Necro Shadow Virus
Virus Name: Necro Shadow
Aliases:
V Status: Rare
Discovered: November, 1992
Symptoms: .COM & .EXE growth; decrease in total system & available free
memory; system hangs; disruption of screen contents, including
"blue snow"
Origin: United States
Eff Length: 1,200 Bytes
Type Code: PRhAK - Parasitic Resident .COM & .EXE Infector
Detection Method: ViruScan, AVTK, F-Prot, Sweep, IBMAV, ChAV,
NAV, NAVDX, VAlert, PCScan,
NShld, Sweep/N, Innoc, NProt, AVTK/N, LProt, NAV/N,
IBMAV/N
Removal Instructions: Delete infected files
General Comments:
The Necro Shadow virus was submitted in November, 1992. It is from
the United States. Necro Shadow is a memory resident infector of
.COM and .EXE programs, including COMMAND.COM.
When the first Necro Shadow infected program is executed, the Necro
Shadow virus will install itself memory resident at the top of system
memory but below the 640K DOS boundary, hooking interrupt 21. Total
system and available free memory will have decreased by approximately
3K.
Once the Necro Shadow virus is memory resident, it will infect .COM
and .EXE programs, including COMMAND.COM, when they are executed.
Infected programs will have a file length increase of 1,200 bytes
with the virus being located at the end of the file. The program's
date and time in the DOS disk directory listing will not be altered.
The following text strings are encrypted within the viral code:
"[Shadow] NecroSoft Enterprises-a division of BCA"
"Greets to SKISM"
Infected systems will experience frequent system hangs when the
user attempts to execute programs. Boot failures will occur once
the boot copy of COMMAND.COM becomes infected. Screen disruptions
will also frequently occur. On monochrome systems, these appear
as a couple of characters being altered on the screen. On VGA
systems, a bunch of blue squares or blue snow will appear. In
both cases, a system hang will accompany the screen disruption.
Known variant(s) of Necro Shadow are:
Necro Shadow.1185: Received in January, 1996, this is a 1,185
byte variant of the Necro Shadow virus described above. Its
size in memory is 2,400 bytes, hooking interrupt 21. Once
resident, it infects .COM and .EXE files, but not COMMAND.COM,
when they are executed. Infected programs will have a file
length increase of 1,185 bytes with the virus being located at
the end of the file. The file's date and time in the DOS disk
directory listing will not be altered. The following text
strings are encrypted within the viral code:
"[Shadow] Necrosoft Enterprises-a dividsion of BCA"
"Greets to SKISM"
System hangs and unexpected system reboots may occur on infected
systems.
Origin: Unknown January, 1996.
Necro Shadow.1702: Received in January, 1996, this is a minor
variant of the Necro Shadow-B variant. Its size in memory
is 3,600 bytes, hooking interrupt 21. It infects .COM and
.EXE programs, including COMMAND.COM, when they are executed,
opened, or a DOS DIR command is performed. Infected programs
will have a file length increase of 1,702 bytes, though the
file length increase will be hidden when it is memory resident.
The virus will be located at the end of the file. The program's
date and time in the DOS disk directory listing will not be
altered. The following text strings are encrypted within the
viral code:
"[Shadow-B/2] NecroSoft Enterprises-a division of BCA"
"Greets to SKISM"
System hangs and unexpected system reboots may occur on infected
systems.
Origin: Unknown January, 1996.
Necro Shadow-B: Based on the Necro Shadow virus described above,
this variant employs stealth techniques to avoid detection
and quickly spread on infected systems. Its size in memory
is 3,504 bytes, hooking interrupt 21. It infects .COM and
.EXE programs, including COMMAND.COM, when they are executed,
opened, or a DOS DIR command is performed. Infected programs
will have a file length increase of 1,700 bytes, though the
file length increase will be hidden when Necro Shadow-B is
memory resident. The virus will be located at the end of the
file. The program's date and time in the DOS disk directory
listing will not be altered. The following text strings are
encrypted within the viral code:
"[Shadow-B] NecroSoft Enterprises - a division of BCA"
"Greets to SKISM"
Systems infected with Necro Shadow-B will experience boot
failures once the boot copy of COMMAND.COM becomes infected.
Attempts to execute programs on write protected diskettes
will result in a write protect error. The DOS CHKDSK program
will return file allocation errors on all infected programs
when the virus is memory resident.
Origin: United States November, 1992.