Research Article
Malware Analysis Using Visualized Image Matrices
Table 3
Arbitrarily selected malware samples as unknown.
| Number | Malware sample | Most similar family (similarity) |
| 1 | Klez.j | Klez | (0.181) | 2 | Boxed.g | Boxed | (0.190) | 3 | IstBar.gvf | IstBar | (0.302) | 4 | Ladder.f | Ladder | (0.339) | 5 | Lemmy.z | Lemmy | (0.341) | 6 | Mediket.ec | Mediket | (0.325) | 7 | OneClickNetSearch.k | OneClickNetSearch | (0.268) | 8 | Tab.gd | Tab | (0.348) | 9 | Eva.g | Eva | (0.317) | 10 | Evol.c | Evol | (0.329) | 11 | Fosforo.d | Fosforo | (0.341) | 12 | Gpcode.x | Gpcode | (0.306) | 13 | Halen.2619 | Halen | (0.352) | 14 | Semisoft.n | Semisoft | (0.281) | 15 | Zepp.d | Zepp | (0.265) | 16 | Deborm.ai | Deborm | (0.339) | 17 | Agobot.02.a | Mediket | (0.042) | 18 | SdBot.04.a | Boxed | (0.054) |
|
|