Research Article
Malware Analysis Using Visualized Image Matrices
| Set | Type | Family | Number of variants |
| A | Email-Worm | Klez | 9 | Trojan-DDos | Boxed | 27 | Trojan-Downloader | IstBar | 41 | Ladder | 5 | Lemmy | 26 | Mediket | 43 | OneClickNetSearch | 11 | Trojan-Dropper | Tab | 8 | Virus | Eva | 6 | Evol | 3 | Fosforo | 4 | Gpcode | 35 | Halen | 7 | Semisoft | 14 | Zepp | 11 | Worm | Deborm | 40 |
| B | Backdoor | Agobot | 40 | Bifrose | 40 | IRCBot | 40 | SdBot | 40 | Trojan | Dialer | 40 | StartPage | 40 | Trojan-Downloader | Banload | 40 | Dyfuca | 40 | Swizzor | 40 | Trojan-Spy | Bancos | 40 | Banker | 40 | Email-Worm | Bagle | 40 | IM-Worm | Kelvir | 40 | P2P-Worm | SpyBot | 40 |
|
|