Eng
  1. Skip to navigation
  2. Skip to content
  3. Skip to sidebar


Coke


Aliases:


Coke
Vecna

Malware
Virus
W32

Summary

Win32/Coke.22231.A was sent to several anti virus researchers at the end of May 1999.

Coke works on Windows 95 and 98 (its bugs will not let it work too long on Windows NT, but it is able to infect files under NT). The virus infects both Portable Executable applications and Office 97 documents and it is polyrmohic in both cases. Its first polymrophic decryptor is placed in the code section of the PE applications in 8 pieces similarly to the One_Half virus. Coke is slow polymorphic, multi-threaded and uses multi-layered polymorphism and encryption in PE applications.

The virus is able to mass mail itself to several locations. This can happen when the user sends a mail. The virus hooks a MAPI function and attaches an infected attachment to all out going mails from the machine. Additionally the virus sends a mail with an infected attachemnt each time when the user visites a web page which has a "mailto" reference. The virus keeps a CRC32 list in a file on the machine about the addresses it sent itself too. Therefore only one copy will be posted to each locations.

There is nothing really new in this virus, but the combinations of all these techniques makes it uniqe and very complex.



Disinfection & Removal

Automatic Disinfection

Allow F-Secure Anti-Virus to disinfect the relevant files.

For more general information on disinfection, please see Removal Instructions.







Technical Details: Peter Szor, F-Secure, 1999



Submit a sample




Wondering if a file or URL is malicious? Submit a sample to our Lab for analysis via the Sample Analysis System (SAS)

Give And Get Advice




Give advice. Get advice. Share the knowledge on our free discussion forum.