|
|
--- |
|
|
license: mit |
|
|
task_categories: |
|
|
- text-classification |
|
|
tags: |
|
|
- malware |
|
|
- code |
|
|
- decompiled |
|
|
pretty_name: malware dataset code and decompiled C pseudocode |
|
|
size_categories: |
|
|
- n<1K |
|
|
--- |
|
|
# Malware Source Code and Decompiled C Pseudocode Dataset |
|
|
|
|
|
## Overview |
|
|
|
|
|
This repository contains a curated dataset of **malware source codes** and **C-like pseudocode** obtained through automated decompilation using **Ghidra**, the reverse engineering framework developed by the **NSA**. |
|
|
|
|
|
The dataset is intended for **malware analysis**, **program analysis research**, **machine learning / LLM-based malware detection**, and **reverse engineering experiments**. |
|
|
|
|
|
## Data Origin |
|
|
|
|
|
The data is based on the following archive: |
|
|
|
|
|
- **VXUnderground Archive** |
|
|
- **Old APT Collection** |
|
|
- **Archive version:** `2024.7z` |
|
|
|
|
|
VXUnderground is a well-known public repository that aggregates malware samples from various threat actor groups and historical campaigns. |
|
|
|
|
|
## Decompilation Scope and Limitations |
|
|
|
|
|
⚠️ **Important Notice** |
|
|
|
|
|
Due to **computational resource constraints**, **not all executable files** from the original VXUnderground archive were decompiled. |
|
|
|
|
|
- Only a **subset of executable malware samples** was processed |
|
|
- Decompilation was performed using **Ghidra in headless mode** |
|
|
- Some binaries may be missing corresponding decompiled outputs |
|
|
- The dataset should **not** be considered complete or exhaustive |
|
|
|
|
|
This selective decompilation approach was chosen to balance dataset size with practical feasibility. |
|
|
|
|
|
## Repository Structure |
|
|
|
|
|
``` |
|
|
|
|
|
. |
|
|
├── code/ |
|
|
│ └── * (malware source code files without file extensions) |
|
|
│ |
|
|
├── decompiled/ |
|
|
│ └── *.decomp.c (C-like pseudocode generated by Ghidra) |
|
|
│ |
|
|
└── README.md |
|
|
|
|
|
``` |
|
|
|
|
|
### `code/` |
|
|
|
|
|
- Contains **original malware source code** |
|
|
- **All files have no file extensions** |
|
|
- Files originate directly from the VXUnderground archive |
|
|
- Code may be incomplete, obfuscated, or inconsistent in formatting |
|
|
|
|
|
### `decompiled/` |
|
|
|
|
|
- Contains **C-like pseudocode** produced by **Ghidra** |
|
|
- **All files use the `.decomp.c` extension** |
|
|
- Represents decompiled versions of selected executable malware samples |
|
|
- Output reflects: |
|
|
- Ghidra’s internal analysis |
|
|
- Heuristics and limitations of automated decompilation |
|
|
- The code is **not guaranteed to compile** and may contain artifacts introduced by the decompiler |
|
|
|
|
|
## Intended Use Cases |
|
|
|
|
|
This dataset can be used for: |
|
|
|
|
|
- Malware classification (malware vs benign) |
|
|
- Program comprehension and reverse engineering research |
|
|
- Training and evaluation of: |
|
|
- Large Language Models (LLMs) |
|
|
- Recursive Language Models (RLMs) |
|
|
- Static analysis pipelines |
|
|
- Malware family analysis and feature extraction |
|
|
- Source code ↔ pseudocode alignment tasks |
|
|
|
|
|
## Disclaimer |
|
|
|
|
|
⚠️ **Warning** |
|
|
|
|
|
- This repository contains **real malware code** |
|
|
- The code is provided **strictly for research and educational purposes** |
|
|
- **Do NOT compile or execute** any files unless in a properly isolated environment (e.g., sandbox, VM) |
|
|
- The authors take **no responsibility** for misuse or damage caused by this dataset |
|
|
|
|
|
## License and Attribution |
|
|
|
|
|
- Original malware samples are attributed to **VXUnderground** |
|
|
- Ghidra is developed and maintained by the **National Security Agency (NSA)** |
|
|
- This dataset is a **derived work** created for research purposes only |
|
|
|
|
|
If you use this dataset in academic work, please cite: |
|
|
- VXUnderground as the original data source |
|
|
- Ghidra as the decompilation tool |
|
|
|
|
|
## Contact |
|
|
|
|
|
For questions, issues, or collaboration related to this dataset, please open an issue or contact the repository maintainer. |