Mosca Virus
Virus Name: Mosca
Aliases: Mosca.849
V Status: New
Discovered: January, 1996
Symptoms: .COM file growth; decrease available free memory;
system hangs; file date/time seconds = "60"
Origin: Unknown
Eff Length: 849 Bytes
Type Code: PRhCK - Parasitic Resident .COM Infector
Detection Method: AVTK, IBMAV, ViruScan, PCScan, NAV, NAVDX, ChAV,
Innoc, AVTK/N, IBMAV/N, NShld, NAV/N
Removal Instructions: Delete infected files
General Comments:
The Mosca virus was received in January, 1996. Its origin or point
of isolation is unknown. Mosca is a memory resident size stealthing
infector of .COM files, including COMMAND.COM. System hangs
frequently occur on infected systems.
When the first Mosca infected program is executed, this virus will
install itself memory resident at the top of system memory but
below the 640K DOS boundary, not moving interrupt 12's return.
Available free memory will have decreased by approximately 860
bytes. Interrupt 21 will be hooked by the virus in memory.
Once the Mosca virus is memory resident, it will infect .COM files,
including COMMAND.COM, when they are executed. Infected .COM files
will have a file length increase of 849 bytes with the virus being
located at the end of the file. The file length increase will not
be apparent in the DOS disk directory listing when this virus is
memory resident. The program's date and time in the DOS disk
directory listing will not appear to be altered, though the seconds
field will have been set to "60". The following text strings
are encrypted within the viral code:
"Mosca v1.0"
"por WM [DAN]"
System hangs frequently occur when programs are executed with the
virus memory resident.
Known variant(s) of Mosca are:
Mosca.1278: Also received in January, 1996, this is a 1,278
byte variant of the Mosca virus described above. Its size in
memory is approximately 1,280 bytes, hooking interrupt 21.
It adds 1,278 bytes to the .COM files it infects, though this
file length increase will be hidden when the virus is memory
resident. The virus will be located at the end of the file.
The program's date and time in the DOS disk directory listing
will not appear to be altered, though the seconds field will
have been set to "60". The following text strings are
encrypted within the viral code:
"Mosca v2.0"
"por WM [DAN]"
System hangs frequently occur on infected systems.
Origin: Unknown January, 1996.
Mosca.1372: Also received in January, 1996, this is a 1,372
byte variant of the Mosca virus described above. Its size in
memory is approximately 1,376 bytes, hooking interrupt 21.
It adds 1,376 bytes to the .COM files it infects, though this
file length increase will be hidden when the virus is memory
resident. The virus will be located at the end of the file.
The program's date and time in the DOS disk directory listing
will not appear to be altered, though the seconds field will
have been set to "60". The following text strings are
encrypted within the viral code:
"Mosca v2.1"
"por WM [DAN]"
System hangs frequently occur on infected systems. The DOS
CHKDSK program will indicate file allocation errors on all
infected files when this virus is memory resident.
Origin: Unknown January, 1996.