388:
170:
108:
Variants of the virus are known to use one of three different decrypt routines defined by The Amiga Virus
Encyclopedia. A detection program can look for any of the known decrypt routines on the boot block area of the disk, or alternatively try to blindly brute force decrypt them. The first decrypt
117:
in its decrypt routine, and takes a maximum of 65535×65535 attempts, which makes it less practical to solve. The first two versions (and variants that use the same decrypt routines), can also be identified as containing an identification word 0xABCD, as the last data on the boot block containing
136:
Destroys media blocks by overwriting them 84 times with the string 'LAMER!', causing read/write errors on affected storage media. This causes filesystem corruption and data loss, which is unrecoverable.
105:
It is notable as the first virus known to be defensive. It hooks into the system in such a way that examining a bootblock will return a normal result and upon replicating will also encrypt itself.
113:
of every byte which only takes a maximum of 256 attempts to decrypt. The next includes an add byte in its decrypt routine, and takes a maximum of 256×256 attempts. The third uses
183:
238:
215:
429:
208:
317:
67:
453:
243:
201:
422:
327:
322:
130:
Remains RAM resident (allocating 1024 bytes and identifying itself: 'The LAMER Exterminator !!!')
302:
357:
352:
458:
448:
292:
415:
287:
403:
367:
347:
8:
307:
55:
43:
188:
342:
399:
264:
91:
75:
442:
153:
189:
Information about the virus on Amiga Virus
Encyclopedia from Virus Help Team
175:
337:
297:
269:
114:
312:
193:
99:
72:
25:
48:
395:
279:
79:
387:
362:
256:
95:
60:
98:. It was first detected in Germany in October 1989. It is a
110:
102:
virus contained in the first 1024 bytes of the disk.
165:
440:
133:Hooks into the system (remaining reset-resident)
423:
209:
16:Amiga boot block computer virus and malware
430:
416:
216:
202:
223:
441:
197:
382:
13:
14:
470:
161:
386:
168:
146:
1:
152:The Amiga Virus Encyclopedia
140:
402:. You can help Knowledge by
7:
121:
10:
475:
381:
184:Detailed virus information
118:anything but zero values.
278:
255:
229:
66:
54:
42:
34:
24:
127:Overwrites the bootblock
398:-related article is a
454:Hacking in the 1980s
224:Hacking in the 1980s
109:routine is a simple
308:Christmas Tree EXEC
21:
333:Lamer Exterminator
88:Lamer Exterminator
26:Original author(s)
20:Lamer Exterminator
19:
411:
410:
376:
375:
250:
249:
85:
84:
466:
432:
425:
418:
390:
383:
318:Father Christmas
232:
231:
218:
211:
204:
195:
194:
178:
173:
172:
171:
156:
150:
94:created for the
44:Operating system
22:
18:
474:
473:
469:
468:
467:
465:
464:
463:
439:
438:
437:
436:
379:
377:
372:
274:
251:
225:
222:
174:
169:
167:
164:
159:
151:
147:
143:
124:
35:Initial release
17:
12:
11:
5:
472:
462:
461:
456:
451:
435:
434:
427:
420:
412:
409:
408:
391:
374:
373:
371:
370:
365:
360:
355:
350:
345:
340:
335:
330:
325:
320:
315:
310:
305:
300:
295:
290:
284:
282:
276:
275:
273:
272:
267:
261:
259:
253:
252:
248:
247:
241:
236:
235:← —
230:
227:
226:
221:
220:
213:
206:
198:
192:
191:
186:
180:
179:
163:
162:External links
160:
158:
157:
144:
142:
139:
138:
137:
134:
131:
128:
123:
120:
92:computer virus
83:
82:
76:computer virus
70:
64:
63:
58:
52:
51:
46:
40:
39:
36:
32:
31:
28:
15:
9:
6:
4:
3:
2:
471:
460:
459:Malware stubs
457:
455:
452:
450:
449:Amiga viruses
447:
446:
444:
433:
428:
426:
421:
419:
414:
413:
407:
405:
401:
397:
392:
389:
385:
384:
380:
369:
366:
364:
361:
359:
356:
354:
351:
349:
346:
344:
341:
339:
336:
334:
331:
329:
326:
324:
321:
319:
316:
314:
311:
309:
306:
304:
301:
299:
296:
294:
291:
289:
286:
285:
283:
281:
277:
271:
268:
266:
263:
262:
260:
258:
254:
246: →
245:
242:
240:
237:
234:
233:
228:
219:
214:
212:
207:
205:
200:
199:
196:
190:
187:
185:
182:
181:
177:
166:
155:
149:
145:
135:
132:
129:
126:
125:
119:
116:
112:
106:
103:
101:
97:
93:
89:
81:
77:
74:
71:
69:
65:
62:
59:
57:
53:
50:
47:
45:
41:
37:
33:
29:
27:
23:
404:expanding it
393:
378:
332:
265:The Analyzer
176:Amiga portal
148:
115:16 bit words
107:
104:
87:
86:
38:October 1989
338:Morris worm
298:Byte Bandit
270:Markus Hess
257:Individuals
443:Categories
313:Elk Cloner
141:References
100:boot block
73:Boot block
368:WANK Worm
343:Ping-Pong
328:Jerusalem
323:Ghostball
239:Timeline
122:Symptoms
56:Platform
49:Amiga OS
396:malware
303:Cascade
280:Malware
80:malware
30:Unknown
363:Virdem
358:Stoned
353:Scores
394:This
293:Brain
244:1990s
96:Amiga
90:is a
61:Amiga
400:stub
288:1260
154:link
68:Type
348:SCA
111:XOR
445::
78:,
431:e
424:t
417:v
406:.
217:e
210:t
203:v
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.