Godzilla Virus
Virus Name: Godzilla
Aliases: Godzilla.890
V Status: New
Discovered: July, 1995
Symptoms: .COM file growth; TSR
Origin: Unknown
Eff Length: 890 Bytes
Type Code: PRsC - Parasitic Resident .COM Infector
Detection Method: F-Prot, AVTK, VAlert, NAV, NAVDX, Sweep,
ViruScan, IBMAV, PCScan, ChAV,
Sweep/N, NShld, NAV/N, AVTK/N, IBMAV/N, Innoc
Removal Instructions: Delete infected files
General Comments:
The Godzilla virus was received in July, 1995. Its origin or point
of isolation is unknown. Godzilla is a memory resident infector of
.COM files, but not COMMAND.COM.
When the first Godzilla infected program is executed, this virus
will install itself memory resident as a low system memory TSR of
1,152 bytes. Interrupts 1C and 21 will be hooked by the virus in
memory.
Once the Godzilla virus is memory resident, it will infect .COM
files, but not COMMAND.COM, when they are executed. Infected .COM
files will have a file length increase of 890 bytes with the virus
being located at the end of the file. The program's date and time
in the DOS disk directory listing will not be altered. The following
text string is encrypted within the viral code:
"AntiPascal-1 (C)Godzilla Corp."
It is unknown what the Godzilla virus may do besides replicate.