J
Jake Dodd
Whether or not a program runs depends on the software environment, such
as a DOS session, no matter how that environment is created. DOS programs
running under Windows are in a DOS environment as far as the program is
concerned.
No. For a program to qualify as malware, more than the ability to execute
must be taken into account. This is because malice is based on the overall
functioning of the program not just it's ability to execute. If the data is not
there to be altered, then the environment may support the execution but not
the malice. Calling something malware depends on the existence of several
suitable instances of the environment capable of realizing the malicious action.
So just because it isn't malware on your computer doesn't mean it should
not a called malware in general.
Intent? Well...it either does or it doesn't affect something. If it does...
Yes, because at the very least it is making unwanted changes from within
the DOS environment.
....and if it doesn't, and if there are enough environments where it could,
it should still be classified as DOS malware.
No, a DOS program functioning as a worm component is still a DOS
program. Just as a trojan dropper that drops a worm body should
still be called a trojan dropper rather than a worm, and be detected
by the dropper code rather than the dropped code (which is probably
encrypted or encoded anyway).
You just don't like the way they dumped them all together under the
DOS malware label. This is no different than saying Linux malware,
Mac malware, Windows malware, or as they did "other OS viruses/
malware" without further subdividing malware types or even software
environments.
as a DOS session, no matter how that environment is created. DOS programs
running under Windows are in a DOS environment as far as the program is
concerned.
Just because a given piece of malware can be executed in a 16-bit DOS
shell (or in pure DOS mode) does that necessarily make it DOS
malware?
No. For a program to qualify as malware, more than the ability to execute
must be taken into account. This is because malice is based on the overall
functioning of the program not just it's ability to execute. If the data is not
there to be altered, then the environment may support the execution but not
the malice. Calling something malware depends on the existence of several
suitable instances of the environment capable of realizing the malicious action.
So just because it isn't malware on your computer doesn't mean it should
not a called malware in general.
What if it's intent is to affect some aspect of the
overlying Windows OS? Is it still appropriate to catagorize it as DOS
malware?
Intent? Well...it either does or it doesn't affect something. If it does...
Yes, because at the very least it is making unwanted changes from within
the DOS environment.
....and if it doesn't, and if there are enough environments where it could,
it should still be classified as DOS malware.
If a given piece of malware is (somehow) catagorized as "DOS" based,
but if it's also a worm (it's got to be something, a worm, virus, etc)
then shouldn't it be put in the "Worm" catagory (and to hell with the
"DOS" label) ?
No, a DOS program functioning as a worm component is still a DOS
program. Just as a trojan dropper that drops a worm body should
still be called a trojan dropper rather than a worm, and be detected
by the dropper code rather than the dropped code (which is probably
encrypted or encoded anyway).
And again if it's really DOS based, but it's not a virus, a worm, a
back-door, a trojan, a macro or script, then what is it?
You just don't like the way they dumped them all together under the
DOS malware label. This is no different than saying Linux malware,
Mac malware, Windows malware, or as they did "other OS viruses/
malware" without further subdividing malware types or even software
environments.