Abstract
This article presents a dataset for studying the detection of obfuscated malware in volatile computer memory. Several obfuscated reverse remote shells were generated using Metasploit-Framework, Hyperion, and PEScrambler tools. After compromising the host, Memory snapshots of a Windows 10 virtual machine were acquired using the open-source Rekall's WinPmem acquisition tool. The dataset is complemented by memory snapshots of uncompromised virtual machines. The data includes a reference for all running processes as well as a mapping for the designated malware running inside the memory. The datasets are available in the article, for advancing research towards the detection of obfuscated malware from volatile computer memory during a forensic analysis.
| Original language | English |
|---|---|
| Article number | 104437 |
| Journal | Data in Brief |
| Volume | 26 |
| DOIs | |
| State | Published - 1 Oct 2019 |
| Externally published | Yes |
Keywords
- Forensic analysis
- Malware detection
- Memory snapshots
- Obfuscated malware
- System security
ASJC Scopus subject areas
- General