Eng
  1. Skip to navigation
  2. Skip to content
  3. Skip to sidebar


Zarma


Aliases:


Zarma
T_Power.Zarma, Zarm

Malware
Virus
W32

Summary

Zarma is a memory resident encrypted COM and EXE infector. It was found in France during May 1995.

Zarma is a stealth virus that intercepts interrupt 21h's functions 11h, 12h, 31h, 3Dh, 4Eh, 4Fh, 4Ch, and 6Ch to mask its presence on an infected system. The virus hooks int 3 to its own decryption routine. This routine decrypts a second decryptor on the stack.



Disinfection & Removal

Automatic Disinfection

Allow F-Secure Anti-Virus to disinfect the relevant files.

For more general information on disinfection, please see Removal Instructions.



Technical Details

Once installed in memory the virus also uses int 1Dh, normally a pointer to some video information, as a gateway to call the original int 21h. A new int 1Ch (timer) handler is installed. It plays with the display controller, effectively shaking the picture on a standard VGA machine.

Zarma is also a retro-virus : it is able to deactivate VSAFE, VDEFEND and VWATCH.

The virus contains the following text:

ZARMA-VIR by T. Power *** Claudia Schiffer Lives !!!..
		





Technical Details: Herve Carette, DataRescue sprl



Submit a sample




Wondering if a file or URL is malicious? Submit a sample to our Lab for analysis via the Sample Analysis System (SAS)

Give And Get Advice




Give advice. Get advice. Share the knowledge on our free discussion forum.