Blood Rage Virus
Virus Name: Blood Rage
Aliases:
V Status: Rare
Discovery: July, 1994
Symptoms: .COM file growth; message; system hangs
Origin: Unknown
Eff Length: 450 Bytes
Type Code: PRaCK - Parasitic Resident .COM Infector
Detection Method: F-Prot, IBMAV, AVTK, ViruScan, Sweep,
NAVDX, VAlert, NAV, PCScan, ChAV,
AVTK/N, Sweep/N, NProt, NShld, IBMAV/N, NAV/N, LProt,
Innoc 4.0+
Removal Instructions: Delete infected files
General Comments:
The Blood Rage virus was received in July, 1994. Its origin or point
of isolation is unknown. Blood Rage is a memory resident infector of
.COM files, including COMMAND.COM.
When the first Blood Rage infected program is executed, this virus
will install itself memory resident in allocated system memory,
hooking interrupt 21. Total system and available free memory, as
indicated by the DOS CHKDSK program, will not be altered.
Once the Blood Rage virus is memory resident, it will infect .COM
programs when they are executed. Infected .COM programs will have a
file length increase of 450 bytes with the virus being located at the
end of the file. The program's date and time in the DOS disk
directory listing will not be altered. The following text strings are
visible within the viral code in all infected files:
"THE WORLD WiLL NEVER FORGETT US! -BetaBoys-"
"Blood Rage (c)1992 The BetaBoys"
The first text string above may be displayed as a message when
the virus is memory resident and an infected program is executed.
A system hang may then occur.