http://download.nai.com/products/datfiles/4.x/nai/readme.txt
A97M/ Macro virus that infects Microsoft
Access 97 files.
APM/ Macro virus or Trojan horse program
that infects Ami Pro document and
template files.
Bat/ Batch-file virus or Trojan horse
program. These viruses usually run
as batch or script files that
affect a particular program that
interprets the script or batch
commands they include. They are
very portable and can affect nearly
any platform that can run batch or
script files. The files themselves
often have a .bat extension.
CSC/ Corel Script virus or Trojan horse
program that infects Corel Draw
document files, template files, and
scripts.
IRC/ Internet Relay Chat script virus.
This virus type can use early
versions of the mIRC client
software to distribute a virus or
payload.
JS/ Script virus or Trojan horse
program written in JavaScript
language.
JV/ Potentially harmful Java
application or applet.
Linux/ Virus or Trojan horse program
compiled for Linux operating system
in ELF file format.
LWP/ Potentially harmful software for
Lotus WordPro.
MacHC/ Virus or Trojan horse program for
Apple Macintosh HyperCard scripting
language.
MacOS/ Virus or Trojan horse program for
Apple Macintosh OS versions 6-9.
MSIL/ Application written using Microsoft
Intermediate Language framework,
also known as .NET.
P98M/ Macro virus or Trojan horse program
that infects Microsoft Project
documents and templates.
PalmOS/ Virus or Trojan horse program for a
Palm Pilot.
PDF/ File-infector of Adobe PDF files.
Perl/ Script virus or Trojan horse
program written in Perl language.
PHP/ Script virus or Trojan horse
program written in PHP language.
PP97M/ Macro virus. Infects Microsoft
PowerPoint 97 files.
RDN/ Denoting the malware signature
was authored by McAfee Automation system.
SunOS/ Potentially harmful software for
Sun Solaris.
SWF/ Potentially harmful software for
Shockwave.
Unix/ Program or a shell script for a
version of UNIX.
V5M/ Macro or script virus, or
Trojan horse program that infects
Visio VBA (Visual Basic for
Applications) macros or scripts.
VBS/ Script virus or Trojan horse
program written in Visual Basic
Script language.
W16/ File-infector virus that runs in
16-bit Microsoft Windows
environments (Windows 3.1x).
W2K/ Potentially harmful software for
32-bit Microsoft Windows
environments, specifically Windows
NT, 2000, or XP.
W32/ File-infector or boot-sector virus
that runs in 32-bit Microsoft
Windows environments (Windows 95,
Windows 98, or Windows NT).
W95/ File-infector virus that runs in
Microsoft Windows 95, Windows 98,
and Windows ME environments.
W97M/ Macro virus that infects Microsoft
Word 97 files.
WHLP/ Potentially harmful software for
32-bit Microsoft Windows
environments that target Windows
HLP files.
WM/ Macro virus that infects Microsoft
Word 95 files.
X97M/ Macro virus that infects Microsoft
Excel 97 files.
XF/ Macro virus that infects Microsoft
Excel 95 or 97 via Excel formulas.
XM/ Macro virus that infects Microsoft
Excel 95 files.
AdClicker - Repeatedly accesses websites that
are funded by advertising.
Adware - Installs advertising software but
does not ask permission.
BackDoor - Provides remote access or control
through the Internet or network.
Dialer - Dials a phone number without
asking for permission.
DDoS - Operates as a Distributed Denial of
Service component.
Del - Deletes files.
Downloader - Downloads software from the
Internet, usually to deliver
backdoors, password stealers, and
sometimes viruses.
Exploit - Uses a vulnerability or a software
defect.
FDoS - Denotes a Flooding Denial of
Service component.
KeyLog - Logs keystrokes for immediate or
future transmission to the
attacker.
Kit - Denotes a program designed for
creating a virus or Trojan horse
program.
MultiDropper - Drops several Trojan horse programs
or viruses (often several different
‘backdoors’).
Nuke - Uses defects in software installed
on a remote computer to bring it down.
ProcKill - Terminates the processes of
anti-virus and security products.
May also delete files associated
with such applications.
PWS - Steals a password.
Reboot - Reboots the computer.
Reg - Modifies the Registry in an
undesirable fashion without asking
questions. For example, reduces the
security settings or creates
abnormal associations or sets.
Spam - Acts as a spamming tool.
Spyware - Monitors browsing habits or other
behavior and sends the information
out, often for unsolicited
advertising.
Uploader - Sends files or other data from the
computer.
Vtool - Denotes a program used by virus
writers or hackers for developing
software.
Zap - Wipes all or part of a hard disk.