_________   ________   ___   ________   
|\___   ___\|\   __  \ |\  \ |\   __  \  
\|___ \  \_|\ \  \|\  \\ \  \\ \  \|\  \ 
     \ \  \  \ \   _  _\\ \  \\ \   ____\
      \ \  \  \ \  \\  \|\ \  \\ \  \___|
       \ \__\  \ \__\\ _\ \ \__\\ \__\   
        \|__|   \|__|\|__| \|__| \|__|   

🛡️ Threat Research Incentive Program

To be eligible for a bounty payout, you must follow these instructions exactly:

1. Submit only an encrypted ZIP file containing your sample(s) and submission details.
2. The ZIP file must be password-protected with the password: infected
3. Inside the ZIP file, include a text file named submission.txt with the following information:

Please fill out the following in your submission.txt file:

Name: 
Email: 
Summary of Submission:
(Explain what this includes—e.g., malware name, variant, infrastructure insights, behavioral techniques, etc.)

Additional Notes:
(Anything else we should know?)

⚠️ Submissions without the complete submission.txt will not be eligible for bounty payout.

Do NOT:
    - Upload unencrypted files.
    - Upload ZIPs without the required submission.txt.

1
or drag-and-drop files into this browser window.

2
The file uploads will begin. Wait until they complete.

3
We will contact you after submission.

The file uploads will cancel if you move away from this page before they complete.