where a hash or pattern-based signature is used to identify files or other components that are viruses

not as useful by itself, attackers can use polymorphism, data encryption and/or packing to make detection harder