Research Article

An Attribute Extraction for Automated Malware Attack Classification and Detection Using Soft Computing Techniques

Table 1

List of MacOS malware.

S. no.Name of the malwareFunction

1DevnullIt downloads and executes commands, followed by compressed executable code.
2HajimeIt makes an effort to secure assets.
3Linux Spike TrojanIt infiltrates networks and ultimately spreads to certain other networks, resulting in DDoS assaults, MITM attacks, data theft, as well as other kinds of attacks.
4Linux.DaellozBy abusing PHP, It infects networks, video surveillance, and set-top boxes.
5StaogIt uses kernel flaws to get access to residents.
6MiraiIt is capable of infecting consumer electronics including Webcams and edge routers.