mikosovsky commited on
Commit
ace259d
·
verified ·
1 Parent(s): 64983ce

Update README.md

Browse files
Files changed (1) hide show
  1. README.md +101 -1
README.md CHANGED
@@ -7,4 +7,104 @@ tags:
7
  - code
8
  - decompiled
9
  pretty_name: malware dataset code and decompiled C pseudocode
10
- ---
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
7
  - code
8
  - decompiled
9
  pretty_name: malware dataset code and decompiled C pseudocode
10
+ size_categories:
11
+ - n<1K
12
+ ---
13
+ # Malware Source Code and Decompiled C Pseudocode Dataset
14
+
15
+ ## Overview
16
+
17
+ This repository contains a curated dataset of **malware source codes** and **C-like pseudocode** obtained through automated decompilation using **Ghidra**, the reverse engineering framework developed by the **NSA**.
18
+
19
+ The dataset is intended for **malware analysis**, **program analysis research**, **machine learning / LLM-based malware detection**, and **reverse engineering experiments**.
20
+
21
+ ## Data Origin
22
+
23
+ The data is based on the following archive:
24
+
25
+ - **VXUnderground Archive**
26
+ - **Old APT Collection**
27
+ - **Archive version:** `2024.7z`
28
+
29
+ VXUnderground is a well-known public repository that aggregates malware samples from various threat actor groups and historical campaigns.
30
+
31
+ ## Decompilation Scope and Limitations
32
+
33
+ ⚠️ **Important Notice**
34
+
35
+ Due to **computational resource constraints**, **not all executable files** from the original VXUnderground archive were decompiled.
36
+
37
+ - Only a **subset of executable malware samples** was processed
38
+ - Decompilation was performed using **Ghidra in headless mode**
39
+ - Some binaries may be missing corresponding decompiled outputs
40
+ - The dataset should **not** be considered complete or exhaustive
41
+
42
+ This selective decompilation approach was chosen to balance dataset size with practical feasibility.
43
+
44
+ ## Repository Structure
45
+
46
+ ```
47
+
48
+ .
49
+ ├── code/
50
+ │ └── * (malware source code files without file extensions)
51
+
52
+ ├── decompiled/
53
+ │ └── *.decomp.c (C-like pseudocode generated by Ghidra)
54
+
55
+ └── README.md
56
+
57
+ ```
58
+
59
+ ### `code/`
60
+
61
+ - Contains **original malware source code**
62
+ - **All files have no file extensions**
63
+ - Files originate directly from the VXUnderground archive
64
+ - Code may be incomplete, obfuscated, or inconsistent in formatting
65
+
66
+ ### `decompiled/`
67
+
68
+ - Contains **C-like pseudocode** produced by **Ghidra**
69
+ - **All files use the `.decomp.c` extension**
70
+ - Represents decompiled versions of selected executable malware samples
71
+ - Output reflects:
72
+ - Ghidra’s internal analysis
73
+ - Heuristics and limitations of automated decompilation
74
+ - The code is **not guaranteed to compile** and may contain artifacts introduced by the decompiler
75
+
76
+ ## Intended Use Cases
77
+
78
+ This dataset can be used for:
79
+
80
+ - Malware classification (malware vs benign)
81
+ - Program comprehension and reverse engineering research
82
+ - Training and evaluation of:
83
+ - Large Language Models (LLMs)
84
+ - Recursive Language Models (RLMs)
85
+ - Static analysis pipelines
86
+ - Malware family analysis and feature extraction
87
+ - Source code ↔ pseudocode alignment tasks
88
+
89
+ ## Disclaimer
90
+
91
+ ⚠️ **Warning**
92
+
93
+ - This repository contains **real malware code**
94
+ - The code is provided **strictly for research and educational purposes**
95
+ - **Do NOT compile or execute** any files unless in a properly isolated environment (e.g., sandbox, VM)
96
+ - The authors take **no responsibility** for misuse or damage caused by this dataset
97
+
98
+ ## License and Attribution
99
+
100
+ - Original malware samples are attributed to **VXUnderground**
101
+ - Ghidra is developed and maintained by the **National Security Agency (NSA)**
102
+ - This dataset is a **derived work** created for research purposes only
103
+
104
+ If you use this dataset in academic work, please cite:
105
+ - VXUnderground as the original data source
106
+ - Ghidra as the decompilation tool
107
+
108
+ ## Contact
109
+
110
+ For questions, issues, or collaboration related to this dataset, please open an issue or contact the repository maintainer.