Malware Naming

Malware, with the exception of boot sector viruses and some file infectors, uses the following format:

PREFIX_THREATNAME.SUFFIX

The suffix used in the naming convention indicates the variant of the threat. The suffix assigned to a new threat (meaning the binary code for the threat is not similar to any existing threats) is the alpha character “A.” Subsequent strains are given subsequent suffixes, for example, “B”, “C”,  or “D”. There are also occasions wherein Trend Micro uses special suffixes. For example, .GEN, for generic detection or .DAM if the variant is damaged or malformed.

Prefix

Description

ADW

Adware

ALS

Auto-LISP script malware

ATVX

ActiveX malicious code

BAT

Batch file virus

BHO

Browser Helper Object - A non-destructive toolbar application

BKDR

Backdoor virus

CHM

Compiled HTML file found on malicious Web sites

COOKIE

Cookie used to track a user's Web habits for the purpose of data mining

DIAL

Dialer program

DOS, DDOS

Virus that prevents a user from accessing security and antivirus company Web sites

ELF

Executable and Link format viruses

EXPL

Exploit that does not fit other categories

GENERIC

Memory-resident boot virus

HKTL

Hacking tool

HTML

HTML virus

IRC

Internet Relay Chat malware

JAVA

Java malicious code

JOKE

Joke program

JS

JavaScript virus

NE

File infector

PALM

Palm PDA-based malware

PE

File infector

PERL

Malware, such as a file infector, created in PERL

RAP

Remote access program

REG

Threat that modifies the system registry

RTKT

Rootkit programs

SPYW

Spyware/Grayware

SYMBOS

Trojan that affects telephones using the Symbian operating system

TSPY

Malicious malware

TROJ

Trojan

UNIX

Linux/UNIX script malware

VBS

VBScript virus

WORM

Worm

W2KM, W97M, X97M, P97M, A97M, O97M, WM, XF, XM, V5M, X2KM, X97M

Macro virus