From 4ab7fce66819d74f6be4703db8518fe326a74d60 Mon Sep 17 00:00:00 2001 From: Amanda Rousseau Date: Mon, 20 Mar 2017 16:47:52 -0700 Subject: [PATCH] adding malware families --- malware.md | 28 ++++++++++++++-------------- 1 file changed, 14 insertions(+), 14 deletions(-) diff --git a/malware.md b/malware.md index febf9dc..faaa447 100644 --- a/malware.md +++ b/malware.md @@ -18,20 +18,20 @@ title: Malware Techniques | Class | Description | | --- | --- | -| ###Virus### | code that propagates (replicates) across systems with user intervention | -| ###Worm | code that self-propagates/replicates across systems without requiring user intervention | -| ###Bot | automated process that interacts with other network services | -| ###Trojan | malware that is often disguised as legitimate software | -| ###Ransomware | malware that holds the victim's data hostage by cryptography or other means | -| ###Rootkit | masks its existence or the existence of other software | -| ###Backdoor | enables a remote attacker to have access to or send commands to a compromised computer | -| ###RAT | Remote Access Trojan, similar to a backdoor | -| ###Info Stealer | steals victims information, passwords, or other personal data | -| ###HackTool | admin tools or programs that may be used by hackers to attack computer systems and networks. These programs are not generally malicious | -| ###Hoax | program may deliver a false warning about a computer virus or install a fake AV | -| ###Dropper/Downloader | designed to "install" or download some sort of malware | -| ###Adware | automatically renders advertisements in order to generate revenue for its author.| -| ###PUP/PUA | Potentially Unwanted Program, sometimes added to a system without the user's knowledge or approval | +| **Virus** | code that propagates (replicates) across systems with user intervention | +| **Worm** | code that self-propagates/replicates across systems without requiring user intervention | +| **Bot** | automated process that interacts with other network services | +| **Trojan** | malware that is often disguised as legitimate software | +| **Ransomware** | malware that holds the victim's data hostage by cryptography or other means | +| **Rootkit** | masks its existence or the existence of other software | +| **Backdoor** | enables a remote attacker to have access to or send commands to a compromised computer | +| **RAT** | Remote Access Trojan, similar to a backdoor | +| **Info Stealer** | steals victims information, passwords, or other personal data | +| **HackTool** | admin tools or programs that may be used by hackers to attack computer systems and networks. These programs are not generally malicious | +| **Hoax** | program may deliver a false warning about a computer virus or install a fake AV | +| **Dropper/Downloader** | designed to "install" or download some sort of malware | +| **Adware** | automatically renders advertisements in order to generate revenue for its author.| +| **PUP/PUA** | Potentially Unwanted Program, sometimes added to a system without the user's knowledge or approval | ## Techniques Overview * [Compression](#compression)