Atomic 1 Virus
Virus Name: Atomic 1
Aliases: Atomic 1A
V Status: Viron
Discovery: May, 1993
Symptoms: .COM file corruption; program execution failure;
"Bad command or file name" message on program execution
Origin: Canada
Eff Length: 371 Bytes Overwriting
Type Code: ONCK - Overwriting Non-Resident .COM Infector
Detection Method: F-Prot, AVTK, ViruScan, IBMAV, NAV, NAVDX, Sweep,
VAlert, PCScan, ChAV,
NShld, NProt, AVTK/N, IBMAV/N, Sweep/N, NAV/N, Innoc,
LProt
Removal Instructions: Delete infected files
General Comments:
The Atomic 1, or Atomic 1A, virus was submitted in May, 1993, and
is from Canada. Atomic 1 is a non-resident, direct action over-
writing virus. It permanently corrupts the .COM programs it
infects.
When a program infected with the Atomic 1 virus is executed, the
Atomic 1 virus will infect the first two .COM files located in the
current directory, and then the following message will be displayed:
"Bad command or file name"
The user is then returned to the DOS prompt.
Programs infected with the Atomic 1 virus will have the first 371
bytes overwritten by the Atomic 1 viral code. Since the virus does
not check to see if the programs it is infecting were previously
infected, it will not spread past the first two .COM files in any
directory. The program's date and time in the DOS disk directory
listing will not be altered. The following text strings are visible
within the viral code in all Atomic 1 infected programs:
"[TAD1A] Memory Lapse -- Toronto, CANADA"
"The Atomic Dustbin 1A -- This is just the first step"
"Bad command or file name"
"*.COM .. c Dustbin 1A -- This is just the first step"
Known variant(s) of Atomic 1 are:
Atomic 1B: A 480 byte variant of the virus described above, it
infects the first two .COM files in the current directory
when an infected program is executed, and then displays
the following message:
"Program execution terminated"
The following text strings are visible within the viral
code in all Atomic 1B infected programs:
"[TAD1B] Memory Lapse -- Toronto, CANADA"
"The Atomic Dustbin 1B -- This is almost the second step"
"Program execution terminated"
"The Atomic Dustbin - YOUR PHUCKED!"
"*.COM .."
Origin: Canada May, 1993.
Atomic.425: Received in May, 1996, this is a 425 byte companion
virus version of the Atomic 1 virus described above. It becomes
memory resident as a low system memory TSR of 992 bytes, hooking
interrupt 21. Once resident, it creates a 425 byte companion
.COM file for each .EXE file which the user executes or opens.
The companion files will have the current system date and time
when they were created, as well as having the hidden attribute
set. The following text strings are visible within the viral
code:
"Atomic v1.00"
"by MnemoniX"
Origin: Unknown May, 1996.
See: Atomic 2