Skip to content

Commit 6460f12

Browse files
authored
Merge pull request #3714 from diannegali/docs-editor/malware-naming-1746803711
Update malware-naming.md
2 parents d222e94 + 05f2102 commit 6460f12

File tree

1 file changed

+55
-37
lines changed

1 file changed

+55
-37
lines changed

unified-secops-platform/malware-naming.md

Lines changed: 55 additions & 37 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,5 @@
11
---
22
title: How Microsoft names malware
3-
ms.reviewer:
43
description: Understand the malware naming convention used by Microsoft Defender Antivirus and other Microsoft antimalware.
54
ms.service: unified-secops-platform
65
ms.localizationpriority: medium
@@ -12,7 +11,7 @@ ms.collection:
1211
- must-keep
1312
ms.topic: reference
1413
search.appverid: met150
15-
ms.date: 01/29/2024
14+
ms.date: 05/09/2025
1615
---
1716

1817
# Malware names
@@ -25,30 +24,24 @@ When our analysts research a particular threat, they determine what each of the
2524

2625
## Type
2726

28-
Describes what the malware does on your computer. Worms, viruses, trojans, backdoors, and ransomware are some of the most common types of malware.
27+
Type describes what the malware does on your computer. The following are the different types of malware that Microsoft products detect.
28+
29+
### Malware
30+
31+
Following are the types of malware that Microsoft detects. To know more about how Microsoft defines malware, see [How Microsoft identifies malware and potentially unwanted applications - Malware](criteria.md#malware).
32+
2933
```
30-
* Adware
3134
* Backdoor
32-
* Behavior
33-
* BrowserModifier
3435
* Constructor
3536
* DDoS
3637
* Exploit
3738
* HackTool
3839
* Joke
39-
* Misleading
40-
* MonitoringTool
41-
* Program
4240
* Password Stealer (PWS)
4341
* Ransom
44-
* RemoteAccess
4542
* Rogue
46-
* SettingsModifier
47-
* SoftwareBundler
4843
* Spammer
4944
* Spoofer
50-
* Spyware
51-
* Tool
5245
* Trojan
5346
* TrojanClicker
5447
* TrojanDownloader
@@ -59,6 +52,52 @@ Describes what the malware does on your computer. Worms, viruses, trojans, backd
5952
* Virus
6053
* Worm
6154
```
55+
56+
### Unwanted software
57+
58+
Following are the types of unwanted software that Microsoft products detect. For more information on what unwanted software is and what is classified as unwanted software, see [Unwanted software](criteria.md#unwanted-software).
59+
60+
```
61+
* Adware
62+
* BrowserModifier
63+
* Misleading
64+
* MonitoringTool
65+
* Program
66+
* SoftwareBundler
67+
* UwS
68+
```
69+
70+
### Potentially unwanted applications
71+
72+
Following are the types of potentially unwanted applications (PUAs) that Microsoft products detect. To know what PUAs are, see [Potentially unwanted application (PUA)](criteria.md#potentially-unwanted-application-pua).
73+
74+
```
75+
* PUA
76+
* App
77+
* PUAAdvertising
78+
* PUATorrent
79+
* PUAMiner
80+
* PUAMarketing
81+
* PUABundler
82+
* PUADlManager
83+
```
84+
### Tampering software
85+
86+
Tampering software, detected as ***Tampering** are tools that can lower device security. To know more, see [Tampering software](criteria.md#tampering-software).
87+
88+
### Vulnerable software
89+
90+
Following are the types of vulnerable software that Microsoft products detect. Know more about this detection in [Vulnerable software](criteria.md#vulnerable-software).
91+
92+
```
93+
* Vulnerable
94+
* VulnerableDriver
95+
```
96+
97+
### Other malware types
98+
99+
Microsoft also detects ***Behavior** and ***Tool** types of malware.
100+
62101
## Platforms
63102

64103
Platforms guide the malware to its compatible operating system (such as Windows, macOS, and Android). The platform's guidance is also used for programming languages and file formats.
@@ -157,29 +196,8 @@ Grouping of malware based on common characteristics, including attribution to th
157196

158197
## Variant letter
159198

160-
Used sequentially for every distinct version of a malware family. For example, the detection for the variant **".AF"** would have been created after the detection for the variant **".AE"**.
199+
Used sequentially for every distinct version of a malware family. For example, the detection for the variant **".AF"** is created after the detection for the variant **".AE"**.
161200

162201
## Suffixes
163202

164-
Provides extra detail about the malware, including how it's used as part of a multicomponent threat. In the preceding example, **"!lnk"** indicates that the threat component is a shortcut file used by Trojan: **Win32/Reveton.T**.
165-
```
166-
* .dam: damaged malware
167-
* .dll: Dynamic Link Library component of a malware
168-
* .dr: dropper component of a malware
169-
* .gen: malware that is detected using a generic signature
170-
* .kit: virus constructor
171-
* .ldr: loader component of a malware
172-
* .pak: compressed malware
173-
* .plugin: plug-in component
174-
* .remnants: remnants of a virus
175-
* .worm: worm component of that malware
176-
* !bit: an internal category used to refer to some threats
177-
* !cl: an internal category used to refer to some threats
178-
* !dha: an internal category used to refer to some threats
179-
* !pfn: an internal category used to refer to some threats
180-
* !plock: an internal category used to refer to some threats
181-
* !rfn: an internal category used to refer to some threats
182-
* !rootkit: rootkit component of that malware
183-
* @m: worm mailers
184-
* @mm: mass mailer worm
185-
```
203+
A suffix that begins with **!** is an indicator used by Microsoft internally.

0 commit comments

Comments
 (0)