Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 10

CMR COLLEGE OF ENGINEERING

AND TECHNOLOGY

Malicious Code
Naming
22H51A6263
Y. ANSHU
CSC – A
What is Malicious Code Naming?

CONTENTS How different people name it..

What you need to know Anti-Virus Vendor and Virus Name


Table..

Format for Anti-Virus..

What are the risks?

Conclusion
What is Malicious Code
Naming?
Malicious code is the term used to describe any code in any
part of a software system or script that is intended to cause
undesired effects, security breaches or damage to a system.
Naming this Malicious Code is called Malicious Code
Naming.
How different people name it?
Administrators might expect that antivirus detection names would be a good metric to determine the
malicious code family; however, this is often not an accurate or reliable measurement. The media and
researchers often tend to use different names, sometimes even within the malicious code itself, while other
professionals may alter or hide the true name of the virus for their own reasons. Many factors make
analysts the best sources for determining the name of a malicious code over any other currently available
automatic solution. iDefense analysts usually assign a malicious file a new name when nothing previously
describes it or when it provides a more valuable reference point. Other organizations may have different
policies about renaming viruses when they create detections for them because it prevents the revealing of
new hacking tools and techniques to attackers.
Anti-Virus Vendor Virus
Name
AntiVir DR/Delphi.Gen
Avast Win32:Trojan-gen {Other}
AVG VB.FTL
BitDefender Trojan.AgentMB.CSDN4118442
ClamAV Trojan.Downloader-35380
DrWeb Trojan.MulDrop.origin Suspicious:W32/Malware!
F-Secure Gemini Trojan.AgentMB.CSDN4118442
GData Trojan.Win32.VB.ieq
Kaspersky Generic!Artemis
McAfee+Artemis VirTool:Win32/CeeInject.gen!J
Microsoft probably a variant of Win32/Injector.DV
NOD32 Suspicious file
Panda Trojan.Dropper.Delphi.Gen
SecureWeb-Gateway Sus/Dropper-R
Sophos WORM_SOBIG.GEN
TrendMicro Trojan.Win32.VB.ieq
VBA32
Format of Anti-Virus
Family_Name.Group_Name.Major_Variant.
Minor_ Variant[:Modifier]
What are the risks?
Malicious code can cause damage by corrupting files, erasing your hard
drive, and allowing hackers access. Malicious code can include viruses,
Trojan horses, worms, macros, and scripts. Here are some risks of naming
malicious code:

• Stealing personal information


• Causing extreme damage to network resources
• Delivering spam, altering your web browser, slowing down your
PC, and serving up a bounty of pop-up ads
Conclusion

Administrators should attempt to understand abbreviations and standard naming


conventions for incidents because it may help them look for certain behavior or ask
questions; however, dependence on virus naming is not reliable or capable of conveying
enough informationtobe very useful. Analysts and reverse engineers are still the best
sources for identifying virus families because of the high variation of names assigned to
viruses.
THANK
YOU
References
• https://www.sangfor.com/glossary/cybersecurity/what-is-malicious-code#:~:text=Malicious%20code%20is%20a
ny%20type,actors%20to%20communicate%20with%20computers
.
• https://www.google.com/url?sa=i&url=https%3A%2F%2Fblog.checkpoint.com%2Fsecuring-the-cloud
%2Fmalicious-vscode-extensions-with-more-than-45k-downloads-steal-pii-and-enable-backdoors
%2F&psig=AOvVaw2nfzchzcoUrBTPzEY0Zvzs&ust=1711247455035000&source=images&cd=vfe&opi=8997
8449&ved=0CBIQjRxqFwoTCMC3k9eriYUDFQAAAAAdAAAAABAE
• https://www.veracode.com/security/malicious-code
• https://www.geeksforgeeks.org/malware-and-its-types/

You might also like