Eng
  1. Skip to navigation
  2. Skip to content
  3. Skip to sidebar


Zero Bug


Aliases:


Zero Bug
Palette

Malware
Virus
W32

Summary

The "Zero Bug" will mark infected files in the same way as the Vienna virus, placing 62 in the "seconds" field of the timestamp of the .COM files it infects. Apart from this, the viruses are very dissimilar.

This virus will search for COMMAND.COM, using the value of the COMSPEC environment variable to locate the file. Then it will remain resident, hook INT 60 and infect every .COM file run. After some time has passed, a "smiley" (ASCII 1) will appear on the screen and "eat" any zero it finds on the screen.

The virus seems not too well written - containing some unreachable code, but it is unusual in some ways.

If the virus is active in memory and you look at a directory containing infected files, the virus will make the directory entries appear as they were before the infection. That is, you will not see any increase in file length.



Disinfection & Removal

Automatic Disinfection

Allow F-Secure Anti-Virus to disinfect the relevant files.

For more general information on disinfection, please see Removal Instructions.









Submit a sample




Wondering if a file or URL is malicious? Submit a sample to our Lab for analysis via the Sample Analysis System (SAS)

Give And Get Advice




Give advice. Get advice. Share the knowledge on our free discussion forum.