I caught the Neuroquila virus

Page 1 of 2 12 LastLast

  1. whs
    Posts : 26,210
    Vista, Windows7, Mint Mate, Zorin, Windows 8
       #1

    I caught the Neuroquila virus


    Norton alerted me of this bugger whilst I was browsing the forum. Norton has quarantined it. But I wonder whether anybody ever saw this bugger and whether it could have further consequences. It seems to originate from my home country Germany - which does not make it more likeable.
    Attached Thumbnails Attached Thumbnails I caught the Neuroquila virus-2010-08-01_102114.png  
      My Computer


  2. Posts : 422
    windows 7 64 bit
       #2

    that's interesting you were browsing the forum when you caught it? hope i dont get it
      My Computer


  3. Posts : 8,476
    Windows® 8 Pro (64-bit)
       #3

    Norton and F-Secure definitions are capable of removing this virus completely. Good to know that you're using Norton.
      My Computer


  4. Posts : 11,840
    64-bit Windows 8.1 Pro
       #4

    This complex virus infects EXE files, hard disk MBRs and diskette boot sectors. On hard disks, the virus encrypts the original MBR and moves it to a different part of the disk, writing its own code in its place. Since the new MBR of an infected hard disk does not contain partition data, the hard disk cannot be seen after a clean diskette boot, and FDISK /MBR will make the machine unbootable.
    source

    Wolfgang.... This looks like a really nasty virus .. I wouldnt take any chances with this one. Do you have a system image that you can restore??
      My Computer


  5. Posts : 268
    windows 7 ultimate 64 bit,Windows 7 ultimate 32 bit,Windows XP sp3 home
       #5

    whs said:
    Norton alerted me of this bugger whilst I was browsing the forum.


    Neuroquila
    NAME: Neuroquila
    ALIAS: Wedding, Havoc, Neurobasher
    TYPE: Stealth EXE-files MBR
    SIZE: 4644-4675
    ORIGIN: Germany
    REPAIR: No


    This complex virus infects EXE files, hard disk MBRs and diskette boot sectors. On hard disks, the virus encrypts the original MBR and moves it to a different part of the disk, writing its own code in its place. Since the new MBR of an infected hard disk does not contain partition data, the hard disk cannot be seen after a clean diskette boot, and FDISK /MBR will make the machine unbootable.

    Neuroquila also encrypts the DOS boot sector on hard drives, making recovery even more difficult. On diskettes, the virus formats an additional track on which its stores its code.

    Neuroquila, which is also known by the names Neuro.Havoc and Wedding, tries to load its code to the upper memory area. If there is no upper memory area available, the virus enlarges the stack memory area (STACKS) and places its code there. Neuroquila uses tunneling techniques to by-pass anti-virus programs

    Neuroquila is a polymorphic virus. It contains a complex polymorphic engine which is capable of creating several different decryption modules. The variation of the decryption routines is based on the system's clock. While in memory, the virus employs versatile stealth virus techniques to hide the changes it has made to the boot sectors and files. When infected files are examined in a clean environment, they can be seen to have grown by 4644-4675 bytes.

    Neuroquila is also a retrovirus. It mounts attacks against several anti-virus programs. If VIRSTOP or DOSDATA.SYS (a QEMM utility program) are loaded from CONFIG.SYS, the virus prevents them from being started. Neuroquila tries to modify the programs TBDRIVER, TBDISK, VSAFE and -D while they are in memory, and alters the partition protection created by the TBUTIL program. In addition to this, the virus is able to by-pass the error message Windows gives of a 32-bit disk operation mode, a stumbling block of many other boot sector viruses.

    After Neuroquila has resided in a computer for some months, it displays the message:

    HAVOC by Neurobasher'93/Germany
    -GRIPPED-BY-FEAR-UNTIL-DEATH-US-DO-PART-

    See: Tremor, Alphastrike, Nightfall

    [Based on analysis by Stefan Kurtzhals]
      My Computer


  6. whs
    Posts : 26,210
    Vista, Windows7, Mint Mate, Zorin, Windows 8
    Thread Starter
       #6

    Tews said:
    This complex virus infects EXE files, hard disk MBRs and diskette boot sectors. On hard disks, the virus encrypts the original MBR and moves it to a different part of the disk, writing its own code in its place. Since the new MBR of an infected hard disk does not contain partition data, the hard disk cannot be seen after a clean diskette boot, and FDISK /MBR will make the machine unbootable.
    source

    Wolfgang.... This looks like a really nasty virus .. I wouldnt take any chances with this one. Do you have a system image that you can restore??
    I have system images. I make one every morning. But since Norton quarantined it and the system seems to work normally, I will still watch it for a while. But this may be a long term threat. I have sent a PM to Corinne to get her opinion on it.
      My Computer


  7. Posts : 11,840
    64-bit Windows 8.1 Pro
       #7

    More than likely, you will be ok... Im just anal about stuff like that, once infected, I always restore to my latest backup image... better safe than sorry..
      My Computer


  8. whs
    Posts : 26,210
    Vista, Windows7, Mint Mate, Zorin, Windows 8
    Thread Starter
       #8

    Tews said:
    More than likely, you will be ok... Im just anal about stuff like that, once infected, I always restore to my latest backup image... better safe than sorry..
    You have a good point. Especially as this bugger seems to linger around dormant for a few weeks befor it starts it's act. I will wait for Corinne's opinion - she is the expert.
      My Computer


  9. Posts : 8,608
    Windows 7 Ultimate 32bit SP1
       #9

    edb.chk is a checkpoint file InformIT: Understanding Active Directory Services > Active Directory Support Files
    This may be a false/positive on Norton's part
      My Computer


  10. whs
    Posts : 26,210
    Vista, Windows7, Mint Mate, Zorin, Windows 8
    Thread Starter
       #10

    Jacee said:
    edb.chk is a checkpoint file InformIT: Understanding Active Directory Services > Active Directory Support Files
    This may be a false/positive on Norton's part
    Yeah I saw that too. But I am just a little leary about the thing. Are you sure it is harmless?
      My Computer


 
Page 1 of 2 12 LastLast

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 07:15.
Find Us