Class
Constructor
Platform
DOS

Parent class: Malware

Malicious tools are malicious programs designed to automatically create viruses, worms, or Trojans, conduct DoS attacks on remote servers, hack other computers, etc. Unlike viruses, worms, and Trojans, malware in this subclass does not present a direct threat to the computer it runs on, and the program’s malicious payload is only delivered on the direct order of the user.

Read more

Class: Constructor

Constructor programs are designed to create new viruses, worms, and Trojans. There are known Constructors for DOS, Windows, and macro platforms. These programs generate malicious program source code, object modules, and/or malicious files. Some Constructors have a standard Windows-type interface in which a menu is used to select the type of malicious program, self-encryption options, anti-debugging features, etc.

Read more

Platform: DOS

No platform description

Description

Technical Details

The virus constructor utility VCL.EXE (Virus Creation Laboratory) seems to be the most well-known virus creation tool. This constructor can generate source assembler files of the viruses, OBJ modules and infected master files. VCL contains the standard pop-up menu interface. By using VCL menus, it is possible to choose the virus type, enable or disable self encryption, anti-debugging code, and internal text strings. It also is possible to choose up to 10 effects, which are summoned upon virus execution, etc. VCL-based viruses can use a standard means for infection (they append their code to the files while infecting them), they can overwrite the files or use companion technology.

The main properties of VCL-viruses are:

  • they are non-memory resident;
  • they scan the subdirectory three or the current directory of the current drive while infecting files;
  • they append to COM files, or create new COM files or overwrite COM and EXE files.

Read more

Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com

Found an inaccuracy in the description of this vulnerability? Let us know!
Kaspersky Next
Let’s go Next: redefine your business’s cybersecurity
Learn more
New Kaspersky!
Your digital life deserves complete protection!
Learn more
Confirm changes?
Your message has been sent successfully.