Moctezumas Revenge Virus
Virus Name: Moctezumas Revenge
Aliases: Ciudado, Moctezumas, Moctezuma
V Status: Rare
Discovered: December, 1991
Symptoms: .COM & .EXE growth; TSR; file allocation errors; boot failure
Origin: Unknown
Eff Length: 2,208 - 2,228 Bytes
Type Code: PRsAK - Parasitic Resident .COM & .EXE Infector
Detection Method: ViruScan, F-Prot, Sweep, AVTK, IBMAV, NAV,
NAVDX, VAlert, PCScan, ChAV,
Sweep/N, LProt, NShld, Innoc, NProt, AVTK/N, NAV/N,
IBMAV/N
Removal Instructions: Delete infected files
General Comments:
The Moctezumas Revenge virus was submitted in December, 1991. Its
origin or point of original isolation is unknown. Moctezumas
Revenge is a memory resident infector of .COM and .EXE files,
including COMMAND.COM. It will also occassionally infect the
hidden DOS system .SYS files. This virus is based on the
Jerusalem virus.
The first time a program infected with Moctezumas Revenge is
executed, the virus will install itself memory resident as a low
system memory TSR of 2,336 bytes. It will hook interrupts 13 and
21.
Once Moctezumas Revenge is memory resident, it will infect .COM
and .EXE programs, including COMMAND.COM, when they are executed.
It will also occassionally infect the hidden DOS system .SYS files
as well.
Moctezumas Revenge infected programs, with the exception of
COMMAND.COM, will have a file length increase of 2,208 to 2,228
bytes with the virus being located at the beginning of the
infected file. In the case of COMMAND.COM and the hidden .SYS
files, there will be no file length increase. The file's date
and time will not be altered in the DOS disk directory listing.
Infected files can be identified by the two characters "92"
appearing in bytes 8 and 9 of infected files. The Moctezumas
Revenge virus is encrypted, though the following text string
will occassionally be visible in infected files:
"Moctezuma's Revenge92"
Symptoms of a Moctezumas Revenge infection include file
allocation errors for COMMAND.COM and possibly the hidden DOS
system .SYS files. A file allocation error may occur on some
other file as well, due to the virus writing out a copy of itself
to another cluster without checking to see if it was previously
in use. Systems with an infected COMMAND.COM will fail to boot
from the infected COMMAND.COM.
It is unknown what Moctezumas Revenge does besides replicate.
Known variant(s) of Moctezumas Revenge are:
Moctezumas Revenge 2: A later version of the original
Moctezumas Revenge virus, this variant has had been
changed so that boot failures and file allocation errors
no longer occur. COMMAND.COM and the hidden system files
will no longer be infected by the virus. Moctezumas
Revenge 2 adds 2,228 bytes to .COM programs, locating its
viral code at the beginning of the file. On .EXE programs,
it adds 2,208 to 2,222 bytes locating the virus at the
end of the file. The text string which will appear when
an unencrypted copy of the viral infects a file contains
the following text string: "Moctezuma's Revenge62". The
infection identifier has been changed from 92 to 62, though
in .EXE programs it is no longer located near the beginning
of the infected file since the virus is now at the end of
the file.
Origin: Unknown March, 1992.
See: Jerusalem Poison