GUIDE TO MALWARE INCIDENT PREVENTION AND HANDLING
program, it propagates to infect other programs on the system, as well as other systems that use a
shared infected program. Jerusalem and Cascade are two of the best known file infector viruses.
3
Boot Sector. A boot sector virus infects the master boot record (MBR) of a hard drive or the
boot sector of a hard drive or removable media, such as floppy diskettes. The boot sector is an
area at the beginning of a drive or disk where information about the drive or disk structure is
stored. Boot sectors contain boot programs that are run at host startup to boot the OS. The MBR
of a hard drive is a unique location on the disk where a computer’s basic input/output system
(BIOS) can locate and load the boot program. Removable media, such as floppy disks, need not
be bootable to infect the system; if an infected disk is in the drive when the computer boots, the
virus could be executed. Boot sector viruses are easily concealed, have a high rate of success,
and can harm a computer to the point of making it completely inoperable. Symptoms of boot
sector virus infection on a computer include an error message during booting or the inability to
boot. Form, Michelangelo, and Stoned are examples of boot sector viruses.
Multipartite. A multipartite virus uses multiple infection methods, typically infecting both files
and boot sectors. Accordingly, multipartite viruses combine the characteristics of file infector
and boot sector viruses. Examples of multipartite viruses include Flip and Invader.
In addition to infecting files, compiled viruses can reside in the memory of infected systems so that each
time a new program is executed, the virus infects the program. Among compiled viruses, boot sector
viruses are the most likely to be memory resident. Viruses that are memory resident stay in memory for
an extended period of time and therefore are likely to infect more files and to interfere more frequently
with normal system operations than non-memory-resident viruses.
2.1.2
Interpreted Viruses
Unlike compiled viruses, which can be executed by an OS, interpreted viruses are composed of source
code that can be executed only by a particular application or service. Interpreted viruses have become
very common because they are much easier to write and modify than other types of viruses. A relatively
unskilled attacker can acquire an interpreted virus, review and modify its source code, and distribute it to
others. There are often dozens of variants of a single interpreted virus, most with only trivial changes
from the original. The two major types of interpreted viruses are macro viruses and scripting viruses.
Macro viruses are the most prevalent and successful type of virus. These viruses attach themselves to
application documents, such as word processing files and spreadsheets, and use the application’s macro
programming language to execute and propagate. Macro viruses use the macro programming capabilities
that many popular software packages, such as Microsoft Office, use to automate complex or repetitive
tasks. These viruses tend to spread quickly because users frequently share documents from applications
with macro capabilities. In addition, when a macro virus infection occurs, the virus infects the template
that the program uses to create and open files. Once a template is infected, every document that is created
or opened with that template is also infected. The Concept, Marker, and Melissa viruses are well-known
examples of macro viruses.
Scripting viruses are very similar to macro viruses. The primary difference is that a macro virus is written
in a language understood by a particular application, such as a word processor, whereas a scripting virus
is written in a language understood by a service run by the OS. For example, the Windows Scripting Host
3
For more information on these examples, as well as the other examples cited throughout this section, visit the virus
information Web sites listed in the Technical Resource Sites section of Appendix F. The compiled virus examples listed in
this section are mostly from the early 1990’s, when they were the most common form of malware.
2-2