02.08.2013 Views

Macro Virus Table - Defense Technical Information Center

Macro Virus Table - Defense Technical Information Center

Macro Virus Table - Defense Technical Information Center

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

PC<br />

MS-DOS/PC-DOS Computer <strong>Virus</strong>es<br />

On October the 21st the virus activates, and displays the following message:<br />

Leandro and Kelly! GV-MG-BRAZIL<br />

You have this virus since xx-xx-xx<br />

The xx-xx-xx part contains the date when the virus first infected the machine.<br />

The virus has no intentionally destructive payload, but it will sometimes corrupt floppies and hard<br />

drives when storing the original boot sector to another part of the disk.<br />

Name: Leapfrog<br />

Aliases: Leapfrog, 516 Type: Program.<br />

Disk Location: COM application.<br />

EXE application.<br />

Features: Corrupts a program or overlay files.<br />

Damage: Corrupts a program<br />

or overlay files.<br />

Size: See Also:<br />

Notes: Does not change the file entry point. (other viruses that are similar are Voronezh-1600<br />

and Brainy)<br />

Leapfrog modifies the instruction the initial JMP points to (for COM files)<br />

v6-084: will not be noticed by the integrity checking of MSAV (DOS 6.0 antivirus) .<br />

Name: Lehigh<br />

Aliases: Lehigh, Lehigh-2, Lehigh-B Type: Program.<br />

Disk Location: COMMAND.COM Features: Corrupts a program or overlay files.<br />

Corrupts the file linkages or the FAT.<br />

Damage: Corrupts a program<br />

or overlay files.<br />

Corrupts the file linkages or<br />

the FAT.<br />

Corrupts boot sector<br />

Corrupts boot sector<br />

Size: Overlays application, no See Also:<br />

increase<br />

555 bytes inserted in stack<br />

area of COMMAND.COM.<br />

Notes: Spreads between copies of COMMAND.COM. After spreading four or ten times, it<br />

overwrites critical parts of a disk with random data. Displaying junk on the screen. Alters the<br />

contents and the date of COMMAND.COM. Spread will be detected by any good modification<br />

detector.<br />

Name: Lemming.2160<br />

Aliases: Lemming.2160, Keeper, Thunderbyte Killer Type: Program.<br />

Disk Location: EXE application.<br />

COM application.<br />

Features:<br />

Damage: Size: See Also:<br />

Notes: The following text is in the virus body:<br />

"The Rise and Fall of Thunderbyte-1994-Australia. You Will Never Trust<br />

Anti-<strong>Virus</strong> Software Again!!<br />

[LEMMING] ver .99ß".<br />

230 CIAC Computer <strong>Virus</strong> <strong>Information</strong> Update May 21, 1998

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!