Name | Last modified | Size | Description | |
---|---|---|---|---|
Parent Directory | - | |||
RAT04_SpyMAX.zip | 2021-05-07 15:53 | 83M | ||
RAT01_AndroidTester.zip | 2021-05-07 15:53 | 77M | ||
RAT03_HawkShaw.zip | 2021-05-07 15:53 | 75M | ||
RAT02_DroidJack.zip | 2021-06-27 09:15 | 56M | ||
RAT06_Saefko.zip | 2021-05-07 15:53 | 47M | ||
RAT07_AhMyth.zip | 2021-05-07 15:53 | 38M | ||
RAT05_AndroRAT.zip | 2021-05-07 15:53 | 30M | ||
RAT08_cli_AndroRAT.zip | 2021-05-07 15:53 | 3.3M | ||
README.html | 2021-06-27 09:16 | 3.3K | ||
README.md | 2021-06-27 09:16 | 2.8K | ||
RAT08_cli_AndroRAT/ | 2023-04-18 09:32 | - | ||
RAT07_AhMyth/ | 2023-04-18 09:32 | - | ||
RAT06_Saefko/ | 2023-04-18 09:31 | - | ||
RAT05_AndroRAT/ | 2023-04-18 09:30 | - | ||
RAT04_SpyMAX/ | 2023-04-18 09:28 | - | ||
RAT03_HawkShaw/ | 2023-04-18 09:28 | - | ||
RAT02_DroidJack/ | 2023-04-18 09:27 | - | ||
RAT01_AndroidTester/ | 2023-04-18 09:26 | - | ||
The Android Mischief Dataset is a dataset of network traffic from mobile phones infected with Android Remote Access Trojans (RATs). Its goal is to offer the community the dataset to learn and analyze the network behaviour of RATs and propose new detections. Current version of the dataset includes 8 packet captures from 8 executed Android RATs. Android Mischief Dataset was done in the Stratosphere Laboratory, Czech Technical University in Prague.
RATs executed:
Dataset files for each executed RAT:
The phone was using the Emergency VPN (https://www.civilsphereproject.org/emergency-vpn) to capture its traffic. All captures were done in CEST time (GMT+2). Which means that your tools looking at the pcap files may show a different time depending on your time zone. Since the time of capture inside the pcap file is 000000, then if you are in timezone GMT+1, you will see in your tools the packets with 1hs less of when they were captured. The real capture time is in the log file.
Firstly, the second version of Android Mischief Dataset present two more RATs that were not in the first version, namely RAT06_Saefko and RAT08_cli_AndroRAT. Secondly, each RAT packet capture was fixed using the command tcpdump -r <file.pcap> -w <file-fixed.pcap>. This command allows to fix the packets that were cut when terminating a capture. Lastly, each RAT folder contains a new folder with Zeek generated logs after running Zeek on a pcap.
If you have any questions or you want source code of RATs and their requirements, do not hesitate to contact me kamifai14@gmail.com.