You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: unified-secops-platform/malware-naming.md
+55-37Lines changed: 55 additions & 37 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,5 @@
1
1
---
2
2
title: How Microsoft names malware
3
-
ms.reviewer:
4
3
description: Understand the malware naming convention used by Microsoft Defender Antivirus and other Microsoft antimalware.
5
4
ms.service: unified-secops-platform
6
5
ms.localizationpriority: medium
@@ -12,7 +11,7 @@ ms.collection:
12
11
- must-keep
13
12
ms.topic: reference
14
13
search.appverid: met150
15
-
ms.date: 01/29/2024
14
+
ms.date: 05/09/2025
16
15
---
17
16
18
17
# Malware names
@@ -25,30 +24,24 @@ When our analysts research a particular threat, they determine what each of the
25
24
26
25
## Type
27
26
28
-
Describes what the malware does on your computer. Worms, viruses, trojans, backdoors, and ransomware are some of the most common types of malware.
27
+
Type describes what the malware does on your computer. The following are the different types of malware that Microsoft products detect.
28
+
29
+
### Malware
30
+
31
+
Following are the types of malware that Microsoft detects. To know more about how Microsoft defines malware, see [How Microsoft identifies malware and potentially unwanted applications - Malware](criteria.md#malware).
32
+
29
33
```
30
-
* Adware
31
34
* Backdoor
32
-
* Behavior
33
-
* BrowserModifier
34
35
* Constructor
35
36
* DDoS
36
37
* Exploit
37
38
* HackTool
38
39
* Joke
39
-
* Misleading
40
-
* MonitoringTool
41
-
* Program
42
40
* Password Stealer (PWS)
43
41
* Ransom
44
-
* RemoteAccess
45
42
* Rogue
46
-
* SettingsModifier
47
-
* SoftwareBundler
48
43
* Spammer
49
44
* Spoofer
50
-
* Spyware
51
-
* Tool
52
45
* Trojan
53
46
* TrojanClicker
54
47
* TrojanDownloader
@@ -59,6 +52,52 @@ Describes what the malware does on your computer. Worms, viruses, trojans, backd
59
52
* Virus
60
53
* Worm
61
54
```
55
+
56
+
### Unwanted software
57
+
58
+
Following are the types of unwanted software that Microsoft products detect. For more information on what unwanted software is and what is classified as unwanted software, see [Unwanted software](criteria.md#unwanted-software).
59
+
60
+
```
61
+
* Adware
62
+
* BrowserModifier
63
+
* Misleading
64
+
* MonitoringTool
65
+
* Program
66
+
* SoftwareBundler
67
+
* UwS
68
+
```
69
+
70
+
### Potentially unwanted applications
71
+
72
+
Following are the types of potentially unwanted applications (PUAs) that Microsoft products detect. To know what PUAs are, see [Potentially unwanted application (PUA)](criteria.md#potentially-unwanted-application-pua).
73
+
74
+
```
75
+
* PUA
76
+
* App
77
+
* PUAAdvertising
78
+
* PUATorrent
79
+
* PUAMiner
80
+
* PUAMarketing
81
+
* PUABundler
82
+
* PUADlManager
83
+
```
84
+
### Tampering software
85
+
86
+
Tampering software, detected as ***Tampering** are tools that can lower device security. To know more, see [Tampering software](criteria.md#tampering-software).
87
+
88
+
### Vulnerable software
89
+
90
+
Following are the types of vulnerable software that Microsoft products detect. Know more about this detection in [Vulnerable software](criteria.md#vulnerable-software).
91
+
92
+
```
93
+
* Vulnerable
94
+
* VulnerableDriver
95
+
```
96
+
97
+
### Other malware types
98
+
99
+
Microsoft also detects ***Behavior** and ***Tool** types of malware.
100
+
62
101
## Platforms
63
102
64
103
Platforms guide the malware to its compatible operating system (such as Windows, macOS, and Android). The platform's guidance is also used for programming languages and file formats.
@@ -157,29 +196,8 @@ Grouping of malware based on common characteristics, including attribution to th
157
196
158
197
## Variant letter
159
198
160
-
Used sequentially for every distinct version of a malware family. For example, the detection for the variant **".AF"**would have been created after the detection for the variant **".AE"**.
199
+
Used sequentially for every distinct version of a malware family. For example, the detection for the variant **".AF"**is created after the detection for the variant **".AE"**.
161
200
162
201
## Suffixes
163
202
164
-
Provides extra detail about the malware, including how it's used as part of a multicomponent threat. In the preceding example, **"!lnk"** indicates that the threat component is a shortcut file used by Trojan: **Win32/Reveton.T**.
165
-
```
166
-
* .dam: damaged malware
167
-
* .dll: Dynamic Link Library component of a malware
168
-
* .dr: dropper component of a malware
169
-
* .gen: malware that is detected using a generic signature
170
-
* .kit: virus constructor
171
-
* .ldr: loader component of a malware
172
-
* .pak: compressed malware
173
-
* .plugin: plug-in component
174
-
* .remnants: remnants of a virus
175
-
* .worm: worm component of that malware
176
-
* !bit: an internal category used to refer to some threats
177
-
* !cl: an internal category used to refer to some threats
178
-
* !dha: an internal category used to refer to some threats
179
-
* !pfn: an internal category used to refer to some threats
180
-
* !plock: an internal category used to refer to some threats
181
-
* !rfn: an internal category used to refer to some threats
182
-
* !rootkit: rootkit component of that malware
183
-
* @m: worm mailers
184
-
* @mm: mass mailer worm
185
-
```
203
+
A suffix that begins with **!** is an indicator used by Microsoft internally.
0 commit comments