Appendix C. Naming of Viruses

When Dr.Web components detect a threat, the notification in the user interface and the report file contain a name of the threat sample given by the specialists of Doctor Web anti-virus laboratory. These names are formed according to certain principles and reflect a threat's design, classes of vulnerable objects, distribution environment (OS and applications), and some other features. Knowing these principles may be useful for understanding software and organizational vulnerabilities of the protected system. The full and constantly updated version of this classification is available at https://vms.drweb.com/classification/.

In certain cases this classification is conventional as some threats can possess several features at the same time. Besides, it should not be considered exhaustive as new types of threats constantly appear, and the classification is made more precise.

The full name of a threat consists of several elements, separated by full stops. Some elements at the beginning of the full name (prefixes) and at the end of it (suffixes) are standard for the accepted classification.

Prefixes

Affected operating systems

The prefixes listed below are used for naming malicious programs infecting executable files of certain operating systems:

Win—16-bit Windows 3.1 programs

Win95—32-bit Windows 95/98/Me programs

WinNT—32-bit Windows NT/2000/XP/Vista/7/8/8.1/10 programs

Win32—32-bit Windows 95/98/Me and NT/2000/XP/Vista/7/8/8.1/10 programs

Win64—64-bit Windows XP/Vista/7/8/8.1/10/11 programs

Win32.NET—programs in Microsoft .NET Framework operating system

OS2—OS/2 programs

Unix—programs in various Unix-based systems

Linux—Linux programs

FreeBSD—FreeBSD programs

SunOS—SunOS (Solaris) programs

Symbian—Symbian OS (mobile OS) programs

Note that some malicious programs can infect programs of one system even if they are designed to operate in another system.

Macrovirus prefixes

The list of prefixes for viruses which infect MS Office objects (the language of the macros infected by such type of virus is specified):

WM—Word Basic (MS Word 6.0-7.0)

XM—VBA3 (MS Excel 5.0-7.0)

W97M—VBA5 (MS Word 8.0), VBA6 (MS Word 9.0)

X97M—VBA5 (MS Excel 8.0), VBA6 (MS Excel 9.0)

A97M—databases of MS Access'97/2000

PP97M—MS PowerPoint presentations

O97M—VBA5 (MS Office'97), VBA6 (MS Office 2000); this virus infects files of more than one component of MS Office

Development languages

The HLL group is used to name threats written in high-level programming languages, such as C, C++, Pascal, Basic, and others. To specify functioning algorithms, the following modifiers can be used:

HLLW—worms

HLLM—mail worms

HLLO—malicious programs overwriting the code of the victim program

HLLP—parasitic viruses

HLLC—companion viruses

The following prefix also refers to development language:

Java—threats designed for the Java virtual machine

Trojan programs (Trojans)

Trojan—a general name for different Trojan programs (Trojans). In many cases the prefixes of this group are used with the Trojan prefix.

PWS—password stealing Trojan

Backdoor—Trojan with RAT-function (Remote Administration Tool—a utility for remote administration)

IRC—Trojan which uses Internet Relay Chat channels

DownLoader—Trojan which secretly downloads different malicious programs from the internet

MulDrop—Trojan which secretly downloads different malicious files contained in its body

Proxy—Trojan which allows a third-party user to work anonymously in the internet via the infected computer

StartPage (synonym: Seeker)—Trojan which makes unauthorized replacement of the browser home page address (start page)

Click—Trojan which redirects a user’s browser to a certain website (or websites)

KeyLogger—a spyware Trojan which logs key strokes; it may send collected data to a malefactor

AVKill—terminates or deletes anti-virus programs, firewalls, etc.

KillFiles, KillDisk, DiskEraser—deletes certain files (all files on drives, files in certain directories, files by certain mask, etc.)

DelWin—deletes files vital for the operation of Windows OS

FormatC—formats drive C (synonym: FormatAll—formats all drives)

KillMBR—corrupts or deletes master boot records (MBR)

KillCMOS—corrupts or deletes CMOS memory

Tool for attacking vulnerabilities

Exploit—a tool exploiting known vulnerabilities of an OS or application to implant a malicious program or perform unauthorized actions

Tools for network attacks

Nuke—tools for network attacks on known vulnerabilities of operating systems leading to abnormal shutdowns of the attacked system

DDoS—agent program for performing a DDoS attack (Distributed Denial Of Service)

FDoS (synonym: Flooder)—Flooder Denial Of Service—programs for performing malicious actions in the internet which use the idea of DDoS attacks; in contrast to DDoS, when several agents on different computers are used simultaneously to attack one victim system, an FDoS program operates as an independent “self-sufficient” program (Flooder Denial of Service).

Script threats

Prefixes of threats written in different scrip languages:

VBS—Visual Basic Script

JS—Java Script

Wscript—Visual Basic Script and/or Java Script

Perl—Perl

PHP—PHP

BAT—MS-DOS command interpreter

Malicious programs

Prefixes of malicious programs that are not viruses:

Adware—an advertising program

Dialer—a dialer program (redirecting modem calls to predefined paid numbers or paid resources)

Joke—a joke program

Program—a potentially dangerous program (riskware)

Tool—a program used for hacking (hacktool)

Miscellaneous

Generic—this prefix is used after another prefix describing the environment or the development method to name a typical representative of this type of threats. Such threat does not possess any characteristic features (such as text strings, special effects, etc.) which could be used to assign it some specific name.

Silly—this prefix was used with different modifiers to name simple featureless viruses in the past.

Suffixes

Suffixes are used to name some specific malicious objects:

generator—an object which is not a virus but a virus generator.

based—a malicious object which is developed with the help of the specified generator or a modified threat. In both cases the names of this type are generic and can define hundreds and sometimes even thousands of threats.

dropper—an object which is not a virus but a container of the given virus.