Datasets:
Dataset Card for Ransomware PE Header Feature Dataset
Dataset Description
Dataset Summary
This dataset contains PE header features (first 1024 bytes) from 2,157 Windows executable samples, comprising 1,134 legitimate software (goodware) and 1,023 ransomware samples across 25 ransomware families. Each sample is represented by numerical features extracted from the raw PE header.
Supported Tasks
- Binary Classification: Distinguish between goodware and ransomware
- Multi-class Classification: Identify specific ransomware families
- Malware Detection: Train ML models for ransomware detection systems
Languages
The dataset contains binary executable files; documentation is in English.
Dataset Structure
Data Instances
Each row contains:
ID: Sample identifierfilename: Original filename or SHA-256 hashGR: Target class (0=goodware, 1=ransomware)family: Family ID (0 for goodware, 1-25 for ransomware families)0-1023: Numerical features (byte values 0-255) from PE header
Data Fields
- ID: Integer identifier (10000-11133 for goodware, 20000-21022 for ransomware)
- filename: String (executable name for goodware, SHA-256 hash for ransomware)
- GR: Binary integer (0 or 1)
- family: Integer (0-25)
- 0 through 1023: Integer features (0-255 range)
Ransomware Families
The dataset includes 25 ransomware families: Avaddon, Babuk, Blackmatter, Conti, Darkside, Dharma, Doppelpaymer, Exorcist, Gandcrab, Lockbit, Makop, Maze, Mountlocker, Nefilim, Netwalker, Phobos, Pysa, Ragnarok, RansomeXX, Revil, Ryuk, Stop, Thanos, Wastedlocker, and Zeppelin.
Dataset Creation
Source Data
- Ransomware: Downloaded from VirusShare and Hybrid-Analysis databases
- Goodware: Collected from PortableApps, Softonic, Windows 10 system files, and verified no-install software
- Verification: All goodware scanned with ESET NOD32 Antivirus v15.1.12.0
Annotation Process
Ransomware samples were categorized using VirusTotal engine detections with three criteria:
- At least 45 engines flagged as malicious
- At least 15 engines flagged as ransomware
- At least 10 engines nominated the same family
Considerations for Using the Data
Discussion of Biases
- Dataset reflects ransomware families active during 2020-2021 period
- Sample selection based on availability in public malware repositories
- Goodware primarily consists of portable/no-install applications
Other Known Limitations
- PE header features only (first 1024 bytes); no full binary analysis
- File sizes range from 14.8 kB to 12.2 MB
- Windows executables only
Additional Information
Dataset Curators
Moreira, C.C., Moreira, D.C., Sales Jr., C. de S. de
Licensing Information
CC BY 4.0 - You are free to share and adapt the material with appropriate attribution.
Citation Information
- Downloads last month
- 12