68 lines
3.1 KiB
Plaintext
68 lines
3.1 KiB
Plaintext
ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿
|
||
³ VIRUS REPORT ³
|
||
³ Ghost Virus (COM version) ³
|
||
ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ
|
||
|
||
Synonyms: Ghostballs.
|
||
|
||
Date of Origin: September, 1989.
|
||
|
||
Place of Origin: Iceland.
|
||
|
||
Host Machine: PC compatibles.
|
||
|
||
Host Files: COM files.
|
||
|
||
Increase in Size of Infected Files: 2351 bytes.
|
||
|
||
Nature of Damage: Corrupts or overwrites boot sector; corrupts COM
|
||
files.
|
||
|
||
Detected by: Scanv46+, F-Prot, IBM Scan, Pro-Scan.
|
||
|
||
Removed by: MDisk or DOS SYS command (accompanied by erasing infected
|
||
COM files), or use CleanUp or F-Prot.
|
||
|
||
The Ghost viruses (both boot and COM) were discovered at Icelandic
|
||
University by Fridrik Skulason. The Ghost COM virus infects generic COM
|
||
files, increasing the file size by 2,351 bytes.
|
||
|
||
Symptoms of this virus are very similar to the Ping Pong virus, and
|
||
random file corruption may occur on infected systems.
|
||
|
||
The Ghost COM virus may be the first virus to infect both files (COM
|
||
files in this case) and boot sectors. After the boot sector is infected,
|
||
it also acts as a virus (see Ghost BOOT virus).
|
||
|
||
To remove this virus, turn off the computer and reboot from a
|
||
write-protected disk. Then use MDisk, NDD, or the DOS SYS command to
|
||
replace the boot sector on the infected disk. Any infected .COM files
|
||
must also be replaced with clean copies.
|
||
|
||
|
||
ÉÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ»
|
||
º This document was adapted from the book "Computer Viruses", º
|
||
º which is copyright and distributed by the National Computer º
|
||
º Security Association. It contains information compiled from º
|
||
º many sources. To the best of our knowledge, all information º
|
||
º presented here is accurate. º
|
||
º º
|
||
º Please send any updates or corrections to the NCSA, Suite 309, º
|
||
º 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS º
|
||
º and upload the information: (202) 364-1304. Or call us voice at º
|
||
º (202) 364-8252. This version was produced May 22, 1990. º
|
||
º º
|
||
º The NCSA is a non-profit organization dedicated to improving º
|
||
º computer security. Membership in the association is just $45 per º
|
||
º year. Copies of the book "Computer Viruses", which provides º
|
||
º detailed information on over 145 viruses, can be obtained from º
|
||
º the NCSA. Member price: $44; non-member price: $55. º
|
||
º º
|
||
º The document is copyright (c) 1990 NCSA. º
|
||
º º
|
||
º This document may be distributed in any format, providing º
|
||
º this message is not removed or altered. º
|
||
ÈÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍͼ
|
||
|
||
Downloaded From P-80 International Information Systems 304-744-2253
|