Class Virus
Platform MSWord

Technical Details

This virus infects Word97 documents and spreads via global electronic
channels: chat-net mIRC and MS Outlook Express. This is the first known
macro virus that uses mIRC and Outlook to spread infection. The virus
contains the comments:

W97M/antiMARC by Lord Natas [Codebreakers 98]
with special thanks to Rhape79
“We’re just the toys in the hands of another”

The virus code contains 15 macros in one module “Antimarc”: antiMARC,
mIRCDropper, OE, Delay, AutoClose, AutoExec, AutoOpen, FileClose, FileExit,
FileSave, FileSaveAs, ToolsMacro, FileTemplates, ViewVBCode, FormatStyle.

The antiMARC macro is the main virus macro. Other ones are either
do-nothing ones (AutoExec), or call this macro to infect Word97 documents.
The mIRCDropper macro sends the infected documents to chat-network, the OE
macro sends the infected message by using Outlook Express.

The virus replicates in Word environment on activating of any auto-macro
except AutoExec, i.e. the virus infects the global macro area and documents
on documents opening, closing, saving, saving with new name, on entering
the Tools/Macro, File/Templates and other menus. To copy its code the virus
uses export/import functions via the SYSTEMMICROSOF.386 file that is
created in the Windows directory.

Depending on the system random counter the virus also executes its Chat and
Outlook spreading routines. While sending its copy to the Chat the virus
uses the MIRC32.EXE utility. It disables mIRC warning messages in the
system mIRC C:MIRCMIRC.INI file, creates the infected file

The virus script file contains the instructions that send the infected
XXXPASSWORDS.DOC file to all users that join the Chat. If there is a
message with “marcsux” substring, the virus sends to the host of this
message the text: “#gotinfected777 X”. The virus also sends the message to
the Chat:

marc FuCk YoU FaScIsT
warblade STILL SUCKING MARC’s COCK?? eh, sure you do!!
super Hey M0therfux0r, shove X/W up yer fat pimple-covered ass!
super ‘We do not support the distribution of virii’ – i guess you do now, bitch!
#gotinfected777 Kick Me! – I’m InFeCtEd!

While sending itself by using MS Outlook Express the virus creates random
named infected file on the C: drive, selects 20th address in Address Book,
creates a new message, fills it with random letters, attaches the infected
file and appends the footer line:

J97Z/nagvZNEP ol Ybeq Angnf [Pbqroernxref 98]

This procedure is not language independent and does work only under German
version of Outlook Express.

Find out the statistics of the threats spreading in your region