We help IT Professionals succeed at work.

We've partnered with Certified Experts, Carl Webster and Richard Faulkner, to bring you two Citrix podcasts. Learn about 2020 trends and get answers to your biggest Citrix questions!Listen Now

x

antiCMOS A virus removal

gmcdc
gmcdc asked
on
Medium Priority
1,922 Views
Last Modified: 2013-12-27
null
Comment
Watch Question

Commented:
You may be experiencing a false report.  If the McAffee located
the virus, it should have, in my opinion also have deleted the
virus, and by using a clean disk to reboot, well I assume you
scanned that also.  Its often a good idea to use more than one
AV program.  You can try Norton AV by going to:

  http://www.symantec   
OR F-Prot from DataFellows:  http://www.datafellows.com

  More info on Lenart if you don't already have it:

AntiCMOS

Aliases:            Lenart
Known Strains:      AntiCMOS.A and AntiCMOS.B
Infection Length:   512 bytes

Area of Infection: Floppy Boot Sectors and Master Boot Records
Likelihood:        Common
Region Reported:   Hong Kong
Keys:              Wild, Memory Resident

Technical Notes:

The AntiCMOS virus is a simple Master Boot Record (MBR), DOS Boot
Sector (DBS) infecting virus which will only spread to a system when there is an attempt to boot the system from an infected floppy disk.

Note that there is little difference between the .A and .B strains. Other than the triggered event, they are identical.

During the start of the boot process, the AntiCMOS virus first reduces the total amount of conventional memory by 2k (CHKDSK will report 653,312 on infected systems), loads itself into memory, redirects the BIOS Disk I/O Services Interrupt 13h and returns control to the system for further processing of the boot strap.

With the virus now active in memory, all disk reads of exactly one sector using the BIOS Disk I/O services are now filtered out. Upon request of such a service the virus first checks to see if the trigger requirements of the viruses payload have been met.

AntiCMOS.A
If the trigger conditions hold true then AntiCMOS.A will make
modifications to the systems CMOS data (a bug within the program's the trigger routine will more than likely never be executed). However, if the trigger condition is not met the MBR (when dealing with the hard drives) or the DBS (when dealing with floppy disks) is read into memory, infected, and then written back to the drive.

AntiCMOS.B
If the trigger conditions hold true then AntiCMOS.B will generate
sounds from the PC speaker (a bug within the program's the trigger routine will more than likely never be executed). However, if the trigger condition is not met the MBR (when dealing with the hard drives) or the DBS (when dealing with floppy disks) is read into memory, infected, and then written back to the drive.

 Hope this helps...


Not the solution you were looking for? Getting a personalized solution is easy.

Ask the Experts
Access more of Experts Exchange with a free account
Thanks for using Experts Exchange.

Create a free account to continue.

Limited access with a free account allows you to:

  • View three pieces of content (articles, solutions, posts, and videos)
  • Ask the experts questions (counted toward content limit)
  • Customize your dashboard and profile

*This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

OR

Please enter a first name

Please enter a last name

8+ characters (letters, numbers, and a symbol)

By clicking, you agree to the Terms of Use and Privacy Policy.