This virus adds itself to the end of infected files and encrypts the full file after that.
Once detected, the F-Secure security product will automatically disinfect the suspect file by either deleting it or renaming it.
Detailed instructions for F-Secure security products are available in the documentation found in the Downloads section of our Home - Global site.
You may also refer to the Knowledge Base on the F-Secure Community site for further assistance.
When run, the virus decrypts the original program and writes it to the file called HOOTERS.EXE. Then it executes this file and finally deletes it - sometimes leaving a zero byte HOOTERS.EXE behind.
A side-effect of this is that the memory map might list - for example - an infected mouse driver as HOOTERS.EXE instead of MOUSE.EXE.
Hooters was found in the wild in Australia in September 1996. It has been spread over the internet.
Description Details: Mikko Hypponen, F-Secure