Professional Documents
Culture Documents
22h51a6263 CS
22h51a6263 CS
AND TECHNOLOGY
Malicious Code
Naming
22H51A6263
Y. ANSHU
CSC – A
What is Malicious Code Naming?
Conclusion
What is Malicious Code
Naming?
Malicious code is the term used to describe any code in any
part of a software system or script that is intended to cause
undesired effects, security breaches or damage to a system.
Naming this Malicious Code is called Malicious Code
Naming.
How different people name it?
Administrators might expect that antivirus detection names would be a good metric to determine the
malicious code family; however, this is often not an accurate or reliable measurement. The media and
researchers often tend to use different names, sometimes even within the malicious code itself, while other
professionals may alter or hide the true name of the virus for their own reasons. Many factors make
analysts the best sources for determining the name of a malicious code over any other currently available
automatic solution. iDefense analysts usually assign a malicious file a new name when nothing previously
describes it or when it provides a more valuable reference point. Other organizations may have different
policies about renaming viruses when they create detections for them because it prevents the revealing of
new hacking tools and techniques to attackers.
Anti-Virus Vendor Virus
Name
AntiVir DR/Delphi.Gen
Avast Win32:Trojan-gen {Other}
AVG VB.FTL
BitDefender Trojan.AgentMB.CSDN4118442
ClamAV Trojan.Downloader-35380
DrWeb Trojan.MulDrop.origin Suspicious:W32/Malware!
F-Secure Gemini Trojan.AgentMB.CSDN4118442
GData Trojan.Win32.VB.ieq
Kaspersky Generic!Artemis
McAfee+Artemis VirTool:Win32/CeeInject.gen!J
Microsoft probably a variant of Win32/Injector.DV
NOD32 Suspicious file
Panda Trojan.Dropper.Delphi.Gen
SecureWeb-Gateway Sus/Dropper-R
Sophos WORM_SOBIG.GEN
TrendMicro Trojan.Win32.VB.ieq
VBA32
Format of Anti-Virus
Family_Name.Group_Name.Major_Variant.
Minor_ Variant[:Modifier]
What are the risks?
Malicious code can cause damage by corrupting files, erasing your hard
drive, and allowing hackers access. Malicious code can include viruses,
Trojan horses, worms, macros, and scripts. Here are some risks of naming
malicious code: