Datasets:
ArXiv:
License:
Duplicate from joyce8/EMBER2024
Browse filesCo-authored-by: Robert J. Joyce <joyce8@users.noreply.huggingface.co>
- .gitattributes +59 -0
- APK_test.zip +3 -0
- APK_train.zip +3 -0
- Dot_Net_test.zip +3 -0
- Dot_Net_train.zip +3 -0
- ELF_test.zip +3 -0
- ELF_train.zip +3 -0
- PDF_test.zip +3 -0
- PDF_train.zip +3 -0
- README.md +121 -0
- Win32_test.zip +3 -0
- Win32_train.zip +3 -0
- Win64_test.zip +3 -0
- Win64_train.zip +3 -0
- challenge.zip +3 -0
.gitattributes
ADDED
|
@@ -0,0 +1,59 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
*.7z filter=lfs diff=lfs merge=lfs -text
|
| 2 |
+
*.arrow filter=lfs diff=lfs merge=lfs -text
|
| 3 |
+
*.bin filter=lfs diff=lfs merge=lfs -text
|
| 4 |
+
*.bz2 filter=lfs diff=lfs merge=lfs -text
|
| 5 |
+
*.ckpt filter=lfs diff=lfs merge=lfs -text
|
| 6 |
+
*.ftz filter=lfs diff=lfs merge=lfs -text
|
| 7 |
+
*.gz filter=lfs diff=lfs merge=lfs -text
|
| 8 |
+
*.h5 filter=lfs diff=lfs merge=lfs -text
|
| 9 |
+
*.joblib filter=lfs diff=lfs merge=lfs -text
|
| 10 |
+
*.lfs.* filter=lfs diff=lfs merge=lfs -text
|
| 11 |
+
*.lz4 filter=lfs diff=lfs merge=lfs -text
|
| 12 |
+
*.mds filter=lfs diff=lfs merge=lfs -text
|
| 13 |
+
*.mlmodel filter=lfs diff=lfs merge=lfs -text
|
| 14 |
+
*.model filter=lfs diff=lfs merge=lfs -text
|
| 15 |
+
*.msgpack filter=lfs diff=lfs merge=lfs -text
|
| 16 |
+
*.npy filter=lfs diff=lfs merge=lfs -text
|
| 17 |
+
*.npz filter=lfs diff=lfs merge=lfs -text
|
| 18 |
+
*.onnx filter=lfs diff=lfs merge=lfs -text
|
| 19 |
+
*.ot filter=lfs diff=lfs merge=lfs -text
|
| 20 |
+
*.parquet filter=lfs diff=lfs merge=lfs -text
|
| 21 |
+
*.pb filter=lfs diff=lfs merge=lfs -text
|
| 22 |
+
*.pickle filter=lfs diff=lfs merge=lfs -text
|
| 23 |
+
*.pkl filter=lfs diff=lfs merge=lfs -text
|
| 24 |
+
*.pt filter=lfs diff=lfs merge=lfs -text
|
| 25 |
+
*.pth filter=lfs diff=lfs merge=lfs -text
|
| 26 |
+
*.rar filter=lfs diff=lfs merge=lfs -text
|
| 27 |
+
*.safetensors filter=lfs diff=lfs merge=lfs -text
|
| 28 |
+
saved_model/**/* filter=lfs diff=lfs merge=lfs -text
|
| 29 |
+
*.tar.* filter=lfs diff=lfs merge=lfs -text
|
| 30 |
+
*.tar filter=lfs diff=lfs merge=lfs -text
|
| 31 |
+
*.tflite filter=lfs diff=lfs merge=lfs -text
|
| 32 |
+
*.tgz filter=lfs diff=lfs merge=lfs -text
|
| 33 |
+
*.wasm filter=lfs diff=lfs merge=lfs -text
|
| 34 |
+
*.xz filter=lfs diff=lfs merge=lfs -text
|
| 35 |
+
*.zip filter=lfs diff=lfs merge=lfs -text
|
| 36 |
+
*.zst filter=lfs diff=lfs merge=lfs -text
|
| 37 |
+
*tfevents* filter=lfs diff=lfs merge=lfs -text
|
| 38 |
+
# Audio files - uncompressed
|
| 39 |
+
*.pcm filter=lfs diff=lfs merge=lfs -text
|
| 40 |
+
*.sam filter=lfs diff=lfs merge=lfs -text
|
| 41 |
+
*.raw filter=lfs diff=lfs merge=lfs -text
|
| 42 |
+
# Audio files - compressed
|
| 43 |
+
*.aac filter=lfs diff=lfs merge=lfs -text
|
| 44 |
+
*.flac filter=lfs diff=lfs merge=lfs -text
|
| 45 |
+
*.mp3 filter=lfs diff=lfs merge=lfs -text
|
| 46 |
+
*.ogg filter=lfs diff=lfs merge=lfs -text
|
| 47 |
+
*.wav filter=lfs diff=lfs merge=lfs -text
|
| 48 |
+
# Image files - uncompressed
|
| 49 |
+
*.bmp filter=lfs diff=lfs merge=lfs -text
|
| 50 |
+
*.gif filter=lfs diff=lfs merge=lfs -text
|
| 51 |
+
*.png filter=lfs diff=lfs merge=lfs -text
|
| 52 |
+
*.tiff filter=lfs diff=lfs merge=lfs -text
|
| 53 |
+
# Image files - compressed
|
| 54 |
+
*.jpg filter=lfs diff=lfs merge=lfs -text
|
| 55 |
+
*.jpeg filter=lfs diff=lfs merge=lfs -text
|
| 56 |
+
*.webp filter=lfs diff=lfs merge=lfs -text
|
| 57 |
+
# Video files - compressed
|
| 58 |
+
*.mp4 filter=lfs diff=lfs merge=lfs -text
|
| 59 |
+
*.webm filter=lfs diff=lfs merge=lfs -text
|
APK_test.zip
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:caadda48f332dd2dae425c7e33d04aa66f28286431c9e4cfed23409fe06385cc
|
| 3 |
+
size 177491965
|
APK_train.zip
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:aa9e0b026efd65d916fa3e9f81aaadcf5519e721311d2e7959226721a56d0041
|
| 3 |
+
size 783638534
|
Dot_Net_test.zip
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:b74c4181dbd77565fce16ba47c8ab0f7c7044ae6d880d859ec2c27365dea6299
|
| 3 |
+
size 220481493
|
Dot_Net_train.zip
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:b9f6e90ab75293a7ceb9339700586dd033a03d19766282755ee31dfa0836e625
|
| 3 |
+
size 937108923
|
ELF_test.zip
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:c86fa72164d7ac5d47ac4798d27b65978402f39f8cad0b2186b01ba55d528bfe
|
| 3 |
+
size 16763975
|
ELF_train.zip
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:dd22c65c1a4b6b1c0680717814c74c1569256cf4ef6e7629c1b2b94b8e11afe3
|
| 3 |
+
size 69249829
|
PDF_test.zip
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:953742edb8bbe1f729f32b546c142f8600811a16652822473222e48fc9e826dc
|
| 3 |
+
size 28833740
|
PDF_train.zip
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:83a52378e9e5ea2478832443ff449ecba85050bbda111df074b633f822c8a2de
|
| 3 |
+
size 122602464
|
README.md
ADDED
|
@@ -0,0 +1,121 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
---
|
| 2 |
+
license: apache-2.0
|
| 3 |
+
---
|
| 4 |
+
|
| 5 |
+
# EMBER2024 Dataset
|
| 6 |
+
|
| 7 |
+
EMBER2024 is an update to the [EMBER2017 and EMBER2018](https://github.com/elastic/ember/) datasets. It includes raw features and labels for 3.2 million malicious and benign files from 6 different file types (Win32, Win64, .NET, APK, ELF, and PDF). EMBER2024 is meant to allow researchers to explore a variety of common malware analysis classification tasks. The dataset includes 7 types of labels and tags that support malicious/benign detection, malware family classification, malware behavior prediction, and more.
|
| 8 |
+
|
| 9 |
+
Paper about the classifiers: [https://arxiv.org/pdf/2506.05074](https://arxiv.org/pdf/2506.05074)
|
| 10 |
+
|
| 11 |
+
Instructions for downloading EMBER2024 and training classifiers: [https://github.com/FutureComputing4AI/EMBER2024/](https://github.com/FutureComputing4AI/EMBER2024/)
|
| 12 |
+
|
| 13 |
+
|
| 14 |
+
## EMBER2024 Contents
|
| 15 |
+
|
| 16 |
+
EMBER2024 includes features and labels for malware that was first uploaded to VirusTotal between Sep. 24th, 2023 and Dec. 14th, 2024. There are exactly 50,500 files chosen from each week of that time period, with the first 52 weeks of files making up the training set and the last 12 going to the test set. This lets researchers simulate how effectively a classifier might detect malware that is newer than its training corpus. In total, the training set is 2,626,000 files and the test set is 606,000 files.
|
| 17 |
+
|
| 18 |
+
|
| 19 |
+
#### File Statistics
|
| 20 |
+
|
| 21 |
+
| File Type | Malicious + Benign (Weekly) | Train Total | Test Total |
|
| 22 |
+
| -------- | ------- | ------ | ------- |
|
| 23 |
+
| Win32 | 30,000 | 1,560,000 | 360,000 |
|
| 24 |
+
| Win64 | 10,000 | 520,000 | 120,000 |
|
| 25 |
+
| .NET | 5,000 | 260,000 | 60,000 |
|
| 26 |
+
| APK | 4,000 | 208,000 | 48,000 |
|
| 27 |
+
| PDF | 1,000 | 52,000 | 12,000 |
|
| 28 |
+
| ELF | 500 | 26,000 | 6,000 |
|
| 29 |
+
|
| 30 |
+
|
| 31 |
+
#### Challenge Set
|
| 32 |
+
|
| 33 |
+
EMBER also includes features and labels for 6,315 malicious files in a "challenge set". These files initially went undetected by ~70 antivirus products on VirusTotal but were later found to be malicious. The challenge set is an excellent resource for assessing how well a machine larning classifier is able to detect evasive malware.
|
| 34 |
+
|
| 35 |
+
|
| 36 |
+
## EMBER Feature Version 3
|
| 37 |
+
|
| 38 |
+
The previous EMBER feature versions were pinned to [LIEF](lief.re) version 0.9.0, which requires Python 3.6. EMBER feature version 3 ("thrember") is a re-implementation of the EMBER feature vector format that uses the [pefile](https://github.com/erocarrera/pefile) library instead. pefile is stable and has no dependencies, making it ideal going forward. We have also made several addition to the EMBER feature vector format, which now includes features from the DOS header, Rich header, PE data directories, Authenticode signatures, and warnings during PE parsing. Furthermore, we have added support for feature extraction from non-PE files using a subset of the EMBER feature version 3 format. We show that effective classifiers for APK, ELF, and PDF files can be trained using just features from general file info, byte statistics, and string statistics.
|
| 39 |
+
|
| 40 |
+
## Capa
|
| 41 |
+
|
| 42 |
+
[Capa](https://github.com/mandiant/capa) is a malware analysis tool that identifies a file's potential behaviors. For each file, it outputs Mitre ATT&CK techniques, objectives and behaviors from the Malware Behavior Catalogue Matrix, and other capabilities. An example is shown below.
|
| 43 |
+
|
| 44 |
+
```
|
| 45 |
+
+----------------------+---------------------------------------------------------------------------+
|
| 46 |
+
| ATT&CK Tactic | ATT&CK Technique |
|
| 47 |
+
+----------------------+---------------------------------------------------------------------------+
|
| 48 |
+
| COLLECTION | Clipboard Data [T1115] |
|
| 49 |
+
| | Input Capture::Keylogging [T1056.001] |
|
| 50 |
+
| | Screen Capture [T1113] |
|
| 51 |
+
| DEFENSE EVASION | File and Directory Permissions Modification [T1222] |
|
| 52 |
+
| | Obfuscated Files or Information [T1027] |
|
| 53 |
+
| EXECUTION | Shared Modules [T1129] |
|
| 54 |
+
| PRIVILEGE ESCALATION | Access Token Manipulation [T1134] |
|
| 55 |
+
| ... | ... |
|
| 56 |
+
+----------------------+---------------------------------------------------------------------------+
|
| 57 |
+
|
| 58 |
+
+----------------------+---------------------------------------------------------------------------+
|
| 59 |
+
| MBC Objective | MBC Behavior |
|
| 60 |
+
+----------------------+---------------------------------------------------------------------------+
|
| 61 |
+
| ANTI-BEHAVIORAL ANALYSIS | Debugger Detection::Software Breakpoints [B0001.025] |
|
| 62 |
+
| | Debugger Detection::Timing/Delay Check GetTickCount [B0001.032] |
|
| 63 |
+
| COLLECTION | Keylogging::Polling [F0002.002] |
|
| 64 |
+
| | Screen Capture::WinAPI [E1113.m01] |
|
| 65 |
+
| COMMAND AND CONTROL | C2 Communication::Receive Data [B0030.002] |
|
| 66 |
+
| | C2 Communication::Send Data [B0030.001] |
|
| 67 |
+
| ... | ... |
|
| 68 |
+
+----------------------+---------------------------------------------------------------------------+
|
| 69 |
+
|
| 70 |
+
+----------------------+---------------------------------------------------------------------------+
|
| 71 |
+
| Capability | Namespace |
|
| 72 |
+
+----------------------+---------------------------------------------------------------------------+
|
| 73 |
+
| log keystrokes via polling (9 matches) | collection/keylog |
|
| 74 |
+
| capture screenshot (2 matches) | collection/screenshot |
|
| 75 |
+
| receive data (5 matches) | communication |
|
| 76 |
+
| send data (2 matches) | communication |
|
| 77 |
+
| create HTTP request | communication/http/client |
|
| 78 |
+
| get socket status | communication/socket |
|
| 79 |
+
| ... | ... |
|
| 80 |
+
+----------------------+---------------------------------------------------------------------------+
|
| 81 |
+
```
|
| 82 |
+
|
| 83 |
+
EMBER2024 has been updated to include Capa results for Win32, Win64, .NET, and ELF files.
|
| 84 |
+
|
| 85 |
+
```
|
| 86 |
+
{
|
| 87 |
+
"caps": [
|
| 88 |
+
{"Capability": "Find process by name", "Namespace": "host-interaction/process/list", "Addrs": []},
|
| 89 |
+
{"Capability": "Terminate process", "Namespace": "host-interaction/process/terminate", "Addrs": ["0x6000025"]},
|
| 90 |
+
{"Capability": "Move file", "Namespace": "host-interaction/file-system/move", "Addrs": []},
|
| 91 |
+
...
|
| 92 |
+
],
|
| 93 |
+
"ttps": [
|
| 94 |
+
{"Tactic": "DISCOVERY", "Technique": "Process Discovery [T1057]"},
|
| 95 |
+
{"Tactic": "DISCOVERY", "Technique": "File and Directory Discovery [T1083]"}
|
| 96 |
+
],
|
| 97 |
+
"mbc": [
|
| 98 |
+
{"Objective": "OPERATING SYSTEM", "Behavior": "Console [C0033]"},
|
| 99 |
+
{"Objective": "PROCESS", "Behavior": "Terminate Process [C0018]"},
|
| 100 |
+
{"Objective": "FILE SYSTEM", "Behavior": "Move File [C0063]"},
|
| 101 |
+
{"Objective": "DISCOVERY", "Behavior": "File and Directory Discovery [E1083]"},
|
| 102 |
+
....
|
| 103 |
+
],
|
| 104 |
+
...
|
| 105 |
+
}
|
| 106 |
+
```
|
| 107 |
+
|
| 108 |
+
In many cases, Capa identifies the function(s) that the capability is present in. We created a [supplemental dataset](https://huggingface.co/datasets/joyce8/EMBER2024-capa) with the raw bytes and disassembly of 16,356,790 functions from malicious files in EMBER2024.
|
| 109 |
+
|
| 110 |
+
|
| 111 |
+
## Citing
|
| 112 |
+
|
| 113 |
+
If you use EMBER2024 in your own research, please cite it using:
|
| 114 |
+
|
| 115 |
+
```
|
| 116 |
+
@inproceedings{joyce2025ember,
|
| 117 |
+
title={EMBER2024 - A Benchmark Dataset for Holistic Evaluation of Malware Classifiers},
|
| 118 |
+
author={Robert J. Joyce and Gideon Miller and Phil Roth and Richard Zak and Elliott Zaresky-Williams and Hyrum Anderson and Edward Raff and James Holt},
|
| 119 |
+
year={2025},
|
| 120 |
+
booktitle={Proceedings of the 31st ACM SIGKDD Conference on Knowledge Discovery and Data Mining},
|
| 121 |
+
}
|
Win32_test.zip
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:c05f6562dee3ace4195087be918eb00181e33bc31464c671fb5ba00c9dd5dfdb
|
| 3 |
+
size 2593425203
|
Win32_train.zip
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:6cf9dea847960115f65d405d38b6b09d38c87225c8288dafedf00fed2512b1d4
|
| 3 |
+
size 12321281336
|
Win64_test.zip
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:52a5a05c1bfa5bb021bb8b44c2e0afcf8983dfa1c6c0a9d76db393e5c682ce10
|
| 3 |
+
size 1176459716
|
Win64_train.zip
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:7b050100ce7bd87149bbfca442de3e02d4bf97d51251566caec2581eebe799fd
|
| 3 |
+
size 5853142901
|
challenge.zip
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:dd215997b10596e4397d2b305d54afe9678e91e3051918262f0172b36e40baf1
|
| 3 |
+
size 32144161
|