Eng
  1. Skip to navigation
  2. Skip to content
  3. Skip to sidebar


Jedi


Aliases:


Jedi
Jedi_Magic

Malware

W32

Summary

This Word 97 virus contains two functions (AutoOpen and AutoExit) a in single module called Jedi_Magic. While infecting the global macros area the virus resets these system variables:

UserName = "O.B.1. Canobi"
  UserInitials = "OBC"
  UserAddress = "BOOGZI BARBERS ... Food Buster!!!"



Disinfection & Removal

Automatic Disinfection

Allow F-Secure Anti-Virus to disinfect the relevant files.

For more general information on disinfection, please see Removal Instructions.



Technical Details

The virus detects already infected documents by the checking for the "Force" variable in which it saves the text: "567374-Joseph.A.D.G.". On exiting Word the virus resets its module's attributes:

VB_Description="Macro created 03/12/98 by Membership & Registry Division"
  VB_ProcData.VB_Invoke_Func = "Normal.Jedi_Magic.AutoExit"

[Eugene Kaspersky]







Submit a sample




Wondering if a file or URL is malicious? Submit a sample to our Lab for analysis via the Sample Analysis System (SAS)

Give And Get Advice




Give advice. Get advice. Share the knowledge on our free discussion forum.