Ant Virus
Virus Name: Ant
Aliases:
V Status: Rare
Discovery: June, 1992
Symptoms: .COM file growth; file time has seconds set to 62
Origin: Unknown
Eff Length: 770 Bytes
Type Code: PNC - Parasitic Non-Resident .COM Infector
Detection Method: ViruScan, F-Prot, Sweep, AVTK, NAVDX, VAlert,
IBMAV, NAV, PCScan, ChAV,
NShld, Sweep/N, LProt, Innoc, NProt, IBMAV/N,
AVTK/N, NAV/N
Removal Instructions: Delete infected files
General Comments:
The Ant virus was received in June, 1992. Its origin or point of
isolation is unknown. Ant is a non-resident, direct action
infector of .COM programs, but not COMMAND.COM. It is roughly
based on the Vienna virus.
When a program infected with the Ant virus is executed, Ant will
infect one previously uninfected .COM program located in the
current drive's current directory. Programs infected with the
Ant virus will have a file length increase of 770 bytes with the
virus being located at the beginning of the infected file. The
program's time in the DOS disk directory listing will have had the
seconds field set to 62, the virus' infection marker. No text
strings are visible within the viral code in Ant infected programs.
Ant activates when an infected program is executed on December 1st
of any year. At that time, the virus will display the following
message and attempt to overwrite the system hard drive:
"MIT Sux!"