dslreports logo
Revision History of Question #14139 from FAQ trojans

Differences                   (Rev #3    vs    2):
<p>To avoid being detected by emulation? some | To avoid being detected by emulation? some vi <strong>viruses</strong> rewrite themselves | ruses rewrite themselves completely each time completely each time they are to infect new e | they are to infect new executables. Viruses xecutables. <strong>Viruses</strong> that use | that use this technique are said to be metamo this technique are said to be metamorphic. T | rphic. To enable metamorphism? a metamorphic o enable <em>metamorphism</em>? a <em>metamor | engine is needed. A metamorphic virus is usua phic engine</em> is needed. A <em>metamorphic | lly very large and complex. For example? W32/ virus</em> is usually very large and complex | Simile consisted of over 14000 lines of assem . For example? <strong>W32/Simile</strong> co | bly code? 90% of it part of the metamorphic e nsisted of over 14000 lines of assembly code? | ngine. 90% of it part of the <em>metamorphic engine < </em>.</p> <
End.