Trend Micro™ InterScan™ Gateway Security Appliance M-Series Administrator’s Guide
F
-
6
Malware Naming Formats
Malware, with the exception of boot sector viruses and some file infectors, is named
according to the following format:
PREFIX_THREATNAME.SUFFIX
The suffix used in the naming convention indicates the variant of the threat. The
suffix assigned to a new threat (meaning the binary code for the threat is not similar
to any existing threats) is the alpha character “A.” Subsequent strains are given
subsequent suffixes, for example, “B”, “C,” “D.” Occasionally a threat is assigned a
special suffix, (.GEN, for generic detection or .DAM if the variant is damaged or
malformed).
T
ABLE
F-3.
Malware naming
Prefix
Description
No prefix
Boot sector viruses or file infector
1OH
File infector
ADW
Adware
ALS
Auto-LISP script malware
ATVX
ActiveX malicious code
BAT
Batch file virus
BHO
Browser Helper Object - A non-destructive toolbar application
BKDR
Backdoor virus
CHM
Compiled HTML file found on malicious Web sites
COOKIE
Cookie used to track a user's Web habits for the purpose of data mining
COPY
Worm that copies itself
DI
File infector
DIAL
Dialer program
DOS, DDOS
Virus that prevents a user from accessing security and antivirus company
Web sites
ELF
Executable and Link format viruses
EXPL
Exploit that does not fit other categories
Summary of Contents for InterScan M Series
Page 1: ...InterScan TM Gateway Security Appliance M Series...
Page 2: ......
Page 16: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide xiv...
Page 60: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 2 22...
Page 82: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 3 22...
Page 100: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 4 18...
Page 135: ...SMTP Services 5 35 SMTP Content Filtering Target FIGURE 5 20 SMTP Content Filtering Target...
Page 140: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 5 40...
Page 180: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 6 40...
Page 196: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 7 16...
Page 250: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 10 12...
Page 258: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 11 8...
Page 267: ...Analyzing Your Protection Using Logs 12 9...
Page 268: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 12 10...
Page 366: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 15 46...
Page 372: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide A 6...
Page 428: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide B 56...
Page 446: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide D 6...
Page 448: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide E 2...
Page 460: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide G 4...
Page 480: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide I 20...