Members of the Stealth_boot family are pretty normal boot sector viruses with stealth capability. However, several of the variants of this virus are quite common all over the world.
Once detected, the F-Secure security product will automatically disinfect the suspect file by either deleting it or renaming it.
More scanning & removal options
More information on scanning or removal options is available in the documentation for your F-Secure security product on the Downloads section of our Home - Global site.
You may also refer to the Knowledge Base on the F-Secure Community site for more information.
Stealth_boot can infect a computer's hard disk only if the computer is booted from an infected diskette, in which case the virus infects the hard disk's Master Boot Record. The virus goes resident in memory the next time the computer is booted from the hard disk. Once in memory, Stealth_boot infects all non-write protected diskettes used in the computer.The stealth routines of the virus hide the infection, making infected boot sectors look clean as long as the virus is Resident, in memory. The virus code is visible after booting from a clean floppy.There are 13 different variants of this virus known (May 1996). The most common variants of this virus do nothing except spread. Stealth_boot.c is especially common all over the world.The Stealth_boot.KOH variants of this virus include an encryption system, which encrypts the hard drive with strong encryption if so wished by the user of the machine. These variants contain dangerous programming errors.The original source code of this virus has been published in a book, which explains the commoness of this virus.
Description Details: Mikko Hypponen, F-Secure