| | --- |
| | license: mit |
| | task_categories: |
| | - text-classification |
| | tags: |
| | - malware |
| | - code |
| | - decompiled |
| | pretty_name: malware dataset code and decompiled C pseudocode |
| | size_categories: |
| | - n<1K |
| | --- |
| | # Malware Source Code and Decompiled C Pseudocode Dataset |
| |
|
| | ## Overview |
| |
|
| | This repository contains a curated dataset of **malware source codes** and **C-like pseudocode** obtained through automated decompilation using **Ghidra**, the reverse engineering framework developed by the **NSA**. |
| |
|
| | The dataset is intended for **malware analysis**, **program analysis research**, **machine learning / LLM-based malware detection**, and **reverse engineering experiments**. |
| |
|
| | ## Data Origin |
| |
|
| | The data is based on the following archive: |
| |
|
| | - **VXUnderground Archive** |
| | - **Old APT Collection** |
| | - **Archive version:** `2024.7z` |
| |
|
| | VXUnderground is a well-known public repository that aggregates malware samples from various threat actor groups and historical campaigns. |
| |
|
| | ## Decompilation Scope and Limitations |
| |
|
| | ⚠️ **Important Notice** |
| |
|
| | Due to **computational resource constraints**, **not all executable files** from the original VXUnderground archive were decompiled. |
| |
|
| | - Only a **subset of executable malware samples** was processed |
| | - Decompilation was performed using **Ghidra in headless mode** |
| | - Some binaries may be missing corresponding decompiled outputs |
| | - The dataset should **not** be considered complete or exhaustive |
| |
|
| | This selective decompilation approach was chosen to balance dataset size with practical feasibility. |
| |
|
| | ## Repository Structure |
| |
|
| | ``` |
| | |
| | . |
| | ├── code/ |
| | │ └── * (malware source code files without file extensions) |
| | │ |
| | ├── decompiled/ |
| | │ └── *.decomp.c (C-like pseudocode generated by Ghidra) |
| | │ |
| | └── README.md |
| | |
| | ``` |
| |
|
| | ### `code/` |
| |
|
| | - Contains **original malware source code** |
| | - **All files have no file extensions** |
| | - Files originate directly from the VXUnderground archive |
| | - Code may be incomplete, obfuscated, or inconsistent in formatting |
| |
|
| | ### `decompiled/` |
| |
|
| | - Contains **C-like pseudocode** produced by **Ghidra** |
| | - **All files use the `.decomp.c` extension** |
| | - Represents decompiled versions of selected executable malware samples |
| | - Output reflects: |
| | - Ghidra’s internal analysis |
| | - Heuristics and limitations of automated decompilation |
| | - The code is **not guaranteed to compile** and may contain artifacts introduced by the decompiler |
| |
|
| | ## Intended Use Cases |
| |
|
| | This dataset can be used for: |
| |
|
| | - Malware classification (malware vs benign) |
| | - Program comprehension and reverse engineering research |
| | - Training and evaluation of: |
| | - Large Language Models (LLMs) |
| | - Recursive Language Models (RLMs) |
| | - Static analysis pipelines |
| | - Malware family analysis and feature extraction |
| | - Source code ↔ pseudocode alignment tasks |
| |
|
| | ## Disclaimer |
| |
|
| | ⚠️ **Warning** |
| |
|
| | - This repository contains **real malware code** |
| | - The code is provided **strictly for research and educational purposes** |
| | - **Do NOT compile or execute** any files unless in a properly isolated environment (e.g., sandbox, VM) |
| | - The authors take **no responsibility** for misuse or damage caused by this dataset |
| |
|
| | ## License and Attribution |
| |
|
| | - Original malware samples are attributed to **VXUnderground** |
| | - Ghidra is developed and maintained by the **National Security Agency (NSA)** |
| | - This dataset is a **derived work** created for research purposes only |
| |
|
| | If you use this dataset in academic work, please cite: |
| | - VXUnderground as the original data source |
| | - Ghidra as the decompilation tool |
| |
|
| | ## Contact |
| |
|
| | For questions, issues, or collaboration related to this dataset, please open an issue or contact the repository maintainer. |