A forum for reverse engineering, OS internals and malware analysis 

Forum for analysis and discussion about malware.
 #26082  by yellowboxtenant
 Mon Jun 15, 2015 2:09 am
I'm searching for a repository of common Windows malware behavioral execution traces. More specifically, I'm searching for behavior on the kernel level - system call traces.

Here is almost what I'm looking for: http://www.domagoj-babic.com/index.php/ ... reAnalysis

Domagoj Babic provides the system call traces for a set of malware files. System call traces are represented as a SDG, system dependency graph.

An entire SDG of a malware file contains all system calls, including the ones that do not help identify suspicious files as malware. I am seeking only the system call traces common amongst corresponding malware families.

This data could be used as test data for pattern-matching against suspicious files.