mayfloret joyce8 commited on
Commit
3357c53
·
verified ·
0 Parent(s):

Duplicate from joyce8/EMBER2024

Browse files

Co-authored-by: Robert J. Joyce <joyce8@users.noreply.huggingface.co>

.gitattributes ADDED
@@ -0,0 +1,59 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ *.7z filter=lfs diff=lfs merge=lfs -text
2
+ *.arrow filter=lfs diff=lfs merge=lfs -text
3
+ *.bin filter=lfs diff=lfs merge=lfs -text
4
+ *.bz2 filter=lfs diff=lfs merge=lfs -text
5
+ *.ckpt filter=lfs diff=lfs merge=lfs -text
6
+ *.ftz filter=lfs diff=lfs merge=lfs -text
7
+ *.gz filter=lfs diff=lfs merge=lfs -text
8
+ *.h5 filter=lfs diff=lfs merge=lfs -text
9
+ *.joblib filter=lfs diff=lfs merge=lfs -text
10
+ *.lfs.* filter=lfs diff=lfs merge=lfs -text
11
+ *.lz4 filter=lfs diff=lfs merge=lfs -text
12
+ *.mds filter=lfs diff=lfs merge=lfs -text
13
+ *.mlmodel filter=lfs diff=lfs merge=lfs -text
14
+ *.model filter=lfs diff=lfs merge=lfs -text
15
+ *.msgpack filter=lfs diff=lfs merge=lfs -text
16
+ *.npy filter=lfs diff=lfs merge=lfs -text
17
+ *.npz filter=lfs diff=lfs merge=lfs -text
18
+ *.onnx filter=lfs diff=lfs merge=lfs -text
19
+ *.ot filter=lfs diff=lfs merge=lfs -text
20
+ *.parquet filter=lfs diff=lfs merge=lfs -text
21
+ *.pb filter=lfs diff=lfs merge=lfs -text
22
+ *.pickle filter=lfs diff=lfs merge=lfs -text
23
+ *.pkl filter=lfs diff=lfs merge=lfs -text
24
+ *.pt filter=lfs diff=lfs merge=lfs -text
25
+ *.pth filter=lfs diff=lfs merge=lfs -text
26
+ *.rar filter=lfs diff=lfs merge=lfs -text
27
+ *.safetensors filter=lfs diff=lfs merge=lfs -text
28
+ saved_model/**/* filter=lfs diff=lfs merge=lfs -text
29
+ *.tar.* filter=lfs diff=lfs merge=lfs -text
30
+ *.tar filter=lfs diff=lfs merge=lfs -text
31
+ *.tflite filter=lfs diff=lfs merge=lfs -text
32
+ *.tgz filter=lfs diff=lfs merge=lfs -text
33
+ *.wasm filter=lfs diff=lfs merge=lfs -text
34
+ *.xz filter=lfs diff=lfs merge=lfs -text
35
+ *.zip filter=lfs diff=lfs merge=lfs -text
36
+ *.zst filter=lfs diff=lfs merge=lfs -text
37
+ *tfevents* filter=lfs diff=lfs merge=lfs -text
38
+ # Audio files - uncompressed
39
+ *.pcm filter=lfs diff=lfs merge=lfs -text
40
+ *.sam filter=lfs diff=lfs merge=lfs -text
41
+ *.raw filter=lfs diff=lfs merge=lfs -text
42
+ # Audio files - compressed
43
+ *.aac filter=lfs diff=lfs merge=lfs -text
44
+ *.flac filter=lfs diff=lfs merge=lfs -text
45
+ *.mp3 filter=lfs diff=lfs merge=lfs -text
46
+ *.ogg filter=lfs diff=lfs merge=lfs -text
47
+ *.wav filter=lfs diff=lfs merge=lfs -text
48
+ # Image files - uncompressed
49
+ *.bmp filter=lfs diff=lfs merge=lfs -text
50
+ *.gif filter=lfs diff=lfs merge=lfs -text
51
+ *.png filter=lfs diff=lfs merge=lfs -text
52
+ *.tiff filter=lfs diff=lfs merge=lfs -text
53
+ # Image files - compressed
54
+ *.jpg filter=lfs diff=lfs merge=lfs -text
55
+ *.jpeg filter=lfs diff=lfs merge=lfs -text
56
+ *.webp filter=lfs diff=lfs merge=lfs -text
57
+ # Video files - compressed
58
+ *.mp4 filter=lfs diff=lfs merge=lfs -text
59
+ *.webm filter=lfs diff=lfs merge=lfs -text
APK_test.zip ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:caadda48f332dd2dae425c7e33d04aa66f28286431c9e4cfed23409fe06385cc
3
+ size 177491965
APK_train.zip ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:aa9e0b026efd65d916fa3e9f81aaadcf5519e721311d2e7959226721a56d0041
3
+ size 783638534
Dot_Net_test.zip ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:b74c4181dbd77565fce16ba47c8ab0f7c7044ae6d880d859ec2c27365dea6299
3
+ size 220481493
Dot_Net_train.zip ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:b9f6e90ab75293a7ceb9339700586dd033a03d19766282755ee31dfa0836e625
3
+ size 937108923
ELF_test.zip ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:c86fa72164d7ac5d47ac4798d27b65978402f39f8cad0b2186b01ba55d528bfe
3
+ size 16763975
ELF_train.zip ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:dd22c65c1a4b6b1c0680717814c74c1569256cf4ef6e7629c1b2b94b8e11afe3
3
+ size 69249829
PDF_test.zip ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:953742edb8bbe1f729f32b546c142f8600811a16652822473222e48fc9e826dc
3
+ size 28833740
PDF_train.zip ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:83a52378e9e5ea2478832443ff449ecba85050bbda111df074b633f822c8a2de
3
+ size 122602464
README.md ADDED
@@ -0,0 +1,121 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ ---
2
+ license: apache-2.0
3
+ ---
4
+
5
+ # EMBER2024 Dataset
6
+
7
+ EMBER2024 is an update to the [EMBER2017 and EMBER2018](https://github.com/elastic/ember/) datasets. It includes raw features and labels for 3.2 million malicious and benign files from 6 different file types (Win32, Win64, .NET, APK, ELF, and PDF). EMBER2024 is meant to allow researchers to explore a variety of common malware analysis classification tasks. The dataset includes 7 types of labels and tags that support malicious/benign detection, malware family classification, malware behavior prediction, and more.
8
+
9
+ Paper about the classifiers: [https://arxiv.org/pdf/2506.05074](https://arxiv.org/pdf/2506.05074)
10
+
11
+ Instructions for downloading EMBER2024 and training classifiers: [https://github.com/FutureComputing4AI/EMBER2024/](https://github.com/FutureComputing4AI/EMBER2024/)
12
+
13
+
14
+ ## EMBER2024 Contents
15
+
16
+ EMBER2024 includes features and labels for malware that was first uploaded to VirusTotal between Sep. 24th, 2023 and Dec. 14th, 2024. There are exactly 50,500 files chosen from each week of that time period, with the first 52 weeks of files making up the training set and the last 12 going to the test set. This lets researchers simulate how effectively a classifier might detect malware that is newer than its training corpus. In total, the training set is 2,626,000 files and the test set is 606,000 files.
17
+
18
+
19
+ #### File Statistics
20
+
21
+ | File Type | Malicious + Benign (Weekly) | Train Total | Test Total |
22
+ | -------- | ------- | ------ | ------- |
23
+ | Win32 | 30,000 | 1,560,000 | 360,000 |
24
+ | Win64 | 10,000 | 520,000 | 120,000 |
25
+ | .NET | 5,000 | 260,000 | 60,000 |
26
+ | APK | 4,000 | 208,000 | 48,000 |
27
+ | PDF | 1,000 | 52,000 | 12,000 |
28
+ | ELF | 500 | 26,000 | 6,000 |
29
+
30
+
31
+ #### Challenge Set
32
+
33
+ EMBER also includes features and labels for 6,315 malicious files in a "challenge set". These files initially went undetected by ~70 antivirus products on VirusTotal but were later found to be malicious. The challenge set is an excellent resource for assessing how well a machine larning classifier is able to detect evasive malware.
34
+
35
+
36
+ ## EMBER Feature Version 3
37
+
38
+ The previous EMBER feature versions were pinned to [LIEF](lief.re) version 0.9.0, which requires Python 3.6. EMBER feature version 3 ("thrember") is a re-implementation of the EMBER feature vector format that uses the [pefile](https://github.com/erocarrera/pefile) library instead. pefile is stable and has no dependencies, making it ideal going forward. We have also made several addition to the EMBER feature vector format, which now includes features from the DOS header, Rich header, PE data directories, Authenticode signatures, and warnings during PE parsing. Furthermore, we have added support for feature extraction from non-PE files using a subset of the EMBER feature version 3 format. We show that effective classifiers for APK, ELF, and PDF files can be trained using just features from general file info, byte statistics, and string statistics.
39
+
40
+ ## Capa
41
+
42
+ [Capa](https://github.com/mandiant/capa) is a malware analysis tool that identifies a file's potential behaviors. For each file, it outputs Mitre ATT&CK techniques, objectives and behaviors from the Malware Behavior Catalogue Matrix, and other capabilities. An example is shown below.
43
+
44
+ ```
45
+ +----------------------+---------------------------------------------------------------------------+
46
+ | ATT&CK Tactic | ATT&CK Technique |
47
+ +----------------------+---------------------------------------------------------------------------+
48
+ | COLLECTION | Clipboard Data [T1115] |
49
+ | | Input Capture::Keylogging [T1056.001] |
50
+ | | Screen Capture [T1113] |
51
+ | DEFENSE EVASION | File and Directory Permissions Modification [T1222] |
52
+ | | Obfuscated Files or Information [T1027] |
53
+ | EXECUTION | Shared Modules [T1129] |
54
+ | PRIVILEGE ESCALATION | Access Token Manipulation [T1134] |
55
+ | ... | ... |
56
+ +----------------------+---------------------------------------------------------------------------+
57
+
58
+ +----------------------+---------------------------------------------------------------------------+
59
+ | MBC Objective | MBC Behavior |
60
+ +----------------------+---------------------------------------------------------------------------+
61
+ | ANTI-BEHAVIORAL ANALYSIS | Debugger Detection::Software Breakpoints [B0001.025] |
62
+ | | Debugger Detection::Timing/Delay Check GetTickCount [B0001.032] |
63
+ | COLLECTION | Keylogging::Polling [F0002.002] |
64
+ | | Screen Capture::WinAPI [E1113.m01] |
65
+ | COMMAND AND CONTROL | C2 Communication::Receive Data [B0030.002] |
66
+ | | C2 Communication::Send Data [B0030.001] |
67
+ | ... | ... |
68
+ +----------------------+---------------------------------------------------------------------------+
69
+
70
+ +----------------------+---------------------------------------------------------------------------+
71
+ | Capability | Namespace |
72
+ +----------------------+---------------------------------------------------------------------------+
73
+ | log keystrokes via polling (9 matches) | collection/keylog |
74
+ | capture screenshot (2 matches) | collection/screenshot |
75
+ | receive data (5 matches) | communication |
76
+ | send data (2 matches) | communication |
77
+ | create HTTP request | communication/http/client |
78
+ | get socket status | communication/socket |
79
+ | ... | ... |
80
+ +----------------------+---------------------------------------------------------------------------+
81
+ ```
82
+
83
+ EMBER2024 has been updated to include Capa results for Win32, Win64, .NET, and ELF files.
84
+
85
+ ```
86
+ {
87
+ "caps": [
88
+ {"Capability": "Find process by name", "Namespace": "host-interaction/process/list", "Addrs": []},
89
+ {"Capability": "Terminate process", "Namespace": "host-interaction/process/terminate", "Addrs": ["0x6000025"]},
90
+ {"Capability": "Move file", "Namespace": "host-interaction/file-system/move", "Addrs": []},
91
+ ...
92
+ ],
93
+ "ttps": [
94
+ {"Tactic": "DISCOVERY", "Technique": "Process Discovery [T1057]"},
95
+ {"Tactic": "DISCOVERY", "Technique": "File and Directory Discovery [T1083]"}
96
+ ],
97
+ "mbc": [
98
+ {"Objective": "OPERATING SYSTEM", "Behavior": "Console [C0033]"},
99
+ {"Objective": "PROCESS", "Behavior": "Terminate Process [C0018]"},
100
+ {"Objective": "FILE SYSTEM", "Behavior": "Move File [C0063]"},
101
+ {"Objective": "DISCOVERY", "Behavior": "File and Directory Discovery [E1083]"},
102
+ ....
103
+ ],
104
+ ...
105
+ }
106
+ ```
107
+
108
+ In many cases, Capa identifies the function(s) that the capability is present in. We created a [supplemental dataset](https://huggingface.co/datasets/joyce8/EMBER2024-capa) with the raw bytes and disassembly of 16,356,790 functions from malicious files in EMBER2024.
109
+
110
+
111
+ ## Citing
112
+
113
+ If you use EMBER2024 in your own research, please cite it using:
114
+
115
+ ```
116
+ @inproceedings{joyce2025ember,
117
+ title={EMBER2024 - A Benchmark Dataset for Holistic Evaluation of Malware Classifiers},
118
+ author={Robert J. Joyce and Gideon Miller and Phil Roth and Richard Zak and Elliott Zaresky-Williams and Hyrum Anderson and Edward Raff and James Holt},
119
+ year={2025},
120
+ booktitle={Proceedings of the 31st ACM SIGKDD Conference on Knowledge Discovery and Data Mining},
121
+ }
Win32_test.zip ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:c05f6562dee3ace4195087be918eb00181e33bc31464c671fb5ba00c9dd5dfdb
3
+ size 2593425203
Win32_train.zip ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:6cf9dea847960115f65d405d38b6b09d38c87225c8288dafedf00fed2512b1d4
3
+ size 12321281336
Win64_test.zip ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:52a5a05c1bfa5bb021bb8b44c2e0afcf8983dfa1c6c0a9d76db393e5c682ce10
3
+ size 1176459716
Win64_train.zip ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:7b050100ce7bd87149bbfca442de3e02d4bf97d51251566caec2581eebe799fd
3
+ size 5853142901
challenge.zip ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:dd215997b10596e4397d2b305d54afe9678e91e3051918262f0172b36e40baf1
3
+ size 32144161