Mooc Virus


 Virus Name:  Mooc 
 Aliases:     Mooc.288, Control.Monkey 
 V Status:    New 
 Discovered:  July, 1995 
 Symptoms:    .COM file growth; system hangs may occur 
 Origin:      Unknown 
 Eff Length:  288 Bytes 
 Type Code:   PRaCK - Parasitic Resident .COM Infector 
 Detection Method:  F-Prot, AVTK, VAlert, NAVDX, Sweep, ViruScan, NAV, 
                    IBMAV, PCScan, ChAV, 
                    Sweep/N, NShld, NAV/N, IBMAV/N, AVTK/N, NProt, Innoc 
 Removal Instructions:  Delete infected files 
 
 General Comments: 
       The Mooc or Mooc.288 virus was received in July, 1995.  Its origin 
       or point of isolation is unknown.  Mooc is a memory resident 
       infector of .COM files, including COMMAND.COM. 
 
       When the first Mooc infected program is executed, this virus will 
       install itself memory resident in a buffer in allocated system 
       memory, hooking interrupt 21.  Total system and available free 
       memory, as indicated by the DOS CHKDSK program, will not be 
       altered. 
 
       Once the Mooc virus is memory resident, it will infect .COM 
       programs when they are executed.  Infected .COM programs will have 
       a file length increase of 288 bytes with the virus being located 
       at the beginning of the file.  The program's date and time in the 
       DOS disk directory listing will not be altered.  The following 
       text string is visible within the viral code: 
 
           "Monkeys out of Control" 
 
       System hangs may occur when some very small infected .COM files 
       are executed. 

Show viruses from discovered during that infect .

Main Page