Koko Virus


 Virus Name:  Koko 
 Aliases:     Koko.1783 
 V Status:    New 
 Discovered:  October, 1994 
 Symptoms:    .COM & .EXE growth; 
              decrease in total system & available free memory 
 Origin:      Unknown 
 Eff Length:  1,783 - 2,052 Bytes 
 Type Code:   PRhAK - Parasitic Resident .COM & .EXE Infector 
 Detection Method:  ViruScan, AVTK, Sweep, IBMAV, NAV, NAVDX, PCScan, 
                    F-Prot, PCScan, ChAV, 
                    NShld, NProt, Sweep/N, AVTK/N, NAV/N, IBMAV/N, 
                    Innoc 4.0+, LProt 
 Removal Instructions:  Delete infected files 
 
 General Comments: 
       The Koko or Koko.1783 virus was received in October, 1994.  Its origin 
       or point of isolation is unknown.  Koko is a memory resident infector 
       of .COM and .EXE files, including COMMAND.COM. 
 
       When the first Koko infected program is executed, this virus will 
       become memory resident at the top of system memory but below the 640K 
       DOS boundary, not moving interrupt 12's return.  Total system and 
       available free memory, as indicated by the DOS CHKDSK program, will 
       have decreased by 2,048 bytes.  Interrupts 03 and 21 will be hooked 
       by the virus in memory. 
 
       Once the Koko virus is memory resident, it will infect .COM and .EXE 
       programs when they are executed.  Infected .COM files increase in 
       size by 1,783 to 1,795 bytes while .EXE files increase in size by 
       2,042 to 2,052 bytes.  In both cases, the virus will be located at 
       the end of the file.  The program's date and time in the DOS disk 
       directory listing will not be altered.  The following text string is 
       visible within the viral code in all Koko infected files: 
 
               "KoKo (1)" 
 
       It is unknown what Koko does besides replicate. 

Show viruses from discovered during that infect .

Main Page