Skip to content
1-888-762-8736(M-F 8:00am-5:00pm CST)
1-877-218-7353(M-F 8:00am-5:00pm CST)
href="http://www.trendmicro.com/us/enterprise/index.html" id="ENT-overview-test2" title="SEE ALL ENTERPRISE SOLUTIONS">Enterprise Overview
This destructive memory-resident boot virus infects the Master Boot Record (MBR) of hard disks set as drive C:\ and the boot sectors of floppy disks that are accessed.
Once the user starts or boots from an infected floppy disk, this malware sets up a copy of itself in high memory by allocating 8 KB of conventional memory. It also hooks INT 13 services, allowing it to infect floppy disks when accessed and then hides the infection.
It infects floppy disks using DOS disk manipulation services while it is resident in memory. It also infects the drive C:\ hard disks Master Boot Record (MBR).
This DOS boot virus uses 8 sectors to propagate. On drive C:\ hard disks, it overwrites the original MBR then hides the rest of the virus from cylinder 0, head 0, and sector 10 up to cylinder 0, head 0, and sector 17. It occupies a total of 8 sectors together with the original MBR located at cylinder 0, head 0 and sector 17.
On floppy disks, it modifies the Table Base of Parameters and defines an additional track with a nonstandard format. It does this to store the rest of the virus code together with the original boot sector. These sectors cannot be accessed by traditional methods of reading.
The following text is found in this virus body:
For Windows XP and Windows Server 2003 users, before doing any scans, please make sure you disable System Restore to allow full scanning of your computer.
Restore your system’s Master Boot Record (MBR)
To restore your system's Master Boot Record (MBR):
Connect with us on
| | | |