Whale

aka Z the Whale / Motherfish

Whale virus ASCII art rendering
discovered
1990
origin
unknown
reported by
various
author
R. Burger
family
Whale
size
9216 bytes
platform
DOS
vector
COM and EXE files
payload
visual, artistic
trigger
random, display on execution

Payload

Displays a large, detailed ASCII art whale on screen. At over 9000 bytes, it was one of the largest viruses of its era. The virus included encrypted sections to evade detection.

The Whale That Swallowed the Archive

In 1990, R. Burger released a virus that seemed to misunderstand what a virus was supposed to be. At 9,216 bytes, Whale was enormous for its time. Viruses were supposed to be lean, efficient, hard to detect. Whale was a whale. It was a statement. A signature written in dead weight.

The payload was a massive ASCII art whale, rendered in beautiful, intricate detail. Not the crude box-drawing characters of early malware. Real art. Line weights and curves and the illusion of depth rendered character by character. Someone had taken time to draw this. Someone had sat down and hand-crafted a whale.

Whale was viral art. And it was exactly as practical as that sounds.

Technical Baroque

What made Whale fascinating was the tension between form and function. Yes, it had a visual payload. Yes, it was beautiful. But Burger had also implemented encryption to protect the malicious payload from antivirus analysis. The virus wasn't just display. It had teeth underneath the spectacle.

Whale infected COM and EXE files. It embedded itself and waited. And when the time came, at random intervals, the whale would appear on screen, accompanied by what Burger included as a message. The user would see the whale and know something was wrong. The system would slow. The payload would execute. And then the whale would disappear, leaving a trail of corrupted code in its wake.

The encryption was particularly clever. In an era when most viruses left their code in plain sight, Whale wrapped itself in layers of obfuscation. Antivirus scanners couldn't just search for known signatures. They had to decrypt the virus to understand it. Burger had created a technical puzzle box inside a visual joke.

The Burden of Beauty

Whale's massive size was both its statement and its limitation. In the era of 3.5-inch floppies and slow transfer rates, every byte counted. A virus needed to be lean, efficient, almost transparent in its resource consumption. Whale was the opposite. It was aggressive about its presence. It demanded space. It claimed room.

This was partly pragmatic. The encryption added overhead. The ASCII art representation was large. But it was also philosophical. Whale said something about the virus writing culture of 1990. It said that you could make something beautiful and destructive at the same time. That a virus could be art. That infection could be aesthetic.

R. Burger understood something about the psychology of malware. Most viruses wanted to hide. Whale wanted to be seen. And in being seen, in being displayed as a beautiful thing, it created a kind of cognitive dissonance. You're looking at this gorgeous ASCII whale. You're appreciating the line work, the composition, the detail. And in the background, your system is being compromised.

The Encryption Game

The technical innovation of Whale wasn't the encryption itself. Encryption in malware wasn't new by 1990. But Whale's approach was interesting. The virus would encrypt itself differently with each infection. Each copy would look different at the byte level. Antivirus scanners would need to decrypt the virus to recognize it, and the encryption meant that simple signature scanning wouldn't work.

This launched an arms race. Antivirus companies had to build emulators and decryptors. They had to execute malware in controlled environments and watch what it did. Whale forced the security industry to evolve its detection mechanisms. It forced them to think in terms of behavior, not just signatures.

The Art Problem

Whale remains one of the most aesthetically interesting viruses ever written, which creates a strange curatorial problem. How do you display it? How do you show the whale without infecting the system? The Internet Archive's Malware Museum solved this by extracting the ASCII art and displaying it separately, letting you see the beautiful whale without triggering the malicious payload.

That extraction, that separation of art from malware, says something important about how we've learned to view early viruses. We can appreciate the craft. We can recognize the skill and the vision. We can admire Whale as a technical achievement and an aesthetic statement, even though what it was fundamentally designed to do was compromise your system.

Burger made a whale that swallowed everything it touched. And he made it beautiful while it worked.

Related specimens

Sources

last updated: 2026-04-14 :: curated by the_curator