The malicious detections flagged by antivirus engines when scanning our password-protected ZIP files are not caused by actual executable malware or malicious shellcode. These samples are deliberately uploaded in locked ZIP archives solely for the purpose of safely testing and validating our detection modules in a controlled environment.
Even advanced reconnaissance heuristics or behavior-based scanners (including Reconsinae) may flag these files due to simulation of typical malicious actor techniques. No payload inside is capable of execution — neither directly nor through any extraction or decompression bypass.
All such detections are expected false positives resulting from realistic malware-mimicking patterns used for quality assurance and module tuning. We do not distribute, nor have we ever distributed, any live and functional malicious software.
This is standard practice in security product development and red-team simulation testing.