\n\t            \"@type\": \"WebSite\",\n\t            \"@id\": \"https:\/\/any.run\/\",\n\t            \"url\": \"https:\/\/any.run\/\",\n\t            \"name\": \"ANY.RUN&#039;s Cybersecurity Blog\",\n\t            \"description\": \"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\n\t            \"publisher\": {\n\t                \"@id\": \"https:\/\/any.run\/\"\n\t            },\n\t            \"potentialAction\": [\n\t                {\n\t                    \"@type\": \"SearchAction\",\n\t                    \"target\": {\n\t                        \"@type\": \"EntryPoint\",\n\t                        \"urlTemplate\": \"https:\/\/any.run\/?s={search_term_string}\"\n\t                    },\n\t                    \"query-input\": \"required name=search_term_string\"\n\t                }\n\t            ],\n\t            \"inLanguage\": \"en-US\"\n\t        },\n\t        {\n\t            \"@type\": \"Organization\",\n\t            \"@id\": \"https:\/\/any.run\/\",\n\t            \"name\": \"ANY.RUN\",\n\t            \"url\": \"https:\/\/any.run\/\",\n\t            \"logo\": {\n\t                \"@type\": \"ImageObject\",\n\t                \"inLanguage\": \"en-US\",\n\t                \"@id\": \"https:\/\/any.run\/\",\n\t                \"url\": \"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\n\t                \"contentUrl\": \"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\n\t                \"width\": 1,\n\t                \"height\": 1,\n\t                \"caption\": \"ANY.RUN\"\n\t            },\n\t            \"image\": {\n\t                \"@id\": \"https:\/\/any.run\/\"\n\t            },\n\t            \"sameAs\": [\n\t                \"https:\/\/www.facebook.com\/www.any.run\/\",\n\t                \"https:\/\/twitter.com\/anyrun_app\",\n\t                \"https:\/\/www.linkedin.com\/company\/30692044\",\n\t                \"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"\n\t            ]\n\t        },\n\t        {\n\t            \"@type\": \"Person\",\n\t            \"@id\": \"https:\/\/any.run\/\",\n\t            \"name\": \"ANY.RUN\",\n\t            \"image\": {\n\t                \"@type\": \"ImageObject\",\n\t                \"inLanguage\": \"en-US\",\n\t                \"@id\": \"https:\/\/any.run\/\",\n\t                \"url\": \"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\n\t                \"contentUrl\": \"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\n\t                \"caption\": \"ANY.RUN\"\n\t            },\n\t            \"url\": \"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/\"\n\t        }\n\t    ]\n\t}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Get Free Malware Samples and Reports - ANY.RUN&#039;s Cybersecurity Blog","description":"Do you need malware samples and reports for analysis? Investigate more than 3m public submissions with ANY.RUN. Check out how to get them for free.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/free-malware-samples-reports\/","twitter_misc":{"Written by":"ANY.RUN","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/free-malware-samples-reports\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/free-malware-samples-reports\/"},"author":{"name":"ANY.RUN","@id":"https:\/\/any.run\/"},"headline":"How to Get Free Malware Samples and Reports","datePublished":"2021-11-18T11:52:37+00:00","dateModified":"2025-11-13T09:01:27+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/free-malware-samples-reports\/"},"wordCount":972,"commentCount":6,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["malware"],"articleSection":["Cybersecurity Lifehacks"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/free-malware-samples-reports\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/free-malware-samples-reports\/","url":"https:\/\/any.run\/cybersecurity-blog\/free-malware-samples-reports\/","name":"How to Get Free Malware Samples and Reports - ANY.RUN&#039;s Cybersecurity Blog","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2021-11-18T11:52:37+00:00","dateModified":"2025-11-13T09:01:27+00:00","description":"Do you need malware samples and reports for analysis? Investigate more than 3m public submissions with ANY.RUN. Check out how to get them for free.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/free-malware-samples-reports\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/free-malware-samples-reports\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/free-malware-samples-reports\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Lifehacks","item":"https:\/\/any.run\/cybersecurity-blog\/category\/lifehacks\/"},{"@type":"ListItem","position":3,"name":"How to Get Free Malware Samples and Reports"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"ANY.RUN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","caption":"ANY.RUN"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/"}]}},"_links":{"self":[{"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/1926"}],"collection":[{"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=1926"}],"version-history":[{"count":5,"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/1926\/revisions"}],"predecessor-version":[{"id":16773,"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/1926\/revisions\/16773"}],"wp:featuredmedia":[{"embeddable":true,"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/3738"}],"wp:attachment":[{"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=1926"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=1926"},{"taxonomy":"post_tag","embeddable":true,"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=1926"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}