Jason Virus
Virus Name: Jason
Aliases:
V Status: New
Discovery: January, 1994
Symptoms: .COM file growth; characters from memory displayed before
expected program output
Origin: Unknown
Eff Length: 609 Bytes
Type Code: PNC - Parasitic Non-Resident .COM Infector
Detection Method: ViruScan, F-Prot, AVTK, IBMAV, Sweep, NAV,
NAVDX, VAlert, PCScan, ChAV,
NShld, AVTK/N, Sweep/N, IBMAV/N, NProt, NAV/N, Innoc,
LProt
Removal Instructions: Delete infected files
General Comments:
The Jason virus was submitted in January, 1994. Its origin or point
of isolation is unknown. Jason is a non-resident, direct action
infector of .COM programs, but not COMMAND.COM.
When a program infected with the Jason virus is executed, this virus
will infect one .COM file located in the current directory. Programs
infected with the Jason virus will have a file length increase of 609
bytes with the virus being located at the end of the file. The
program's date and time in the DOS disk directory listing will not be
altered. The following text strings are encrypted within the Jason
viral code:
"Jason Virus"
"You've been infected by the JASON Virus. . ."
"This is only a test virus"
"So Dont Worry. . . .MAYBEEEEE"
"*.com"
Additionally, the text string "AD" can be found starting in the
fourth byte of all infected files.
Programs infected with the Jason virus may display characters from
system memory when they are executed, followed by the display of the
expected program output.