65 lines
3.2 KiB
Plaintext
65 lines
3.2 KiB
Plaintext
ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿
|
||
³ VIRUS REPORT ³
|
||
³ Oropax Virus ³
|
||
ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ
|
||
|
||
Synonyms: Music virus, Musician virus.
|
||
|
||
Date of Origin: December, 1989.
|
||
|
||
Host Machine: PC compatibles.
|
||
|
||
Host Files: Remains resident; infects COM files.
|
||
|
||
Increase in Size of Infected Files: length increases by 2756-2806 bytes,
|
||
so that total length is evenly divisible by 51. Most common length
|
||
increase is 2,773 bytes.
|
||
|
||
Nature of Damage: Affects system run-time operation; corrupts program
|
||
files.
|
||
|
||
Detected by: Scanv53+, F-Prot, IBM Scan, Pro-Scan.
|
||
|
||
Removed by: CleanUp, SCAN/D, F-Prot, or delete infected files.
|
||
|
||
A memory resident virus infecting COM files. When an infected
|
||
application is executed, the virus installs in memory trapping the DOS
|
||
21h interrupt. Thereafter, when a program attempts to create a
|
||
subdirectory, remove a subdirectory, create a file, open a file, delete
|
||
a file, get/set file attributes, rename a file, delete a file (with FCB),
|
||
create file (with FCB) or rename a file (with FCB), one COM file is
|
||
infected in the home directory. COMMAND.COM, COM files with length
|
||
divisible by 51, COM files with an attribute other than normal or
|
||
archive, or COM files with a length of 61980 bytes will not be infected.
|
||
The virus seems to activate randomly after infecting a file. If
|
||
activated, five minutes after infection it will play 3 or 6 melodies
|
||
(depending on version) repeatedly with a 7 minute interval in between
|
||
each.
|
||
|
||
|
||
ÉÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ»
|
||
º This document was adapted from the book "Computer Viruses", º
|
||
º which is copyright and distributed by the National Computer º
|
||
º Security Association. It contains information compiled from º
|
||
º many sources. To the best of our knowledge, all information º
|
||
º presented here is accurate. º
|
||
º º
|
||
º Please send any updates or corrections to the NCSA, Suite 309, º
|
||
º 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS º
|
||
º and upload the information: (202) 364-1304. Or call us voice at º
|
||
º (202) 364-8252. This version was produced May 22, 1990. º
|
||
º º
|
||
º The NCSA is a non-profit organization dedicated to improving º
|
||
º computer security. Membership in the association is just $45 per º
|
||
º year. Copies of the book "Computer Viruses", which provides º
|
||
º detailed information on over 145 viruses, can be obtained from º
|
||
º the NCSA. Member price: $44; non-member price: $55. º
|
||
º º
|
||
º The document is copyright (c) 1990 NCSA. º
|
||
º º
|
||
º This document may be distributed in any format, providing º
|
||
º this message is not removed or altered. º
|
||
ÈÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍͼ
|
||
|
||
Downloaded From P-80 International Information Systems 304-744-2253
|