This repository contains malware samples and analysis tools as part of a research project for the Master of Cybersecurity and Threat Intelligence (MCTI) program at the University of Guelph. The project focuses on Advanced Persistent Threat (APT) analysis and includes machine learning classifiers for malware detection.
The presence of these samples is strictly for educational and research purposes.
IMPORTANT:
- Do not execute any files on your personal system or network
- All samples may contain live malware and can cause harm
- Ensure all interactions are conducted in isolated environments
- Use dedicated malware analysis virtual machines
- Collection of APT samples for research
- Organized by threat actor groups
- Includes metadata and analysis reports
- Classic ML implementation for malware detection
- CNN-based classifier for enhanced detection capabilities
- Technical documentation and performance analysis
- Isolated analysis environment
- Proper security controls
- Understanding of malware analysis safety protocols
- Appropriate permissions and research context
Detailed technical reports in the form of Jupyter notebooks are available in the results directory:
results/classic_ML_classifiers/
: Analysis using traditional ML approaches- Support Vector Machines (SVM)
- K-Nearest Neighbors (KNN)
- Decision Trees
- Performance metrics and comparison
results/CNN_ML_classifier/
: Deep learning approach- Convolutional Neural Network implementation
- Training process and hyperparameter tuning
- Comparative analysis with traditional methods
Both notebooks demonstrate the results of training classifiers to predict APT group attribution based on malware characteristics.
By accessing this repository, you agree to:
- Take full responsibility for your actions
- Adhere to ethical guidelines in cybersecurity research
- Use the contents for legitimate research purposes only
- Follow appropriate safety protocols
This project is licensed under the MIT License - see the LICENSE file for details.
For research collaborations or contributions, please follow security protocols and submit pull requests with appropriate documentation.
The authors and the University of Guelph are not responsible for any misuse or damage caused by the contents of this repository. Use at your own risk and responsibility.