Xora Virus

 Virus Name:  Xora 
 V Status:    New 
 Discovery:   July, 1995 
 Symptoms:    .EXE file growth; file date/time seconds = "24"; 
              decrease in available free memory 
 Origin:      Unknown 
 Eff Length:  1,028 - 1,040 Bytes 
 Type Code:   PRhE - Parasitic Resident .EXE Infector 
 Detection Method: F-Prot, AVTK, VAlert, ViruScan, Sweep, NAVDX, NAV, 
                   IBMAV, PCScan, ChAV, 
                   NAV/N, NShld, Sweep/N, IBMAV/N, NProt, AVTK/N, Innoc 4.0+ 
 Removal Instructions:  Delete infected files 
 General Comments: 
       The Xora virus was received in July, 1995.  Its origin or point of 
       isolation is unknown.  Xora is a memory resident infector of .EXE 
       When the first Xora infected program is executed, this virus will 
       become memory resident at the top of system memory but below the 
       640K DOS boundary, not moving interrupt 12's return.  Available 
       system memory will have decreased by 912 bytes.  Interrupt 21 will 
       be hooked by the virus in memory. 
       Once the Xora virus is memory resident, it will infect .EXE files, 
       other than very small ones, when they are executed.  Infected files 
       will have a file length increase of 1,028 to 1,040 bytes with the 
       virus being located at the end of the file.  The program's date and 
       time in the DOS disk directory listing will not appear to be altered, 
       though the seconds field will have been set to "24".  The following 
       text string is visible within the viral code in all infected files: 
           "xor "a"  " 
       It is unknown what the Xora virus does besides replicate. 

Show viruses from discovered during that infect .

Main Page