I am planning on analysing some malware samples dynamically using a sandbox tool and a target Windows VM. The host (physical machine) runs Ubuntu and in it are the sandbox and target VM.
So far I only analysed benign samples, i.e. normal software. I store the samples in the Ubuntu host and use the sandbox tool to inject them into the Windows VM. The sandbox then runs the sample and monitors the VM then generates a report containing API calls and other information.
Now that I tested the setup and feel ready to analyse real malware I noticed a potential security flaw in my setup. Assuming the VM and sandbox tools are secure, how do I store the malware before analysing it?
I first though of simply extracting the malware into a folder in my Ubuntu host and running the sandbox tool just like I do with the benign software. However, this computer is connected to the rest of the network. Is this even a security concern?
Here is a somewhat related question: Is it secure to keep malware in filesystem of VMs?