Eng
  1. Skip to navigation
  2. Skip to content
  3. Skip to sidebar


VLamiX


Aliases:


VLamiX
Die_Lamer

Malware
Virus
W32

Summary

The VLamiX virus spread through BBS systems in August 1994 in an archive called A30!PWA.ZIP. The archive was supposed to contain the version 3.0 of the popular ARJ archiver. Robert Jung, the author of ARJ, confirmed that ARJ 3.0 has not been released.



Disinfection & Removal

Automatic Disinfection

Allow F-Secure Anti-Virus to disinfect the relevant files.

For more general information on disinfection, please see Removal Instructions.



Technical Details

VLamiX is a simple resident file virus; it infects EXE files when they are opened, and appends an encrypted copy of itself. It uses a simple encryption routine with a 16-bit decryption key which changes between infections. However, the decryption routine does not change and it makes the virus easy to spot.

The virus contains several bugs. It often manages to corrupt files irreparably instead of infecting them.

The name VLamiX is taken from a text string found underneath an encryption layer:

smartc*.cps
         chklist.*
         -=*@DIE_LAMER@*=-
         CHKLIST ???
         CHKLIST.CPS
         VLamiX-1

VLamiX attacks CPAV and MSAV by deleting their checksum files. It also activates when it sees the text -=*@DIE_LAMER@*=- on-screen. At that time, it will overwrite a floppy in the B: drive, if such exists.





Description Created: Mikko Hypponen, F-Secure



Submit a sample




Wondering if a file or URL is malicious? Submit a sample to our Lab for analysis via the Sample Analysis System (SAS)

Give And Get Advice




Give advice. Get advice. Share the knowledge on our free discussion forum.