Jason Virus


 Virus Name:  Jason 
 Aliases:    
 V Status:    New 
 Discovery:   January, 1994 
 Symptoms:    .COM file growth; characters from memory displayed before 
              expected program output 
 Origin:      Unknown 
 Eff Length:  609 Bytes 
 Type Code:   PNC - Parasitic Non-Resident .COM Infector 
 Detection Method:  ViruScan, F-Prot, AVTK, IBMAV, Sweep, NAV, 
                    NAVDX, VAlert, PCScan, ChAV, 
                    NShld, AVTK/N, Sweep/N, IBMAV/N, NProt, NAV/N, Innoc, 
                    LProt 
 Removal Instructions:  Delete infected files 
 
 General Comments: 
       The Jason virus was submitted in January, 1994.  Its origin or point 
       of isolation is unknown.  Jason is a non-resident, direct action 
       infector of .COM programs, but not COMMAND.COM. 
 
       When a program infected with the Jason virus is executed, this virus 
       will infect one .COM file located in the current directory.  Programs 
       infected with the Jason virus will have a file length increase of 609 
       bytes with the virus being located at the end of the file.  The 
       program's date and time in the DOS disk directory listing will not be 
       altered.  The following text strings are encrypted within the Jason 
       viral code: 
 
               "Jason Virus" 
               "You've been infected by the JASON Virus. . ." 
               "This is only a test virus" 
               "So Dont Worry. . . .MAYBEEEEE" 
               "*.com" 
 
       Additionally, the text string "AD" can be found starting in the 
       fourth byte of all infected files. 
 
       Programs infected with the Jason virus may display characters from 
       system memory when they are executed, followed by the display of the 
       expected program output. 

Show viruses from discovered during that infect .

Main Page