Published November 22, 2021 | Version v1
Dataset Restricted

MS Office decoy images

  • 1. Universitat Rovira i Virgili
  • 2. Hatching
  • 3. University of Piraeus

Description

The dataset contains the images extracted from MS Office files (e.g. DOCX, XLSX) from several malicious campaigns (e.g. Emotet, Dridex) and can be used as an IOC. You may refer to https://arxiv.org/abs/2103.16143 for further details or to BlindDoctor for a practical implementation of the methodology.

Files

Restricted

The record is publicly accessible, but files are restricted to users with access.

Request access

If you would like to request access to these files, please fill out the form below.

You need to satisfy these conditions in order for this request to be accepted:

Access available upon request to researchers.

You are currently not logged in. Do you have an account? Log in here

Additional details

Funding

European Commission
LOCARD - Lawful evidence collecting and continuity platform development 832735
European Commission
CyberSec4Europe - Cyber Security Network of Competence Centres for Europe 830929