Search results
Results from the WOW.Com Content Network
The first known polymorphic virus was written by Mark Washburn. The virus, called 1260, was written in 1990. A better-known polymorphic virus was created in 1992 by the hacker Dark Avenger as a means of avoiding pattern recognition from antivirus software. A common and very virulent polymorphic virus is the file infecter Virut.
The Smeg Virus Construction Kit (or SMEG) is a polymorphic engine written by virus writer Chris Pile, known as The Black Baron. SMEG is an acronym for Simulated Metamorphic Encryption Generator. SMEG is an acronym for Simulated Metamorphic Encryption Generator.
OneHalf is a DOS-based polymorphic computer virus (hybrid boot and file infector) discovered in October 1994. [1] It is also known as Slovak Bomber, Freelove or Explosion-II. [ 2 ] It infects the master boot record (MBR) of the hard disk , and any files with extensions .COM , .SCR and .EXE . [ 3 ]
ARCV-n is a large family of viruses authored by the Association of Really Cruel Viruses (ARCV) group through October - November 1992. and polymorphed [clarification needed] with the PS-MPC virus generation tool (hence they are very similar). A polymorphic virus mutates itself to avoid detection by traditional antivirus and antimalware software. [1]
1260, or V2PX, [1] [2] was a polymorphic computer virus written in 1989 by Mark Washburn. Derived from Ralf Burger's publication of the disassembled Vienna Virus source code, the 1260 added a cipher and varied its signature by randomizing its decryption algorithm. Both the 1260 and Vienna infect .COM files in the current or PATH directories ...
The Rabbit (or Wabbit) virus, more a fork bomb than a virus, is written. The Rabbit virus makes multiple copies of itself on a single computer (and was named "rabbit" for the speed at which it did so) until it clogs the system, reducing system performance, before finally reaching a threshold and crashing the computer. [10]
Sality is a family of polymorphic file infectors, which target Windows executable files with the extensions .EXE or .SCR. [1] Sality utilizes polymorphic and entry-point obscuring (EPO) techniques to infect files using the following methods: not changing the entry point address of the host, and replacing the original host code at the entry point of the executable with a variable stub to ...
A polymorphic packer is a file binder with a polymorphic engine. It thus has the ability to make its payload mutate over time, so it is more difficult to detect and remove. [ citation needed ]