Analysis by: Christopher Daniel So

ALIASES:

Voodoo (Symantec), Voodoo (Sophos), Virus.DOS.HLLP.Voodoo.a (Kaspersky), Voodo (PKLite) (Avira), HLLP.4745c (McAfee)

 PLATFORM:

DOS

 OVERALL RISK RATING:
 DAMAGE POTENTIAL:
 DISTRIBUTION POTENTIAL:
 REPORTED INFECTION:

  • Threat Type: File infector

  • Destructiveness: No

  • Encrypted: No

  • In the wild: Yes

  OVERVIEW

Infection Channel: Infects files

This file infector infects .COM and .EXE files except COMMAND.COM. It has no destructive payload.

  TECHNICAL DETAILS

File Size: Varies
File Type: EXE
Memory Resident: No
Initial Samples Received Date: 28 Dec 2000

Other Details

This file infector contains the following strings in its code:

  • “Do ya know it's Vesselin Bontchev's birthday 2day?”
  • “He studies how 2 kill virii like this 1. ”
  • “Yar probably happy that there r people like him.. so.. ”
  • “why not write him a birthday message.. ”
  • “the adress is: BONTCHEV@BIHH.INFORMATIK.UNI-HAMBURG.DE... ”
  • “Just remember 2 say we put ya up 2 it... :-) ”
  • “Bontchev's Birthday (c) [VooDoo] ”

NOTES:

Upon execution of an infected file, one .COM or .EXE file is infected in the folder where the malware is executed.

It arrives by executing infected files.

  SOLUTION

Minimum Scan Engine: 5.170
FIRST VSAPI PATTERN FILE: 0.826.00
FIRST VSAPI PATTERN DATE: 31 Dec 2000

Step 1

For Windows XP and Windows Server 2003 users, before doing any scans, please make sure you disable System Restore to allow full scanning of your computer.

Step 2

Scan your computer with your Trend Micro product to delete files detected as HLLP.4745.A. If the detected files have already been cleaned, deleted, or quarantined by your Trend Micro product, no further step is required. You may opt to simply delete the quarantined files. Please check this Knowledge Base page for more information.

NOTES:

For system files infected with this malware:

  1. Extract the original file from your back-up or installer file
  2. Restart your computer.
  3. Boot in a clean floppy disk and then replace the infected file with the clean copy of the system file.


Did this description help? Tell us how we did.