Jump to content
Posted 13 March 2009 - 10:51 AM
Posted 13 March 2009 - 03:21 PM
Posted 13 March 2009 - 03:39 PM
Posted 13 March 2009 - 03:46 PM
There are bugs in the viral code. When the virus produces infected files, it also creates non-functional files that also contain the virus.
W32/Virut.h is a polymorphic, entry point obscuring (EPO) file infector with IRC bot functionality. It can accept commands to download other malware on the compromised machine.
It appends to the end of the last section of executable (PE) files an encrypted copy of its code. The decryptor is polymorphic and can be located either:
Immediately before the encrypted code at the end of the last section
At the end of the code section of the infected host in 'slack-space' (assuming there is any)
At the original entry point of the host (overwriting the original host code)
Posted 13 March 2009 - 04:08 PM
Posted 13 March 2009 - 05:34 PM
Posted 13 March 2009 - 08:14 PM
Posted 13 March 2009 - 09:32 PM
see post 4.
BTW:Virut is polymorhic which uses polymorhic code.Polymorphic code is code that mutates while keeping the original algorithm intact.
Edited by boopme, 13 March 2009 - 09:33 PM.
0 members, 0 guests, 0 anonymous users