rissgrouphub / ransomwaredataset2016

Ransomware Dataset for arXiv:1609.03020

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

This dataset contains the dynamic analysis of 582 samples of ransomware and 942 of good applications (goodware), i.e. 1524 samples in total.The dataset was retrieved and analysed with Cuckoo Sandbox at the end of February 2016. Further details about the dataset can be found in the paper (see below).

Please, reference our work when using this dataset:

Daniele Sgandurra, Luis Muñoz-González, Rabih Mohsen, Emil C. Lupu. "Automated Dynamic Analysis of Ransomware: Benefits, Limitations and use for Detection." arXiv preprint arXiv:1609.03020, 2016.

For BIBTEX you can use this:

@article{sgandurra2016,
  title={{Automated Dynamic Analysis of Ransomware: Benefits, Limitations and use for Detection}},
  author={Sgandurra, Daniele and Mu{\~n}oz-Gonz{\'a}lez, Luis and Mohsen, Rabih and Lupu, Emil C},
  journal={arXiv preprint arXiv:1609.03020},
  year={2016}
}


++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
RANSOMWARE FAMILIES
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

The Ransomware samples belong to different families that are identified with the following codes:

FAMILY NAME          ID
------------------------------
Goodware              0
'Critroni'            1
'CryptLocker'         2
'CryptoWall'          3
'KOLLAH'              4
'Kovter'              5
'Locker'              6
'MATSNU'              7
'PGPCODER'            8
'Reveton'             9
'TeslaCrypt'         10
'Trojan-Ransom'      11

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++


++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
SETS OF FEATURES
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
The different sets of features are identified with the following codes (see also VariableNames.txt):

ID          Description
---------------------------------
API         API invocations
DROP        Extensions of the dropped files
REG         Registry key operations
FILES       File operations
FILES_EXT   Extension of the files involved in file operations
DIR         File directory operations
STR         Embedded strings

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++


++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
IDS of the Software analysed
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

The file IDS.txt contains the correspondence of the local IDS we use in our dataset with the SHA1 and MD5
of the software analysed (both goodware and ransomware). The description of the header in that file is 
the following:

- ID: local identifier used in our dataset.
- SHA1: SHA1 hash identifier for the software.
- MD5: MD5 hash identifier for the software.
- Ransomware: 1 if it's ransomware / 0 for Goodware.
- Ransomware_Family: numeric identifier for the ransomware family (same codification as explained above).

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

About

Ransomware Dataset for arXiv:1609.03020