Virdem overwrites the host with its own code and saves the original program at the very end. It was a direct-action virus and did not spread fast. It infected only files that had a COM extension.5 When an infected file is run, the next uninfected program becomes infected.
When infected, small COM files, less than 11k, grow by 2559 bytes and larger files grow by 1336 bytes. Infected programs ask to guess the user a number between 0 and n such that the number matches the generation number of the virus plus one. A correct guess allows that program to run. Otherwise, it exits.
It doesn't intercept interrupt 24h so a write-protected disk gives an "Abort, Retry, Ignore" message. Read-only files are set to read/write, infected and then not set back to read-only. The virus had two NOP instructions at the beginning of the file.6
Bhargav, Abhay (2010-09-14). Secure Java: For Web Application Development. CRC Press. ISBN 978-1-4398-2356-9. 978-1-4398-2356-9 ↩
Skoudis, Ed; Zeltser, Lenny (2004). Malware: Fighting Malicious Code. Prentice Hall Professional. ISBN 978-0-13-101405-3. 978-0-13-101405-3 ↩
Salomon, David (2010-08-05). Elements of Computer Security. Springer Science & Business Media. ISBN 978-0-85729-006-9. 978-0-85729-006-9 ↩
Danesh, Arman; Lau, Felix; Mehrassa, Ali (2002). Safe and Secure: Secure Your Home Network, and Protect Your Privacy Online. Sams Publishing. ISBN 978-0-672-32243-3. 978-0-672-32243-3 ↩
Szor, Peter (2005-02-03). The Art of Computer Virus Research and Defense. Pearson Education. ISBN 978-0-672-33390-3. 978-0-672-33390-3 ↩
Solomon, Alan (2012-12-06). PC Viruses: Detection, Analysis and Cure. Springer Science & Business Media. ISBN 978-1-4471-1031-6. 978-1-4471-1031-6 ↩