Eng
  1. Skip to navigation
  2. Skip to content
  3. Skip to sidebar


V2P1


Aliases:


V2P1
1260

Malware
Virus
W32

Summary

This virus is based on the Vienna virus, but the author (whose identity is known) has made considerable modifications to it. The most significant is that the virus is now encrypted. The virus adds 1260 bytes to the files it infects. The first 39 bytes contain a simple decryption routine, similar to the one used by the Cascade virus. There is one important difference, however. A variable number of short (1- or 2-byte) instructions are added between the decoding instructions. The extra instructions do not affect the operation of the virus - they are only placed there in an attempt to prevent virus scanners from using identification strings, which makes it a little harder to detect the virus.



Disinfection & Removal

Automatic Disinfection

Allow F-Secure Anti-Virus to disinfect the relevant files.

For more general information on disinfection, please see Removal Instructions.



Technical Details


Variant:Casper

The Casper virus is created by modifying the source code to V2P1. It contains the following text.

Hi! I'm Casper The Virus, And On April The 1st I'm Gonna
        Fuck Up Your Hard Disk REAL BAD! In Fact It Might Just
        Be Impossible To Recover! How's That Grab Ya! <GRIN>
		

The virus will indeed activate on April 1st and try to format the boot sector, with incorrect parameters. The code seems to contain an error, though.


Variant:V2P2

By the same author as V2P1, the only significant difference is that the length is now variable.


Variant:V2P6

The last virus in this series. It uses a much more complex self-modifying encryption method.







Submit a sample




Wondering if a file or URL is malicious? Submit a sample to our Lab for analysis via the Sample Analysis System (SAS)

Give And Get Advice




Give advice. Get advice. Share the knowledge on our free discussion forum.