Clone 2.0 Virus
Virus Name: Clone 2.0
Aliases:
V Status: Rare
Discovery: September, 1993
Symptoms: Hidden .COM files created; system hangs when executing .EXE
programs; TSR
Origin: Australia
Eff Length: 833 Bytes
Type Code: SRsE - Spawning Resident .EXE Infector
Detection Method: AVTK, Sweep, F-Prot, ViruScan, IBMAV,
NAV, NAVDX, VAlert, ChAV,
Sweep/N, NShld, AVTK/N, IBMAV/N, Innoc, NAV/N
Removal Instructions: Delete infected files
General Comments:
The Clone 2.0 virus was received in September, 1993, and is from
Australia. It is a memory resident spawning or companion virus.
When the first Clone 2.0 infected program is executed, this virus
will install itself as a low system memory TSR of 2,048 bytes.
Interrupt 21 will be hooked by the virus in memory.
One the virus is memory resident, it will infect .EXE programs
when they are executed or opened by creating a hidden .COM file
with the same base file name. The hidden companion file will have
a file length of 833 bytes and its file date and time will be the
system date and time when it was created. The following text
strings can be found in all of the companion files:
"Your PC is Cloned!!"
"Clone Virus ver 2.0..(c) Cataclysm 1992 Sydney,
Australia....To Create and Mutate..."
".EXE .COM LOVEV20.EXE"
System hangs frequently occur when infected programs are executed.