Update README.md
Browse files
README.md
CHANGED
|
@@ -7,4 +7,104 @@ tags:
|
|
| 7 |
- code
|
| 8 |
- decompiled
|
| 9 |
pretty_name: malware dataset code and decompiled C pseudocode
|
| 10 |
-
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 7 |
- code
|
| 8 |
- decompiled
|
| 9 |
pretty_name: malware dataset code and decompiled C pseudocode
|
| 10 |
+
size_categories:
|
| 11 |
+
- n<1K
|
| 12 |
+
---
|
| 13 |
+
# Malware Source Code and Decompiled C Pseudocode Dataset
|
| 14 |
+
|
| 15 |
+
## Overview
|
| 16 |
+
|
| 17 |
+
This repository contains a curated dataset of **malware source codes** and **C-like pseudocode** obtained through automated decompilation using **Ghidra**, the reverse engineering framework developed by the **NSA**.
|
| 18 |
+
|
| 19 |
+
The dataset is intended for **malware analysis**, **program analysis research**, **machine learning / LLM-based malware detection**, and **reverse engineering experiments**.
|
| 20 |
+
|
| 21 |
+
## Data Origin
|
| 22 |
+
|
| 23 |
+
The data is based on the following archive:
|
| 24 |
+
|
| 25 |
+
- **VXUnderground Archive**
|
| 26 |
+
- **Old APT Collection**
|
| 27 |
+
- **Archive version:** `2024.7z`
|
| 28 |
+
|
| 29 |
+
VXUnderground is a well-known public repository that aggregates malware samples from various threat actor groups and historical campaigns.
|
| 30 |
+
|
| 31 |
+
## Decompilation Scope and Limitations
|
| 32 |
+
|
| 33 |
+
⚠️ **Important Notice**
|
| 34 |
+
|
| 35 |
+
Due to **computational resource constraints**, **not all executable files** from the original VXUnderground archive were decompiled.
|
| 36 |
+
|
| 37 |
+
- Only a **subset of executable malware samples** was processed
|
| 38 |
+
- Decompilation was performed using **Ghidra in headless mode**
|
| 39 |
+
- Some binaries may be missing corresponding decompiled outputs
|
| 40 |
+
- The dataset should **not** be considered complete or exhaustive
|
| 41 |
+
|
| 42 |
+
This selective decompilation approach was chosen to balance dataset size with practical feasibility.
|
| 43 |
+
|
| 44 |
+
## Repository Structure
|
| 45 |
+
|
| 46 |
+
```
|
| 47 |
+
|
| 48 |
+
.
|
| 49 |
+
├── code/
|
| 50 |
+
│ └── * (malware source code files without file extensions)
|
| 51 |
+
│
|
| 52 |
+
├── decompiled/
|
| 53 |
+
│ └── *.decomp.c (C-like pseudocode generated by Ghidra)
|
| 54 |
+
│
|
| 55 |
+
└── README.md
|
| 56 |
+
|
| 57 |
+
```
|
| 58 |
+
|
| 59 |
+
### `code/`
|
| 60 |
+
|
| 61 |
+
- Contains **original malware source code**
|
| 62 |
+
- **All files have no file extensions**
|
| 63 |
+
- Files originate directly from the VXUnderground archive
|
| 64 |
+
- Code may be incomplete, obfuscated, or inconsistent in formatting
|
| 65 |
+
|
| 66 |
+
### `decompiled/`
|
| 67 |
+
|
| 68 |
+
- Contains **C-like pseudocode** produced by **Ghidra**
|
| 69 |
+
- **All files use the `.decomp.c` extension**
|
| 70 |
+
- Represents decompiled versions of selected executable malware samples
|
| 71 |
+
- Output reflects:
|
| 72 |
+
- Ghidra’s internal analysis
|
| 73 |
+
- Heuristics and limitations of automated decompilation
|
| 74 |
+
- The code is **not guaranteed to compile** and may contain artifacts introduced by the decompiler
|
| 75 |
+
|
| 76 |
+
## Intended Use Cases
|
| 77 |
+
|
| 78 |
+
This dataset can be used for:
|
| 79 |
+
|
| 80 |
+
- Malware classification (malware vs benign)
|
| 81 |
+
- Program comprehension and reverse engineering research
|
| 82 |
+
- Training and evaluation of:
|
| 83 |
+
- Large Language Models (LLMs)
|
| 84 |
+
- Recursive Language Models (RLMs)
|
| 85 |
+
- Static analysis pipelines
|
| 86 |
+
- Malware family analysis and feature extraction
|
| 87 |
+
- Source code ↔ pseudocode alignment tasks
|
| 88 |
+
|
| 89 |
+
## Disclaimer
|
| 90 |
+
|
| 91 |
+
⚠️ **Warning**
|
| 92 |
+
|
| 93 |
+
- This repository contains **real malware code**
|
| 94 |
+
- The code is provided **strictly for research and educational purposes**
|
| 95 |
+
- **Do NOT compile or execute** any files unless in a properly isolated environment (e.g., sandbox, VM)
|
| 96 |
+
- The authors take **no responsibility** for misuse or damage caused by this dataset
|
| 97 |
+
|
| 98 |
+
## License and Attribution
|
| 99 |
+
|
| 100 |
+
- Original malware samples are attributed to **VXUnderground**
|
| 101 |
+
- Ghidra is developed and maintained by the **National Security Agency (NSA)**
|
| 102 |
+
- This dataset is a **derived work** created for research purposes only
|
| 103 |
+
|
| 104 |
+
If you use this dataset in academic work, please cite:
|
| 105 |
+
- VXUnderground as the original data source
|
| 106 |
+
- Ghidra as the decompilation tool
|
| 107 |
+
|
| 108 |
+
## Contact
|
| 109 |
+
|
| 110 |
+
For questions, issues, or collaboration related to this dataset, please open an issue or contact the repository maintainer.
|