Story About the Virus (episode two)

Story About the Virus (episode two) 
VIRUS LIFE CYCLE


Viral life cycle in general, through 4 stages:


o Dormant phase (Phase Rest / Sleep) In this phase the virus is not active. The virus will be activated by a condition specific, such as: the date specified, the presence of other programs / execution other programs, etc.. Not all viruses through this phase


o Propagation phase (Phase Distribution) In this phase the virus will unite himself to a program
or to a place of storage media (both hard drives, ram etc). Each Infected programs will be the result of "cloning" virus (Depending on how the virus infects)


o Trigerring phase (Phase Active) In this phase the virus becomes active and this is also the trigger by some conditions as in Dormant phase


o Execution phase (Phase Execution) In this phase the virus is active before going to perform its function. Such as deleting files, display messages, etc. 

VIRUS Types

To further refine our knowledge about the virus, I will try provide an explanation of the types of viruses that often roam in the cyber world.
1.Macro Virus This virus type must have been very often we hear. The virus is written with the programming language of an application rather than by language programming of an Operating System. The virus is able to walk when constituent applications to run well, meaning if the mac computer can run the application word so this virus works on Mac operating system computers 


virus samples:


- Variant W97M, eg W97M.Panther 1234 bytes long, will infect the Normal.dot and infect the document when opened. - WM.Twno.A; TW 41 984 bytes long, Ms.Word document will infect that use macro languages, usually DOT and the extension *. DOC *.


2.Boot Sector Virus Boot sector viruses are spread is very common. The virus is in the double he will move or replace the original boot sector with the program boot virus. Thus, whenever booting the virus will be loaded into memory and then the virus will have the ability to control the hardware standard (Ex: monitor, printer, etc.) and from this memory is also the virus will spread to all existing drives and connect to the computer (ex: floppy, another drive other than drive c). 
virus samples:


- Variant virus wyx ex: wyx.C (B) infects the boot record and floppy; length: 520 bytes; characteristics: memory resident and encrypted) 
- Variant V-sign: infect: Master boot record; 520 bytes long; characteristics: living in the memory (memory resident), encrypted, and polymorphic) 
- Stoned.june 4th / bloody! infect: Master boot record and floppy 520 bytes long; characteristics: living in the memory (memory resident), encrypted and display message "Bloody! june 4th 1989 after the computer is booting 128 times


3.Stealth Virus This virus will master table at the DOS interrupt table that often we know with "Interrupt interceptor". this virus is capable to control DOS level instruction and the instruction they usually hidden as its name either full or size. 


virus samples: 
- Yankee. XPEH.4928, infect files *. COM and *. EXE; 4298 bytes long; characteristics: living in memory, the size of the hidden, has a trigger - WXYC (which includes any category because the boot record into stealth category Also included here), an infected floppy motherboot record 520 bytes long; living in the memory; size and hidden viruses.
- Vmem (s): infect files *. EXE, *. SYS and *. COM; fie 3275 bytes long; characteristics: living in memory, the size of the hidden, is encrypted.


4. Polymorphic Viruses The virus is designed to make misleading antivirus program, meaning the virus is always trying to avoid being recognized by the anti virus is always changing the way fox structure after each infected file / other programs

virus samples:


- Necropolis A / B, infect files *. EXE and *. COM; files 1963 bytes long characteristics: living in memory, the size and viruses hidden, encrypted and can be changed to change the structure 
- Nightfall, infect files *. EXE files 4554 bytes long; characteristics: living in memory, the size and hidden viruses, has a trigger, encrypted and can change structure


5. Virus Files / Program This virus infects an executable file directly from the operating system, whether the application configuration file (*. EXE), or *. com is usually also the result of infection of this virus can be identified by changing the size of files that attacked.

6. Multi Partition Virus This virus is a combination dariVirus boot sector and file viruses: it means the work performed resulted in two, that he can infect files *. EXE file and also infect the Boot Sector. 



0 Comments

0 Response to "Story About the Virus (episode two)"

Post a Comment