74 lines
3.3 KiB
Plaintext
74 lines
3.3 KiB
Plaintext
ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿
|
||
³ VIRUS REPORT ³
|
||
³ Icelandic Virus Version 2 ³
|
||
ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ
|
||
|
||
Synonyms: System Virus, One in Ten virus
|
||
|
||
Date of Origin: July, 1989.
|
||
|
||
Place of Origin: Iceland.
|
||
|
||
Host Machine: PC compatibles.
|
||
|
||
Host Files: Remains resident. Infects EXE files.
|
||
|
||
Increase in Size of Infected Files: 632 or 661 bytes.
|
||
|
||
Nature of Damage: Affects system run-time operation. Corrupts program or
|
||
overlay files.
|
||
|
||
Detected by: Scanv56+, F-Prot, IBM Scan, Pro-Scan.
|
||
|
||
Removed by: CleanUp, Scan/D, or F-Prot.
|
||
|
||
Derived from: Icelandic virus.
|
||
|
||
Scan Code: You can search at offset 0B8H for 2E C6 06 79 02 02 90 50 53
|
||
51.
|
||
|
||
This version of the Icelandic virus differs from the Icelandic in
|
||
that it bypasses INT21 and doesn't have the code to mark a cluster bad.
|
||
It doesn't have the INT13 check that the second version does.
|
||
|
||
Each time the Icelandic-II virus infects a program, it will modify
|
||
the file's date, thus making it fairly obvious that the program has been
|
||
changed. The virus will also remove the read-only attribute from files,
|
||
but does not restore it after infecting the program.
|
||
|
||
The Icelandic-II virus can infect programs even if the system is
|
||
running an anti-viral TSR that monitors interrupt 21, such as FluShot+.
|
||
|
||
On hard disks larger than 10 MB, there are no bad sectors marked in
|
||
the FAT as there is with the Icelandic virus.
|
||
|
||
Although this version has been called version 2, it may actually have
|
||
been the first released draft, and the Icelandic 1 may be the second.
|
||
|
||
|
||
ÉÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ»
|
||
º This document was adapted from the book "Computer Viruses", º
|
||
º which is copyright and distributed by the National Computer º
|
||
º Security Association. It contains information compiled from º
|
||
º many sources. To the best of our knowledge, all information º
|
||
º presented here is accurate. º
|
||
º º
|
||
º Please send any updates or corrections to the NCSA, Suite 309, º
|
||
º 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS º
|
||
º and upload the information: (202) 364-1304. Or call us voice at º
|
||
º (202) 364-8252. This version was produced May 22, 1990. º
|
||
º º
|
||
º The NCSA is a non-profit organization dedicated to improving º
|
||
º computer security. Membership in the association is just $45 per º
|
||
º year. Copies of the book "Computer Viruses", which provides º
|
||
º detailed information on over 145 viruses, can be obtained from º
|
||
º the NCSA. Member price: $44; non-member price: $55. º
|
||
º º
|
||
º The document is copyright (c) 1990 NCSA. º
|
||
º º
|
||
º This document may be distributed in any format, providing º
|
||
º this message is not removed or altered. º
|
||
ÈÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍͼ
|
||
|
||
Downloaded From P-80 International Information Systems 304-744-2253
|