Skip to content

ExtractSamples

Extract Samples recursively unpacks password-protected archives commonly used in malware sharing (e.g., .zip, .rar, .7z). It uses default malware research passwords like infected and malware to extract samples in bulk for analysis.

Extract Samples

Figure 12: Extract Samples


🔧 CLI Syntax

# Example 1: No case name
cargo run -p extract_samples /path_to_directory/ infected

In this mode, extracted files will be placed in the same location as each archive found.

# Example 2: With case name
cargo run -p extract_samples /path_to_directory/ infected --case Case123

When --case is provided, all extracted files will be saved under:

/saved_output/cases/Case123/extract_samples/

If no path or password is provided, the tool will prompt for them interactively.