                    Ŀ
                            VIRUS REPORT         
                             1260 virus          
                    

Synonyms: Stealth Virus

Date of Origin: January, 1990.

Place of Origin: Minnesota.

Host Machine: PC compatibles.

Host Files: Encrypting non-resident. Infects
     COM files.

Increase in Size of Infected Files: 1260 bytes.

Nature of Damage: Affects system run-time
     operation. Corrupts program or overlay files.

Detected by: Scanv57+, IBM Scan, Pro-Scan.

Removed by: CleanUp v57+.

Derived from: Vienna.

Scan Code: Uses variable encryption techniques.

     Although this little thing doesn't become memory resident, it has an
insatiable appetite for COM files, which will become 1,260 bytes longer
after infection. Infected files will be encrypted with a unique key --
every infection produces a different key. The 1260 virus can infect a
LAN's file server and all workstations.


ͻ
  This document was adapted from the book "Computer Viruses",       
  which is copyright and distributed by the National Computer       
  Security Association. It contains information compiled from       
  many sources. To the best of our knowledge, all information       
  presented here is accurate.                                       
                                                                    
  Please send any updates or corrections to the NCSA, Suite 309,    
  4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS  
  and upload the information: (202) 364-1304. Or call us voice at   
  (202) 364-8252. This version was produced May 22, 1990.           
                                                                    
  The NCSA is a non-profit organization dedicated to improving      
  computer security. Membership in the association is just $45 per  
  year. Copies of the book "Computer Viruses", which provides       
  detailed information on over 145 viruses, can be obtained from    
  the NCSA. Member price: $44; non-member price: $55.               
                                                                    
            The document is copyright (c) 1990 NCSA.                
                                                                    
  This document may be distributed in any format, providing         
  this message is not removed or altered.                           
ͼ

Downloaded From P-80 International Information Systems 304-744-2253
