Research Article

Characterizing Anomalies in Malware-Generated HTTP Traffic

Table 10

Top 5 malware families in categories grouped by the number of request groups.

Family nameNumber of request groups

Backdoor
Htbot3
GrayBird2
Dimnie2
Zeprox1
Votwup.D1
Mokes1

Banker
Ursnif27
Dreambot24
Chthonic12
Emotet11
Kronos10

Bruteforce
No-name6
Pifagor2

Clicker
KOVTER6
Zeroaccess4
Sefnit2
Miuref/Boaxxe1

DDoS
DirtJumper17
MegalodonHTTP4
Madness2
MedusaHTTP1

Downloader
Pony21
Nemucod19
SmokeLoader17
Locky12
Zbot11

Downloader/JS
No-name8
Cryxos4

IP check
No-name28

Keylogger
AgentTesla3
Keybase2
KeyLogger.acqh1

Maldoc
No-name16

Malicious download
No-name20

Miner
No-name11
Adylkuzz4
1ms0rry2
Smominru1

Other
FakeAlert.jh3
Ratankba1
Psiphon1
No-name1
DustySky1

PUA/Adware
Wizzcaster3
InstallCapital3
BubbleDock3
Sureseeker2
OfferCast2

Ransomware
Locky38
AlphaCrypt8
PadCrypt4
Sage3
Fatboy3

RAT
Quasar2
XPCSpyPro1
TViewer1
Teamspy1
ShinoBot1

Spambot
Kelihos.F8
Necurs5
XnxxAgent3
Sality3
Tofsee1

Stealer
AZORult11
Loki10
FormBook6
WernikStealer2
Hawkeye2

Trojan
Zbot29
No-name16
Andromeda12
Graftor7
Betabot6

UA problem
No-name26