Memory snapshot dataset of a compromised host with malware using obfuscation evasion techniques

Ibrahim Sadek, Penny Chong, Shafiq Ul Rehman, Yuval Elovici, Alexander Binder

Research output: Contribution to journalArticlepeer-review

4 Scopus citations

Abstract

This article presents a dataset for studying the detection of obfuscated malware in volatile computer memory. Several obfuscated reverse remote shells were generated using Metasploit-Framework, Hyperion, and PEScrambler tools. After compromising the host, Memory snapshots of a Windows 10 virtual machine were acquired using the open-source Rekall's WinPmem acquisition tool. The dataset is complemented by memory snapshots of uncompromised virtual machines. The data includes a reference for all running processes as well as a mapping for the designated malware running inside the memory. The datasets are available in the article, for advancing research towards the detection of obfuscated malware from volatile computer memory during a forensic analysis.

Original languageEnglish
Article number104437
JournalData in Brief
Volume26
DOIs
StatePublished - 1 Oct 2019
Externally publishedYes

Keywords

  • Forensic analysis
  • Malware detection
  • Memory snapshots
  • Obfuscated malware
  • System security

ASJC Scopus subject areas

  • General

Fingerprint

Dive into the research topics of 'Memory snapshot dataset of a compromised host with malware using obfuscation evasion techniques'. Together they form a unique fingerprint.

Cite this