The document describes a hybrid honeypot framework for collecting and analyzing malware. The framework uses both client honeypots and server honeypots controlled by a central honeypot controller. Client honeypots actively visit URLs to detect client-side attacks, while server honeypots passively detect server-side attacks. Collected malware is stored in a central database and analyzed on an analysis server to detect known and unknown malware types through dynamic execution and static analysis. The integrated framework was able to collect thousands of malware samples, including some not detected by antivirus software.