Checking Malware Name

Created the Tuesday 22 September 2020. Updated 2 years ago.

Some analysts rename the malware as “malware.exe” or “sample.exe” or even with the file hash. Malware can detect the name before fully executing on the infected machine. If any of the blacklisted names are detected, the sample will run differently or end its process.

Technique Identifiers

U1303 U0401

Technique Tag


Code Snippets

#include <iostream>
#include <cstring>
#include <windows.h>

using namespace std;

int main(int argc, char** argv)
    TCHAR szExeFileName[MAX_PATH];
    GetModuleFileName(NULL, szExeFileName, MAX_PATH);

    // full path
    cout << "[+] Fulle Path: " << szExeFileName << endl;

    //convert tchar to string
    std:string filename (szExeFileName);

    // Remove directory if present.
    const size_t last_slash_idx = filename.find_last_of("\\/");
    if (std::string::npos != last_slash_idx)
        filename.erase(0, last_slash_idx + 1);

    // Blacklist
    LPSTR fname[] = {"sample.exe",
                     // ADD YOUR PROCESS NAME HERE!
    for (int i = 0; i < (sizeof(fname) / sizeof(LPSTR)); i++)
        if ((fname[i] == filename ))
            cout << " [!] Filename is blacklisted: " << (fname[i]) << endl;
    return 0;

Additional Resources

External Links

Subscribe to our Newsletter

The information entered into this form is mandatory. It will be subjected to computer processing. It is processed by computer in order to support our users and readers. The recipients of the data will be :

According to the Data Protection Act of January 6th, 1978, you have at any time, a right of access to and rectification of all of your personal data. If you wish to exercise this right and gain access to your personal data, please write to Thomas Roccia at

You may also oppose, for legitimate reasons, the processing of your personal data.