Skip to content

C1air3/MRm-DLDet

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

16 Commits
 
 
 
 
 
 
 
 

Repository files navigation

MRm-DLDet

This is the implementation of the detection framework in our paper.

Dataset

The file named 'Memory-Resident Samples' Hash' shows the sha-256 value of the total 1050 memory-resident malware we collected in this work.

Installation

Dependencies

General

Please install the following tools:

Usage

MRm-DLDet runs without any special installation. However, you have to ensure several things before first usage.

If you would like to create your own models, then you need to setup virtual machines (VMs). Install at least one Windows 10 VM with VMware Workstation. Configure and harden VM as needed. Take a snapshot of the VM, MRm-DLDet will utilize this snapshot as clean base to start samples.

Memory generation (VMware_Control.py)

After placing the malicious and benign samples to be detected in the virtual machine, run this script to roll back the virtual machine to the 'clean' state, and after running the malicious or benign program, this script takes a snapshot of the virtual machine to obtain a memory dump of the malicious samples as they run.

Memory dumps to image (binary2RGBimg.py)

This script covert one dump file to an RGB image.

Cutting Ultra-High Resolution RGB image (cut_photo.py)

Cut Ultra-High Resolution RGB image with non-overlapping sliding window.

Cite Our Paper

Liu Jiaxi, Feng Yun, Liu Xinyu, et al. MRm-DLDet: a memory-resident malware detection framework based on memory forensics and deep neural network[J]. Cybersecurity, 2023, 6(1): 21.

About

Implementation of MRm-DLDet

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages