Emperor is memory-resident polymorphic multipartite virus. It infects DOS COM and EXE files by writing its code to the end of the file, and overwrites the MBR of the hard drive and boot sector on floppy disks with its own loading routine that installs the virus into the system memory on rebooting. The virus has many anti-debugging tricks, uses stealth functions and quite complex routines to get addresses of DOS kernel to bypass anti-virus protection.
Based on the settings of your F-Secure security product, it will either move the file to the quarantine where it cannot spread or cause harm, or remove it.
A False Positive is when a file is incorrectly detected as harmful, usually because its code or behavior resembles known harmful programs. A False Positive will usually be fixed in a subsequent database update without any action needed on your part. If you wish, you may also:
Check for the latest database updates
First check if your F-Secure security program is using the latest updates, then try scanning the file again.
Submit a sample
After checking, if you still believe the file is incorrectly detected, you can submit a sample of it for re-analysis.
Note: If the file was moved to quarantine, you need to collect the file from quarantine before you can submit it.
Exclude a file from further scanning
If you are certain that the file is safe and want to continue using it, you can exclude it from further scanning by the F-Secure security product.
Note: You need administrative rights to change the settings.
The virus has bugs and in some cases it corrupts the files while infecting them, and they halt the system when executed.
While infecting the MBR the virus uses several tricks to bypass anti-virus protection: writes data by direct calls to HDD controller ports, or stuffs 'Y' to keyboard buffer, in case Megatrends or AWARD BIOS is installed the virus disables VirusWarning BIOS protection by clearing necessary field in the CMOS.
The virus stores the original MBR and boot sectors to the reserved sectors on the drive, but encrypts and corrupts this code so, that these data will work correctly only in case the virus TSR copy is active (i.e. only in case the disk is infected, the virus already installed its code into the memory and released control to the original bootstrap routine). The virus also patches the MBR DiskPartitionTable - it loops its tables. As a result it is not possible to load the system from clean MS DOS floppy disk, and it is necessary to use other DOS versions, or special tools to access the hard drive.
While infecting the MBR or floppy disk boot sector the virus checks it for some specific code, and erases the CMOS memory if this code is found, the message "Error in CMOS" is displayed then and computer halts.
The virus also has more dangerous destruction routine. It erases the data on the hard drive and corrupts the Flash BIOS in the same way the "Win95.CIH" (aka "Chernobyl") virus does. The virus at the same time displays the message:
EMPEROR I will grind my hatred upon the loved ones. Despair will be brought upon the hoping childs of happiness. Wherever there is joy the hordes of the eclipse will pollute sadness and hate under the reign of fear. In the name of the almighty Emperor....
This routine is executed if the virus founds an active debugger in the system memory, or the system is rebooted in period from 5am till 10am. This routine also may take control because of a bug in the virus code.
The virus also contains the text strings:
the EMPEROR virus written by Lucrezia Borgia In Colombia, 1999