File size: 3,608 Bytes
64983ce
 
 
 
 
 
 
 
 
ace259d
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
---
license: mit
task_categories:
- text-classification
tags:
- malware
- code
- decompiled
pretty_name: malware dataset code and decompiled C pseudocode
size_categories:
- n<1K
---
# Malware Source Code and Decompiled C Pseudocode Dataset

## Overview

This repository contains a curated dataset of **malware source codes** and **C-like pseudocode** obtained through automated decompilation using **Ghidra**, the reverse engineering framework developed by the **NSA**.

The dataset is intended for **malware analysis**, **program analysis research**, **machine learning / LLM-based malware detection**, and **reverse engineering experiments**.

## Data Origin

The data is based on the following archive:

- **VXUnderground Archive**
- **Old APT Collection**
- **Archive version:** `2024.7z`

VXUnderground is a well-known public repository that aggregates malware samples from various threat actor groups and historical campaigns.

## Decompilation Scope and Limitations

⚠️ **Important Notice**

Due to **computational resource constraints**, **not all executable files** from the original VXUnderground archive were decompiled.

- Only a **subset of executable malware samples** was processed
- Decompilation was performed using **Ghidra in headless mode**
- Some binaries may be missing corresponding decompiled outputs
- The dataset should **not** be considered complete or exhaustive

This selective decompilation approach was chosen to balance dataset size with practical feasibility.

## Repository Structure

```

.
├── code/
│   └── * (malware source code files without file extensions)

├── decompiled/
│   └── *.decomp.c (C-like pseudocode generated by Ghidra)

└── README.md

```

### `code/`

- Contains **original malware source code**
- **All files have no file extensions**
- Files originate directly from the VXUnderground archive
- Code may be incomplete, obfuscated, or inconsistent in formatting

### `decompiled/`

- Contains **C-like pseudocode** produced by **Ghidra**
- **All files use the `.decomp.c` extension**
- Represents decompiled versions of selected executable malware samples
- Output reflects:
  - Ghidra’s internal analysis
  - Heuristics and limitations of automated decompilation
- The code is **not guaranteed to compile** and may contain artifacts introduced by the decompiler

## Intended Use Cases

This dataset can be used for:

- Malware classification (malware vs benign)
- Program comprehension and reverse engineering research
- Training and evaluation of:
  - Large Language Models (LLMs)
  - Recursive Language Models (RLMs)
  - Static analysis pipelines
- Malware family analysis and feature extraction
- Source code ↔ pseudocode alignment tasks

## Disclaimer

⚠️ **Warning**

- This repository contains **real malware code**
- The code is provided **strictly for research and educational purposes**
- **Do NOT compile or execute** any files unless in a properly isolated environment (e.g., sandbox, VM)
- The authors take **no responsibility** for misuse or damage caused by this dataset

## License and Attribution

- Original malware samples are attributed to **VXUnderground**
- Ghidra is developed and maintained by the **National Security Agency (NSA)**
- This dataset is a **derived work** created for research purposes only

If you use this dataset in academic work, please cite:
- VXUnderground as the original data source
- Ghidra as the decompilation tool

## Contact

For questions, issues, or collaboration related to this dataset, please open an issue or contact the repository maintainer.