This virus adds itself to the end of infected files and encrypts the full file after that.
Once detected, the F-Secure security product will automatically disinfect the suspect file by either deleting it or renaming it.
When run, the virus decrypts the original program and writes it to the file called HOOTERS.EXE. Then it executes this file and finally deletes it - sometimes leaving a zero byte HOOTERS.EXE behind.
A side-effect of this is that the memory map might list - for example - an infected mouse driver as HOOTERS.EXE instead of MOUSE.EXE.
Hooters was found in the wild in Australia in September 1996. It has been spread over the internet.
Description Created: Mikko Hypponen, F-Secure