Jerusalem 1663 Virus
Virus Name: Jerusalem 1663
Aliases:
V Status: Rare
Discovered: October, 1992
Symptoms: .COM & .EXE growth; TSR
Origin: Unknown
Eff Length: 1,663 Bytes
Type Code: PRsAK - Parasitic Resident .COM & .EXE Infector
Detection Method: ViruScan, AVTK, Sweep, F-Prot, IBMAV, NAV,
NAVDX, VAlert, PCScan, ChAV,
NShld, Sweep/N, Innoc, NProt, AVTK/N, LProt, IBMAV/N,
NAV/N
Removal Instructions: Delete infected files
General Comments:
The Jerusalem 1663 virus was received in October, 1992. Its origin
or point of isolation is unknown. Jerusalem 1663 is a memory
resident infector of .COM and .EXE programs, including COMMAND.COM.
The first time a program infected with the Jerusalem 1663 virus is
executed, the Jersalem 1663 virus will install itself memory resident
as a low system memory TSR of 2,432 bytes. Interrupts 13 and 21 will
be hooked.
Once memory resident, Jersalem 1663 will infect programs, including
COMMAND.COM, when they are executed. Both .COM and .EXE programs
will increase in size by 1,663 bytes with the virus being located
at the end of the file. The virus cannot recognize a previous
infection on a file. Both .COM and .EXE programs may become
reinfected, adding 1,663 bytes with each reinfection. The file's
date and time in the DOS disk directory listing will not be
altered. No text strings are visible within the viral code.
It is unknown what Jerusalem 1663 does besides replicate.
See: Jerusalem