Knowledge

Lamer Exterminator

Source 📝

388: 170: 108:
Variants of the virus are known to use one of three different decrypt routines defined by The Amiga Virus Encyclopedia. A detection program can look for any of the known decrypt routines on the boot block area of the disk, or alternatively try to blindly brute force decrypt them. The first decrypt
117:
in its decrypt routine, and takes a maximum of 65535×65535 attempts, which makes it less practical to solve. The first two versions (and variants that use the same decrypt routines), can also be identified as containing an identification word 0xABCD, as the last data on the boot block containing
136:
Destroys media blocks by overwriting them 84 times with the string 'LAMER!', causing read/write errors on affected storage media. This causes filesystem corruption and data loss, which is unrecoverable.
105:
It is notable as the first virus known to be defensive. It hooks into the system in such a way that examining a bootblock will return a normal result and upon replicating will also encrypt itself.
113:
of every byte which only takes a maximum of 256 attempts to decrypt. The next includes an add byte in its decrypt routine, and takes a maximum of 256×256 attempts. The third uses
183: 238: 215: 429: 208: 317: 67: 453: 243: 201: 422: 327: 322: 130:
Remains RAM resident (allocating 1024 bytes and identifying itself: 'The LAMER Exterminator !!!')
302: 357: 352: 458: 448: 292: 415: 287: 403: 367: 347: 8: 307: 55: 43: 188: 342: 399: 264: 91: 75: 442: 153: 189:
Information about the virus on Amiga Virus Encyclopedia from Virus Help Team
175: 337: 297: 269: 114: 312: 193: 99: 72: 25: 48: 395: 279: 79: 387: 362: 256: 95: 60: 98:. It was first detected in Germany in October 1989. It is a 110: 102:
virus contained in the first 1024 bytes of the disk.
165: 440: 133:Hooks into the system (remaining reset-resident) 423: 209: 16:Amiga boot block computer virus and malware 430: 416: 216: 202: 223: 441: 197: 382: 13: 14: 470: 161: 386: 168: 146: 1: 152:The Amiga Virus Encyclopedia 140: 402:. You can help Knowledge by 7: 121: 10: 475: 381: 184:Detailed virus information 118:anything but zero values. 278: 255: 229: 66: 54: 42: 34: 24: 127:Overwrites the bootblock 398:-related article is a 454:Hacking in the 1980s 224:Hacking in the 1980s 109:routine is a simple 308:Christmas Tree EXEC 21: 333:Lamer Exterminator 88:Lamer Exterminator 26:Original author(s) 20:Lamer Exterminator 19: 411: 410: 376: 375: 250: 249: 85: 84: 466: 432: 425: 418: 390: 383: 318:Father Christmas 232: 231: 218: 211: 204: 195: 194: 178: 173: 172: 171: 156: 150: 94:created for the 44:Operating system 22: 18: 474: 473: 469: 468: 467: 465: 464: 463: 439: 438: 437: 436: 379: 377: 372: 274: 251: 225: 222: 174: 169: 167: 164: 159: 151: 147: 143: 124: 35:Initial release 17: 12: 11: 5: 472: 462: 461: 456: 451: 435: 434: 427: 420: 412: 409: 408: 391: 374: 373: 371: 370: 365: 360: 355: 350: 345: 340: 335: 330: 325: 320: 315: 310: 305: 300: 295: 290: 284: 282: 276: 275: 273: 272: 267: 261: 259: 253: 252: 248: 247: 241: 236: 235:← — 230: 227: 226: 221: 220: 213: 206: 198: 192: 191: 186: 180: 179: 163: 162:External links 160: 158: 157: 144: 142: 139: 138: 137: 134: 131: 128: 123: 120: 92:computer virus 83: 82: 76:computer virus 70: 64: 63: 58: 52: 51: 46: 40: 39: 36: 32: 31: 28: 15: 9: 6: 4: 3: 2: 471: 460: 459:Malware stubs 457: 455: 452: 450: 449:Amiga viruses 447: 446: 444: 433: 428: 426: 421: 419: 414: 413: 407: 405: 401: 397: 392: 389: 385: 384: 380: 369: 366: 364: 361: 359: 356: 354: 351: 349: 346: 344: 341: 339: 336: 334: 331: 329: 326: 324: 321: 319: 316: 314: 311: 309: 306: 304: 301: 299: 296: 294: 291: 289: 286: 285: 283: 281: 277: 271: 268: 266: 263: 262: 260: 258: 254: 246: → 245: 242: 240: 237: 234: 233: 228: 219: 214: 212: 207: 205: 200: 199: 196: 190: 187: 185: 182: 181: 177: 166: 155: 149: 145: 135: 132: 129: 126: 125: 119: 116: 112: 106: 103: 101: 97: 93: 89: 81: 77: 74: 71: 69: 65: 62: 59: 57: 53: 50: 47: 45: 41: 37: 33: 29: 27: 23: 404:expanding it 393: 378: 332: 265:The Analyzer 176:Amiga portal 148: 115:16 bit words 107: 104: 87: 86: 38:October 1989 338:Morris worm 298:Byte Bandit 270:Markus Hess 257:Individuals 443:Categories 313:Elk Cloner 141:References 100:boot block 73:Boot block 368:WANK Worm 343:Ping-Pong 328:Jerusalem 323:Ghostball 239:Timeline 122:Symptoms 56:Platform 49:Amiga OS 396:malware 303:Cascade 280:Malware 80:malware 30:Unknown 363:Virdem 358:Stoned 353:Scores 394:This 293:Brain 244:1990s 96:Amiga 90:is a 61:Amiga 400:stub 288:1260 154:link 68:Type 348:SCA 111:XOR 445:: 78:, 431:e 424:t 417:v 406:. 217:e 210:t 203:v

Index

Original author(s)
Operating system
Amiga OS
Platform
Amiga
Type
Boot block
computer virus
malware
computer virus
Amiga
boot block
XOR
16 bit words
link
Amiga portal
Detailed virus information
Information about the virus on Amiga Virus Encyclopedia from Virus Help Team
v
t
e
Timeline
1990s
Individuals
The Analyzer
Markus Hess
Malware
1260
Brain
Byte Bandit

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.