Basic types of deformed viruses

Source: Internet
Author: User
Tags relative

After the virus has spread to the target, the virus's own code and structure have changed in space and time, and this virus is called the deformed virus.

We briefly classify the following variants of the variant virus into four categories.

The characteristics of the first type of deformable virus are: the basic characteristics of the common virus, however, after each transmission of the virus to a target, its own code and the previous target of the virus code almost no more than three consecutive bytes are the same, but the relative space of these codes in the location of the arrangement is not changed, here is called: one-dimensional deformable virus.

In one-dimensional deformable virus, individual viruses infect the system and can be self encrypted or removed when detected, or disappear. Some of the column directories can disappear the increased number of bytes, or load the trace, the virus can destroy the tracking or fled.

The characteristics of the second type of deformed virus are: in addition to the characteristics of one-dimensional deformed virus, and those changes in the code between the arrangement distance (relative space position), is also changing, here is called: two-dimensional deformation virus.

In two-dimensional deformable virus, as mentioned in the previous MADE-SP virus, can be in some kind of quiet special way or mixed in the normal system commands to modify the System key kernel, and dissolve into one, or simply another create some new interrupt invocation function. Some infected files have an indefinite number of bytes, or dissolve into one file.

The characteristics of the third type of deformable virus are: the characteristics of two-dimensional deformation virus, and can be divided into a few, respectively, when the virus engine is excited can restore itself to a complete virus. The location of the virus on the attachment is varied, that is, the latent position is uncertain. For example: May be hidden in the first machine hard disk of the main boot area, and several other points may be hidden in a few files, may also lurk in the cover file, may also lurk in the system boot area, may also be another area of the hidden ... Wait a minute. In the next infected machine, the virus has changed its hidden position. Here is called: three-dimensional deformable virus.

The characteristics of the fourth type of deformable virus are: the characteristics of three-dimensional deformed virus, and these characteristics change with time. For example, in the infected machine, just open the virus in memory changes to a look, after a period of time and become another look, again after the virus in memory is a different look. There are also such a virus, which itself is a transmission of the "Virus production machine" virus, they will be in the computer or spread through the network, will be their own code generation in the previous code of a different variant of the new virus, here is called: four-dimensional deformation of the virus. Most of the four-dimensional deformation virus has network automatic transmission function, in different corners of the network hidden everywhere.

There are also a number of such advanced viruses that no longer hold the "prank" of the vast majority of viruses in the past, and it may be primarily a "strategic weapon" of information, which can disrupt social information, political and economic order, or dominate the purpose of war, in a society that has invested heavily in the society. They may be able to receive remote control information or send out information. For example, you can send and receive information via video, audio, radio or the Internet on a multimedia machine. You can also send out information from the computer's radiation wave. It can also be hidden in the Internet-connected computers, collecting passwords and important information, and then quietly as the owner of the communication, the important information sent out (I-WORM/MAGISTR (Margith) virus has this function), these deformed virus is very intelligent degree.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.