I got a little crazy on my last post--let me try again with your NIC disconnected. I like idle-jam's approach better, but if you're not on 4.1 this will work, but you'll be without vCenter for awhile. The ISO stuff I mentioned is okay for some scenarios, but you don't really need to do all that (and you have some issues without being connected to the network) :smileywink:
Make sure you can be without vCenter for a little while because you're going to abuse it a little.
Put the VM with malware on the same host vCenter is on.
At this point it's easiest to access vCenter by opening an infrastructure client session to the host that vCenter is running on (you're going to move vCenter off the network later so if you don't access this way now, you'll have to later anyway).
Make a snapshot of vCenter.
Create a vSwitch that's isolated (don't connect any physical NICs to it).
Move vCenter to the isolated switch.
Move the VM with malware to the isolated switch and connect it.
Browse to vCenter from the VM with malware.
Intall the infrastructure client on the VM with malware.
Upload any logs you want from the VM with malware to a folder on the datastore.
You can now browse the datastore from your desktop and download the folder with the logs or other files in it.
You could also add in some steps if you prefer to make an ISO of any files you take off the VM with malware before you upload them to the datastore.
Revert vCenter to the snapshot you created earlier so it's back on the real network. This way if it picked up any malware while communicating with the infected VM, the malware will be gone.
Or just upgrade to 4.1 and follow idle-jam's link.
Rich