Members of the Stealth_boot family are pretty normal boot sector viruses with stealth capability. However, several of the variants of this virus are quite common all over the world.


Automatic action

Based on the settings of your F-Secure security product, it will either move the file to the quarantine where it cannot spread or cause harm, or remove it.

Find out more

Knowledge Base

Find the latest advice in our Community Knowledge Base.

User Guide

See the user guide for your product on the Help Center.

Contact Support

Chat with or call an expert for help.

Submit a sample

Submit a file or URL for further analysis.

Technical Details

Stealth_boot can infect a computer's hard disk only if the computer is booted from an infected diskette, in which case the virus infects the hard disk's Master Boot Record. The virus goes resident in memory the next time the computer is booted from the hard disk. Once in memory, Stealth_boot infects all non-write protected diskettes used in the computer.The stealth routines of the virus hide the infection, making infected boot sectors look clean as long as the virus is Resident, in memory. The virus code is visible after booting from a clean floppy.There are 13 different variants of this virus known (May 1996). The most common variants of this virus do nothing except spread. Stealth_boot.c is especially common all over the world.The Stealth_boot.KOH variants of this virus include an encryption system, which encrypts the hard drive with strong encryption if so wished by the user of the machine. These variants contain dangerous programming errors.The original source code of this virus has been published in a book, which explains the commoness of this virus.

Date Created: -

Date Last Modified: -