What are stealth, polymorphic, and armored viruses? (2024)

This content has been archived, and is no longer maintained by Indiana University. Information here may no longer be accurate, and links may no longer be available or reliable.

Stealth, polymorphic, and armored viruses use techniques tomake it more difficult for virus detection programs to identify them.The descriptions below outline the strategies that these viruses use.

Note: This information is from thevirus-L/comp.virus FAQ. You can view theentire document at:

 http://www.faqs.org/faqs/by-newsgroup/comp/comp.virus.html

What is a stealth virus?

Stealth viruses

A stealth virus is one that, while active, hides the modifications ithas made to files or boot records. It usually achieves this bymonitoring the system functions used to read files or sectors fromstorage media and forging the results of calls to such functions. Thismeans that programs that try to read infected files or sectors see theoriginal, uninfected form instead of the actual, infected form. Thusthe virus's modifications may go undetected by antivirusprograms. However, in order to do this, the virus must be resident inmemory when the antivirus program is executed, and theantivirus program may be able to detect its presence.

The very first DOS virus, Brain, a boot-sector infector,monitored physical disk input/output and redirected any attempt to reada Brain-infected boot sector to the disk area where the original bootsector was stored.

File stealth viruses

In addition to hiding the boot information, file stealth virusesattack .com and .exe files when opened orcopied, and hide the file size changes from the DIR command. The majorproblem arises when you try to use the CHKDSK/F command and thereappears to be a difference in the reported files size and the apparentsize. CHKDSK assumes this is the result of some cross-linked files andattempts to repair the damage. The result is the destruction of thefiles involved.

Full stealth viruses

With a full stealth virus, all normal calls to filelocations are cached, while the virus subtracts its own length so thatthe system appears clean.

Countermeasures

You need a clean system so that no virus is present to distort theresults of system status checks. Thus you should start the system froma trusted, clean, bootable diskette before you attempt anyvirus checking.

What is a polymorphic virus?

A polymorphic virus is one that produces varied but operational copiesof itself. This strategy assumes that virus scanners will not be ableto detect all instances of the virus. One method of evadingscan-string driven virus detectors is self-encryption with a variablekey.

More sophisticated polymorphic viruses (e.g., V2P6) vary the sequencesof instructions in their variants by interspersing the decryptioninstructions with "noise" instructions (e.g., a No Operationinstruction, or an instruction to load a currently unused registerwith an arbitrary value), by interchanging mutually independentinstructions, or even by using various instruction sequences withidentical net effects (e.g., Subtract A from A, and Move 0 to A). Asimple-minded, scan-string based virus scanner would not be able toreliably identify all variants of this sort of virus; in this case, asophisticated scanning engine has to be constructed after thoroughresearch into the particular virus.

One of the most sophisticated forms of polymorphism used so far is theMutation Engine (MtE), which comes in the form of an objectmodule. With the Mutation Engine, any virus can be made polymorphic byadding certain calls to its assembler source code and linking to themutation-engine and random-number generator modules.

The advent of polymorphic viruses has rendered virus scanning anincreasingly difficult and expensive endeavor; adding more and moresearch strings to simple scanners will not adequately deal with theseviruses.

What is an armored virus?

Armored viruses use special tricks to make the tracing, disassembling,and understanding of their code more difficult. A good example is theWhale virus.

What are stealth, polymorphic, and armored viruses? (2024)
Top Articles
Getting a Mortgage Without a Perfect 2-Year Work History - NerdWallet
TurboTax E-mail saying return is on the way
Victor Spizzirri Linkedin
Prosper TX Visitors Guide - Dallas Fort Worth Guide
Noaa Weather Philadelphia
Music Archives | Hotel Grand Bach - Hotel GrandBach
Evita Role Wsj Crossword Clue
Campaign Homecoming Queen Posters
Craigslist Chautauqua Ny
Bc Hyundai Tupelo Ms
Robert Malone é o inventor da vacina mRNA e está certo sobre vacinação de crianças #boato
Blog:Vyond-styled rants -- List of nicknames (blog edition) (TouhouWonder version)
Summoners War Update Notes
Classroom 6x: A Game Changer In The Educational Landscape
Forest Biome
Pasco Telestaff
Sadie Sink Reveals She Struggles With Imposter Syndrome
Renfield Showtimes Near Paragon Theaters - Coral Square
4 Times Rihanna Showed Solidarity for Social Movements Around the World
Craigslist Pasco Kennewick Richland Washington
When His Eyes Opened Chapter 3123
Tom Thumb Direct2Hr
Japanese Emoticons Stars
Rek Funerals
Elanco Rebates.com 2022
Lininii
Broken Gphone X Tarkov
Brenda Song Wikifeet
Salons Open Near Me Today
Spy School Secrets - Canada's History
Jay Gould co*ck
The Pretty Kitty Tanglewood
The Legacy 3: The Tree of Might – Walkthrough
10 Most Ridiculously Expensive Haircuts Of All Time in 2024 - Financesonline.com
Family Fare Ad Allendale Mi
New York Rangers Hfboards
Cherry Spa Madison
Fapello.clm
2 Pm Cdt
Craigs List Hartford
1Exquisitetaste
Gopher Hockey Forum
Mudfin Village Wow
Sallisaw Bin Store
Pike County Buy Sale And Trade
Avatar: The Way Of Water Showtimes Near Jasper 8 Theatres
Superecchll
28 Mm Zwart Spaanplaat Gemelamineerd (U999 ST9 Matte | RAL9005) Op Maat | Zagen Op Mm + ABS Kantenband
Sdn Dds
Salem witch trials - Hysteria, Accusations, Executions
Latest Posts
Article information

Author: Dan Stracke

Last Updated:

Views: 6146

Rating: 4.2 / 5 (63 voted)

Reviews: 86% of readers found this page helpful

Author information

Name: Dan Stracke

Birthday: 1992-08-25

Address: 2253 Brown Springs, East Alla, OH 38634-0309

Phone: +398735162064

Job: Investor Government Associate

Hobby: Shopping, LARPing, Scrapbooking, Surfing, Slacklining, Dance, Glassblowing

Introduction: My name is Dan Stracke, I am a homely, gleaming, glamorous, inquisitive, homely, gorgeous, light person who loves writing and wants to share my knowledge and understanding with you.