courses

Malware Families

Malware is broadly categorized by its primary purpose or delivery mechanism. Recognizing family characteristics helps prioritize analysis and response.

Ransomware

Ransomware encrypts victim files and demands payment for the decryption key. It is currently the most financially significant malware category.

Key Characteristics

Analysis Focus

Examples

Conti, LockBit, BlackCat (ALPHV), Ryuk, WannaCry

Remote Access Trojans (RATs)

RATs give an attacker remote control over an infected system: shell access, file transfer, keylogging, screen capture.

Key Characteristics

Analysis Focus

Examples

AsyncRAT, njRAT, QuasarRAT, DarkComet, Remcos

Infostealers

Infostealers harvest credentials, cookies, and sensitive data and exfiltrate it to the attacker.

Key Characteristics

Analysis Focus

Examples

RedLine, Vidar, Raccoon Stealer, AgentTesla

Droppers and Loaders

Droppers and loaders are delivery mechanisms — their job is to get a payload onto the system and execute it.

Key Characteristics

Analysis Focus

Examples

Emotet (loader), Bazar Loader, GuLoader, Qbot

Rootkits

Rootkits hide the presence of malware by intercepting OS calls that would reveal it.

Key Characteristics

Analysis Focus

Examples

Necurs (Windows), Azazel (Linux), LoJax (UEFI bootkit)

Botnets

Botnets are networks of compromised machines (bots) controlled by a single operator. Individual bots may perform DDoS, send spam, mine cryptocurrency, or serve as proxies.

Key Characteristics

Analysis Focus

Examples

Mirai (IoT), Emotet (spam/loader), Trickbot

YARA for Classification

Once you understand a malware family, you can write YARA rules to automatically classify new samples:

rule Ransomware_ShadowCopy_Deletion {
    meta:
        description = "Detects vssadmin shadow copy deletion, common in ransomware"
        author = "CS 492/592 Malware Analysis"
    strings:
        $s1 = "vssadmin" ascii wide nocase
        $s2 = "delete shadows" ascii wide nocase
        $s3 = "/all" ascii wide nocase
    condition:
        all of them
}

Good YARA rules balance specificity (few false positives) with generality (catches variants). Test your rules against large corpora like MalwareBazaar to measure false positive rates.

Useful Resources