Contact on GitHub

Oli 2

In a few words...

This virus does not have a description.

The following symptoms may happen: aftter 20 generations of the virus, decreased after each reset, (on the same floppy or any other), the message "OLI-VIRUS installed ." appears at boot and then the system starts to slow down more and more as vbl count increases.

Details

  • Replication: on the bootdev device when calls are performed to
  • Flopwr() in any case
  • Floprd() if bootsector is not executable
  • Rwabs(write on first logical sector) if bootsector is not executable
  • Bootcode size: 482 bytes.
  • Resident address: 0x600.
  • Start address: 0x1C.
  • Stealth address: 0x600.
  • Attached vectors: hdv_rw, xbios (trap 14), trap 12 to call old xbios vector, 2nd VBL routine (only for symptoms).
  • Reset resistance: undocumented resident routine.
  • TOS: all.

What's special ?

  • This is an updated version of the original OLI virus which
  • also spoof Rwabs() read calls
  • only spoof Rwabs() and Floprd() calls when this is the virus contrary to the original version which spoofed EVERY Floprd calls.

Fun facts

  • Many antivirus and disk editors are deceived by this version and only "see" an empty and non executable bootsector: UVK 2000, XTermine, Dispact, Diskus, PVK, Mutil, Exorcist Pro... Only tools which are using the WD1772 disk controller (and not BIOS/XBIOS system calls) directly are able to detect the virus (The Killer, KnifeST, Sagrotan, DiskDoctor, Fastcopy III)

See the virus in action!