Cryptocurrency Malware Dataset

Description:
This dataset provides cryptocurrency Malware which can be executed on the MS Windows OS platform. Indeed, this dataset was collected in two different tracks (malware and benign samples). On the malware side, over 500 real-world malware were collected and tagged for Crypto MS Windows as a Portable Executable file from VirusTotal repository, and for benign sample collection, we chose MS Windows Crytpo-wallet and Crypto-miner application from legit sources including Microsoft Store and Coinmarketcap website (https://coinmarketcap.com ), which includes all active Cryptocurrencies. MS Windows malicious cryptocurrency executable samples were collected from well-known repositories like Virus Total and Virus Share. The collected dataset consisted of 200 benign and 500 malware files. All files were initially unpacked and then all samples were decompiled using the Object-dump tool.

Cite this dataset:
@article{YAZDINEJAD2020106630,
title = {Cryptocurrency malware hunting: A deep Recurrent Neural Network approach},
journal = {Applied Soft Computing},
volume = {96},
pages = {106630},
year = {2020},
issn = {1568-4946},
doi = {https://doi.org/10.1016/j.asoc.2020.106630},
url = {https://www.sciencedirect.com/science/article/pii/S1568494620305688},
author = {Abbas Yazdinejad and Hamed HaddadPajouh and Ali Dehghantanha and Reza M. Parizi and Gautam Srivastava and Mu-Yen Chen}
}

Download dataset:
https://github.com/CyberScienceLab/Our-Datasets/tree/master/CryptoMalware