62 lines
2.7 KiB
Plaintext
62 lines
2.7 KiB
Plaintext
![]() |
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
|||
|
<20> VIRUS REPORT <20>
|
|||
|
<20> 1260 virus <20>
|
|||
|
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
|||
|
|
|||
|
Synonyms: Stealth Virus
|
|||
|
|
|||
|
Date of Origin: January, 1990.
|
|||
|
|
|||
|
Place of Origin: Minnesota.
|
|||
|
|
|||
|
Host Machine: PC compatibles.
|
|||
|
|
|||
|
Host Files: Encrypting non-resident. Infects
|
|||
|
COM files.
|
|||
|
|
|||
|
Increase in Size of Infected Files: 1260 bytes.
|
|||
|
|
|||
|
Nature of Damage: Affects system run-time
|
|||
|
operation. Corrupts program or overlay files.
|
|||
|
|
|||
|
Detected by: Scanv57+, IBM Scan, Pro-Scan.
|
|||
|
|
|||
|
Removed by: CleanUp v57+.
|
|||
|
|
|||
|
Derived from: Vienna.
|
|||
|
|
|||
|
Scan Code: Uses variable encryption techniques.
|
|||
|
|
|||
|
Although this little thing doesn't become memory resident, it has an
|
|||
|
insatiable appetite for COM files, which will become 1,260 bytes longer
|
|||
|
after infection. Infected files will be encrypted with a unique key --
|
|||
|
every infection produces a different key. The 1260 virus can infect a
|
|||
|
LAN's file server and all workstations.
|
|||
|
|
|||
|
|
|||
|
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
|||
|
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
|||
|
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
|||
|
<EFBFBD> Security Association. It contains information compiled from <20>
|
|||
|
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
|||
|
<EFBFBD> presented here is accurate. <20>
|
|||
|
<EFBFBD> <20>
|
|||
|
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
|||
|
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
|||
|
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
|||
|
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
|||
|
<EFBFBD> <20>
|
|||
|
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
|||
|
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
|||
|
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
|||
|
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
|||
|
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
|||
|
<EFBFBD> <20>
|
|||
|
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
|||
|
<EFBFBD> <20>
|
|||
|
<EFBFBD> This document may be distributed in any format, providing <20>
|
|||
|
<EFBFBD> this message is not removed or altered. <20>
|
|||
|
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
|||
|
|
|||
|
Downloaded From P-80 International Information Systems 304-744-2253
|