This virus is based on the Vienna virus, but the author (whose identity is known) has made considerable modifications to it. The most significant is that the virus is now encrypted. The virus adds 1260 bytes to the files it infects. The first 39 bytes contain a simple decryption routine, similar to the one used by the Cascade virus. There is one important difference, however. A variable number of short (1- or 2-byte) instructions are added between the decoding instructions. The extra instructions do not affect the operation of the virus - they are only placed there in an attempt to prevent virus scanners from using identification strings, which makes it a little harder to detect the virus.
Depending on the settings of your F-Secure security product, it will either automatically delete, quarantine or rename the suspect file, or ask you for a desired action.
More scanning & removal options
More information on the scanning and removal options available in your F-Secure product can be found in the Help Center.
You may also refer to the Knowledge Base on the F-Secure Community site for more information.
The Casper virus is created by modifying the source code to V2P1. It contains the following text.
Hi! I'm Casper The Virus, And On April The 1st I'm Gonna Fuck Up Your Hard Disk REAL BAD! In Fact It Might Just Be Impossible To Recover! How's That Grab Ya! [GRIN]
The virus will indeed activate on April 1st and try to format the boot sector, with incorrect parameters. The code seems to contain an error, though.
By the same author as V2P1, the only significant difference is that the length is now variable.
The last virus in this series. It uses a much more complex self-modifying encryption method.