Threat Description



Category: Malware
Type: Virus
Platform: W32
Aliases: Libertine


This virus is multi-platform and polymorphic infector affecting both DOS and Win32 files. It activates by changing the Windows wallpaper.

Win32.Libertine was named after these text strings in its code:

[Win32.Libertine v1.07b] Copyright 1998-xxxx by [NeverLoved] 		


Automatic action

Once detected, the F-Secure security product will automatically disinfect the suspect file by either deleting it or renaming it.

More scanning & removal options

More information on scanning or removal options is available in the documentation for your F-Secure security product on the Downloads section of our Home - Global site.

You may also refer to the Knowledge Base on the F-Secure Community site for more information.

Contact Support

For further assistance, F-Secure customers can request support online via the Request support or the Chat forms on our Home - Global site.

Technical Details

The virus can be found in three different forms:

  • infected Win32 PE files
  • infected DOS COM files
  • Win32 PE dropper (31672 bytes pure virus code)

Because of bugs the infected COM and EXE files cannot run under Windows NT, they are terminated with standard NT or DrWatson error message.

While infecting both Win32 and DOS files the virus writes its complete 32Kb code to the end of files and modifies file headers to pass control to the virus routine. The addresses of entry routines are different in all three cases of infection. The virus in both infected Win32 and DOS programs when takes control searches for Win32 dropper (the C:\MYLENE.EXE file), executes it and returns control to the host program. If there are no dropper in root directory on the C: drive, the virus first creates and then executes it.

These dropper activation routines are quite short in infected files. In case of DOS COM files it is just about 200-bytes simply create-write-close-run routine. In case of Win32 files it is more sophisticated, but also quite silly and short.

So the virus in infected files just creates and runs dropper - no more, and all infection and payload virus functions falls on the Win32 virus dropper. The virus also disables the AVPI anti-virus program.

Before calling infection routines the virus calls the trigger routine. This routine is executed with probability 1/8 depending on the system time counter and changes the Windows background picture (WallPaper) to a picture of a French female singer Mylene Farmer.

Technical Details:Eugene Kaspersky


Suspect a file or URL was wrongly detected? Submit a sample to our Labs for analysis

Submit Now

Give And Get Advice

Give advice. Get advice. Share the knowledge on our free discussion forum.

Learn More