Malware Patrol provides some of its threat data feeds via AWS/Amazon S3 buckets. Among the feeds are the “Malware Samples (Binaries)” and the “Bitcoin Transactions (JSON format)”. Amazon Simple Storage Service has a simple web services interface that can use to store and retrieve any amount of data, at any time, from anywhere on the web. For more information on AWS S3, please visit their site.
- Bucket path
- Access key
- Secret key
The S3 bucket receives data (samples, transactions, etc) in real time, as soon as they are collected and analyzed by our systems. A policy is set to automatically delete objects older than 15 days.
You can access the bucket using your tool of choice, however, we have included very simple instructions to access it using a command line tool called s3cmd. It is available at:
After downloading and installing, it needs to be configured using credentials provided by Malware Patrol:
$ s3cmd –configure
And then you are ready to issue commands like ‘ls’ and ‘get’ among others:
$ s3cmd ls s3://_bucket_name_/
AWS S3 is an object storage and therefore doesn’t work with directories as in a regular file system, but mimics them. Therefore, it is possible to download files simply by doing something like this:
$ s3cmd get s3://_bucket_name_/malware/samples/*.gz
$ s3cmd get s3://_bucket_name_/malware/samples/43*.gz
Don’t hesitate to contact me or firstname.lastname@example.org if you experience any difficulties.
Co-Founder, Malware Patrol
Information Security and Threat Intelligence Professional whose qualifications include in-depth knowledge of Internet technologies, current cyber security landscape, incident response, security mechanisms and best practices. He founded the Malware Patrol project in 2005. The company is helping enterprises around the world to protect themselves from malware and ransomware attacks through some of the most comprehensive threat data feeds and block lists on the market.