Threat Description

Coke

Details

Aliases:Coke, Vecna
Category:Malware
Type:Virus
Platform:W32

Summary



Win32/Coke.22231.A was sent to several anti virus researchers at the end of May 1999.

Coke works on Windows 95 and 98 (its bugs will not let it work too long on Windows NT, but it is able to infect files under NT). The virus infects both Portable Executable applications and Office 97 documents and it is polyrmohic in both cases. Its first polymrophic decryptor is placed in the code section of the PE applications in 8 pieces similarly to the One_Half virus. Coke is slow polymorphic, multi-threaded and uses multi-layered polymorphism and encryption in PE applications.

The virus is able to mass mail itself to several locations. This can happen when the user sends a mail. The virus hooks a MAPI function and attaches an infected attachment to all out going mails from the machine. Additionally the virus sends a mail with an infected attachemnt each time when the user visites a web page which has a "mailto" reference. The virus keeps a CRC32 list in a file on the machine about the addresses it sent itself too. Therefore only one copy will be posted to each locations.

There is nothing really new in this virus, but the combinations of all these techniques makes it uniqe and very complex.



Removal


Automatic action

Once detected, the F-Secure security product will automatically disinfect the suspect file by either deleting it or renaming it.

More

You may wish to refer to the Support Community for further assistance. You also may also refer to General Removal Instructions for a general guide on alternative disinfection actions.








Technical Details: Peter Szor, F-Secure, 1999


SUBMIT A SAMPLE

Suspect a file or URL was wrongly detected? Submit a sample to our Labs for analysis

Submit Now

Give And Get Advice

Give advice. Get advice. Share the knowledge on our free discussion forum.

Learn More