mirror of
https://github.com/opsxcq/mirror-textfiles.com.git
synced 2025-08-06 16:26:33 +02:00
update
This commit is contained in:
115
textfiles.com/virus/NCSA/ncsa009.txt
Normal file
115
textfiles.com/virus/NCSA/ncsa009.txt
Normal file
@@ -0,0 +1,115 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> 1704 Format <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Synonyms: Blackjack, 1704, Falling Letters.
|
||||
|
||||
Date of Origin: September, 1988.
|
||||
|
||||
Place of Origin: Germany.
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
Host Files: Remains resident. Infects COM files.
|
||||
|
||||
Increase in Size of Infected Files: 1704 bytes.
|
||||
|
||||
Nature of Damage: Affects system run-time
|
||||
operation. Corrupts program or overlay files. Formats or erases
|
||||
all/part of the hard disk upon activation.
|
||||
|
||||
Detected by: Scanv56+, F-Prot, IBM Scan, Pro
|
||||
-Scan.
|
||||
|
||||
Removed by: CleanUp, M-1704, Scan/D, F-Prot.
|
||||
|
||||
Derived from: 1701 (Cascade) virus.
|
||||
|
||||
Scan Code: Uses self-encryption. FA 8B EC E8
|
||||
00 00 5B 81 EB 31 01 2E F6 87 2A 01 01 74 0F 8D B7 4D 01 BC
|
||||
85 06 31 34 31 24 46 4C 75 F8.
|
||||
|
||||
The code for the 1704 virus is identical to the 1701 except for a
|
||||
single instruction. The only differences are the removal of a
|
||||
conditional jump from the 1701 (which would never have been taken), and
|
||||
some necessary segment overrides on the BIOS tests missing in the
|
||||
previous version. The virus was designed to not infect micros
|
||||
manufactured by IBM, but errors in coding enable it to infect any PC,
|
||||
regardless of origin. The virus tests the BIOS for the string "COPR.
|
||||
IBM", and contains code to not infect if it finds this - however there
|
||||
are errors in the code which prevent it from working.
|
||||
|
||||
As with the 1701, the 1704 can recognize if it has previously
|
||||
infected a file. However, because recognition depends on the length of
|
||||
the virus, it will infect programs already infected by variants with
|
||||
different lengths. (1701 will infect COM files infected with 1704, and
|
||||
vice versa.)
|
||||
|
||||
The encryption of this virus is different in each instance of the
|
||||
virus, being dependent on the size of the host file.
|
||||
|
||||
The hard disk is formatted when the virus activates.
|
||||
|
||||
This virus has been termed "Blackjack", which is a pun on the German
|
||||
name "17+4" of a popular card game.
|
||||
|
||||
Blackjack infects only COM-files which are at least 3 bytes long, and
|
||||
it does so only once for any given file. It overwrites the first three
|
||||
bytes with a JMP to the beginning of the viral code, which is appended to
|
||||
the file. The 2 byte address of this JMP instruction is probably the
|
||||
reason why only COM files are susceptible to infection. Blackjack
|
||||
retains the file's time stamp. It even infects read-only files; on
|
||||
write-protected floppy disks, it attempts writing 5 times per file, thus
|
||||
revealing its activity.
|
||||
|
||||
In the infected file, the viral code is cryptographically encoded,
|
||||
using a simple Vigenere code depending on the length of the file; only
|
||||
the instructions for decoding the encrypted part of the code are in plain
|
||||
machine-language. This is obviously intended as a impediment against
|
||||
disassembling. Hence, every copy of the virus looks different
|
||||
(depending on the length of the file).
|
||||
|
||||
On invocation of an infected program, Blackjack installs itself in
|
||||
RAM (if no copy is already installed), then replaces the JMP instruction
|
||||
with its former contents and resumes normal program operation.
|
||||
|
||||
The storage map shows that Blackjack has tinkered with the free
|
||||
storage pointer-chain to hide the fact that it has hooked interrupt 21.
|
||||
Hence, only a minor part of Blackjack is visible in the storage map.
|
||||
|
||||
In every year, from October to December, Blackjack will interfere
|
||||
with CGA or EGA operated screens, moving randomly chosen characters
|
||||
down, like falling leaves in autumn. After a while, you'll have a big
|
||||
heap of characters at the bottom of your screen, and as you cannot see
|
||||
anymore what the computer is trying to display, you'll probably have to
|
||||
restart the system. This behaviour has been predicted by two people, who
|
||||
have disassembled Blackjack, and has later been observed on many
|
||||
EGA-equipped ATs.<Note: Contributions to this section by Otto Stolz.>
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
50
textfiles.com/virus/NCSA/ncsa010.txt
Normal file
50
textfiles.com/virus/NCSA/ncsa010.txt
Normal file
@@ -0,0 +1,50 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> 1720 Virus <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Synonyms: PSQR Virus
|
||||
|
||||
Date of Origin: March, 1990.
|
||||
|
||||
Place of Origin: Barcelona, Spain.
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
Host Files: COM, EXE, and overlay files.
|
||||
Becomes memory resident.
|
||||
|
||||
Increase in Size of Infected Files: n/a.
|
||||
|
||||
Detected by: Scanv61+
|
||||
|
||||
Removed by: Scan/D, or delete the infected files.
|
||||
|
||||
Derived from: Jerusalem.
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
52
textfiles.com/virus/NCSA/ncsa011.txt
Normal file
52
textfiles.com/virus/NCSA/ncsa011.txt
Normal file
@@ -0,0 +1,52 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> 2930 <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Synonyms: Traceback II
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
Host Files: Remains resident. Infects COM, EXE
|
||||
files.
|
||||
|
||||
Increase in Size of Infected Files: 2930 bytes.
|
||||
|
||||
Nature of Damage: Corrupts program or overlay files.
|
||||
|
||||
Detected by: Scanv41+, F-Prot, IBM Scan, Pro-Scan.
|
||||
|
||||
Removed by: CleanUp, Scan/D, F-Prot, or delete infected files.
|
||||
|
||||
Derived from: may be original. See 3066/Traceback.
|
||||
|
||||
Traceback II may be the predecessor of the Traceback (3066) virus,
|
||||
though the latter was discovered first. They are similar in function,
|
||||
but produce differences in the size of infected files.
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
84
textfiles.com/virus/NCSA/ncsa012.txt
Normal file
84
textfiles.com/virus/NCSA/ncsa012.txt
Normal file
@@ -0,0 +1,84 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> 3066 <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Synonyms: Traceback.
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
Host Files: Remains resident. Infects COM, EXE files.
|
||||
|
||||
OnScreen Symptoms: Cascading display one hour after activation, lasting
|
||||
one minute, followed by restoration of screen to condition prior to
|
||||
cascade.
|
||||
|
||||
Increase in Size of Infected Files: 3066 bytes.
|
||||
|
||||
Nature of Damage: Corrupts COM and EXE files.
|
||||
|
||||
Detected by: Scanv56+, F-Prot, IBM Scan, Pro-Scan.
|
||||
|
||||
Removed by: M-3066, VirClean, F-Prot, or delete any infected files.
|
||||
|
||||
Derived from: Traceback II/2930.
|
||||
|
||||
Scan Code: E8 71 06 E8 28 06 B4 19 CD 21 89 B4 51 01 81 84 51 01 84 08 8C
|
||||
8C 53 01. You can also search at 108H for 89 B4 51 01 81 84 51 01 84 08.
|
||||
|
||||
After an infected program is run, Traceback becomes memory resident,
|
||||
infecting every COM or EXE that is run. Additionally, if the system date
|
||||
is after December 5, 1988, it will attempt to infect one additional COM
|
||||
or EXE file in the current directory. If no uninfected file are available
|
||||
in the current directory, it searches the entire disk, starting at the
|
||||
root directory, looking for a victim. This search terminates if it
|
||||
encounters an infected file before finding a candidate non-infected
|
||||
file.
|
||||
|
||||
This virus derives its name from two characteristics:
|
||||
|
||||
* Infected files contain the directory path of the file causing the
|
||||
infection within the viral code. Consequently, it is possible to
|
||||
"trace back" the infection through a number of files.
|
||||
|
||||
* When Traceback succeeds in infecting a program, it attempts to
|
||||
update a counter in the program from which Traceback was
|
||||
activated in that session. Because Traceback takes over disk error
|
||||
handling while trying to update the original infected program, the
|
||||
user will be unaware that an error occurred if Traceback can't
|
||||
update its counter.
|
||||
|
||||
The primary symptom of the Traceback virus having infected the
|
||||
system is that it will produce a screen display with a cascading effect
|
||||
similar to the Cascade/1701/1704 virus. The cascading display occurs one
|
||||
hour after system memory is infected, and lasts one minute, after which
|
||||
the display is restored. Any keystroke during this interval will hang up
|
||||
the system. The cascade/restore sequence is repeated at one hour
|
||||
intervals. See also 2930.
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
63
textfiles.com/virus/NCSA/ncsa013.txt
Normal file
63
textfiles.com/virus/NCSA/ncsa013.txt
Normal file
@@ -0,0 +1,63 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> 3551 Virus <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Synonyms: Syslock, 3555
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
Host Files: Encrypting, non-resident. Infects COM, EXE files.
|
||||
|
||||
Increase in Size of Infected Files: 3551-3555 bytes.
|
||||
|
||||
Nature of Damage: Corrupts COM and EXE files. May corrupt data files.
|
||||
|
||||
Detected by: Scanv56+, F-Prot, Pro-Scan.
|
||||
|
||||
Removed by: CleanUp, Scan/D, or F-Prot.
|
||||
|
||||
Scan Code: Uses self-encryption.
|
||||
|
||||
When an infected program is run, SysLock searchs through the COM and
|
||||
EXE files and subdirectories on the current disk, picking one executable
|
||||
file at random to infect. The infected file will have its length
|
||||
increased by about 3,551 bytes.
|
||||
|
||||
The SysLock virus will damage files by searching for the word
|
||||
"Microsoft" in any combination of upper and lower case characters, and
|
||||
when found replace the word with either "MACROSOFT". If it finds an
|
||||
environment variable of "SYSLOCK" has been set to "@" (hex 40), the virus
|
||||
will not infect any programs or perform string replacements, but will
|
||||
instead pass control to its host immediately. The author may have used
|
||||
this during the creation of the virus.
|
||||
|
||||
One known variant is called Macho-A. It is identical to the SysLock
|
||||
virus, except that "Microsoft" is replaced with "MACHOSOFT".
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
44
textfiles.com/virus/NCSA/ncsa014.txt
Normal file
44
textfiles.com/virus/NCSA/ncsa014.txt
Normal file
@@ -0,0 +1,44 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> 3555 <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
Host Files: COMMAND.COM, COM files.
|
||||
|
||||
Increase in Size of Infected Files: 3555 bytes.
|
||||
|
||||
Scan Code: encrypted.
|
||||
|
||||
It does not appear to be memory resident, and infects COM files at
|
||||
the time that an infected program is loaded. It does not appear to be
|
||||
memory resident. It sometimes causes the message -"Error Writing to
|
||||
Device AUX1" to occur at the time an infected program is executed.
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
82
textfiles.com/virus/NCSA/ncsa015.txt
Normal file
82
textfiles.com/virus/NCSA/ncsa015.txt
Normal file
@@ -0,0 +1,82 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> 4096 virus <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Synonyms: Century Virus, IDF Virus, Stealth Virus, 100 Years Virus
|
||||
|
||||
Date of Origin: January, 1990.
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
Increase in Size of Infected Files: 4096 bytes.
|
||||
|
||||
Nature of Damage: Remains resident. Infects COMMAND.COM, COM, EXE,
|
||||
overlay files.
|
||||
|
||||
Detected by: Scanv53+, F-Prot, IBM Scan, Pro-Scan.
|
||||
|
||||
Removed by: CleanUp, Scan/D, F-Prot. See below.
|
||||
|
||||
This virus is one of the most brutal ever developed, and no one seems
|
||||
to successfully recover from it. It infects COM, EXE, and overlay files,
|
||||
adding 4,096 bytes to their length. Once the virus is resident in memory,
|
||||
the increase in length will not appear in a directory listing, and it
|
||||
will infect any executable file that is opened, including those opened
|
||||
with the COPY or XCOPY command.
|
||||
|
||||
Through FAT manipulation, the virus destroys files through a slow
|
||||
crosslinking process that would seem to be a hardware problem.
|
||||
|
||||
If the virus is present in memory and you attempt to copy infected
|
||||
files, the new copy of the file will not be infected if the extension is
|
||||
neither COM nor EXE. Thus, one way to disinfect a system is as follows:
|
||||
|
||||
* copy all the infected files to diskettes with a non-executable file
|
||||
extension. For instance, you might COPY *.EXE *.E and COPY
|
||||
*.COM *.C.
|
||||
|
||||
* Shut the system off. Reboot from an uninfected and write-protected
|
||||
disk.
|
||||
|
||||
* Delete any infected files and restore the backed up files to the
|
||||
original executable file names and extensions. (COPY *.C *.COM; COPY
|
||||
*.E *.EXE)
|
||||
|
||||
This procedure will not save any cross-linked files, however.
|
||||
|
||||
Some notes:
|
||||
|
||||
* Systems infected with this virus may hang after September 22 of any
|
||||
year, due to a bug. This is the birthday of Bilbo and Frodo Baggin, in
|
||||
the Lord of the Rings.
|
||||
|
||||
* The virus contains an unused boot sector, which if copied to the boot
|
||||
sector of a diskette, will produce the message "FRODO LIVES".
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
67
textfiles.com/virus/NCSA/ncsa016.txt
Normal file
67
textfiles.com/virus/NCSA/ncsa016.txt
Normal file
@@ -0,0 +1,67 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> AIDS <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Synonyms: VGA2CGA, Taunt, Hahaha.
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
Host Files: COM files.
|
||||
|
||||
OnScreen Symptoms: When activated, displays "Your computer now has
|
||||
AIDS". The word "AIDS" covers about half the screen. Following display
|
||||
of this message, the system halts and must be rebooted..
|
||||
|
||||
Increase in Size of Infected Files: n/a.
|
||||
|
||||
Nature of Damage: Overwrites first 13K of infected programs. Not memory-
|
||||
resident.
|
||||
|
||||
Detected by: Scanv40+, Pro-Scan.
|
||||
|
||||
Removed by: CleanUp, or Scan/D, or delete infected .COM files.
|
||||
|
||||
The AIDS virus was first reported attached to a program called
|
||||
VGA2CGA. It is known as "Hahaha" in Europe, and IBM refers to it as the
|
||||
"Taunt" virus. When it activates, it displays the message "Your computer
|
||||
now has AIDS". After the message display, the system is halted. You will
|
||||
need to turn it off and reboot to restart it.
|
||||
|
||||
The only protection against the AIDs virus is full backups of your
|
||||
.COM files. Written in Turbo C, it copies itself over the first 13K bytes
|
||||
of a .COM file. The original function of the .COM program is lost, and
|
||||
any other .COM files locatable by the program are also overwritten in
|
||||
this manner. It evidently has a minimum size which it will not infect,
|
||||
but it also totally loses all the data at the beginning of the programs.
|
||||
Recovery of a damage program is not possible.
|
||||
|
||||
This virus should not be confused with the AIDS Information Disk
|
||||
Trojan. See also the Lisbon virus.
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
65
textfiles.com/virus/NCSA/ncsa017.txt
Normal file
65
textfiles.com/virus/NCSA/ncsa017.txt
Normal file
@@ -0,0 +1,65 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> AIDS II Virus <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Synonyms: Companion Virus
|
||||
|
||||
Date of Origin: April, 1990.
|
||||
|
||||
Place of Origin: The Netherlands?
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
Host Files: non-resident. Infects COM and EXE files.
|
||||
|
||||
OnScreen Symptoms: See messages below. Also a melody is played.
|
||||
|
||||
Increase in Size of Infected Files: 8,064 bytes.
|
||||
|
||||
Nature of Damage: none.
|
||||
|
||||
Detected by: on-screen message.
|
||||
|
||||
Removed by: delete COM files created by the virus. They will bear the
|
||||
date and time of infection.
|
||||
|
||||
This virus does not infect files, but rather creates a 8,064 byte COM
|
||||
file of the same name as an existing EXE file. When a user enters the
|
||||
first name of the EXE file, the COM file runs, a melody is played, and
|
||||
the COM file displays the message: "Your computer is infected with...
|
||||
(heart character) Aids Virus II. - Signed WOP & PGT of DutchCrack - ".
|
||||
The COM file then "spawns" the EXE file's process -- permits the normal,
|
||||
uninfected EXE to run, after which control is returned to the COM file.
|
||||
At this time, the melody is played again, and the message displayed is
|
||||
"Getting used to me? Next time, use a condom..."
|
||||
|
||||
The virus is significant in that it "infects" a file without touching
|
||||
it at all, and thus escapes detection by CRC examination programs.
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
77
textfiles.com/virus/NCSA/ncsa018.txt
Normal file
77
textfiles.com/virus/NCSA/ncsa018.txt
Normal file
@@ -0,0 +1,77 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> Alabama Virus <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Date of Origin: October 13, 1989.
|
||||
|
||||
Place of Origin: Israel.
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
Host Files: Remains resident. Infects EXE files.
|
||||
|
||||
OnScreen Symptoms: One hour after activation, the virus displays this
|
||||
message in a flashing box:
|
||||
|
||||
"SOFTWARE COPIES PROHIBITED BY INTERNATIONAL LAW
|
||||
|
||||
Box 1055 Tuscambia ALABAMA USA."
|
||||
|
||||
Increase in Size of Infected Files: 1560 bytes.
|
||||
|
||||
Nature of Damage: Affects system run-time operation. Corrupts program or
|
||||
overlay files. Directly or indirectly corrupts file linkage.
|
||||
|
||||
Detected by: Scanv43+, F-Prot, IBM Scan, Pro-Scan.
|
||||
|
||||
Removed by: CleanUp, F-Prot, or delete infected files.
|
||||
|
||||
This virus was isolated by Ysrael Radai at Hebrew University. It
|
||||
manipulates the file allocation table and swaps file names so that files
|
||||
are slowly lost.
|
||||
|
||||
The Alabama virus will infect .EXE files, increasing their size by
|
||||
1,560 bytes. It moves into memory when any EXE containing the virus is
|
||||
executied. Unlike most other memory-resident viruses, the Alabama does
|
||||
not use the normal TSR function, but rather hooks interrupt 9 as well as
|
||||
IN and OUT commands. Upon detecting a Control-Alt-Delete, the virus
|
||||
generates what appears to be a warm boot, but remains in memroy. The
|
||||
virus loads to the top 30K of memory, unlike other memory-resident
|
||||
programs, and does not reduce the available memory reported by DOS.
|
||||
|
||||
The Alabama virus uses a complex procedure during infection. It will
|
||||
first infect an EXE in the current directory, providing there is one
|
||||
which is uninfected. If all EXEs in the current directory are infected,
|
||||
then the Alabama virus will infect the program being executed --
|
||||
provided the system date is not Friday. On Fridays, the Alabama virus
|
||||
will swap entries in the FAT so that when the user attempts to execute an
|
||||
uninfected file, an infected file executes instead. Over time, files
|
||||
will be lost through this process.
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
115
textfiles.com/virus/NCSA/ncsa019.txt
Normal file
115
textfiles.com/virus/NCSA/ncsa019.txt
Normal file
@@ -0,0 +1,115 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> Alameda Virus <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Synonyms: Yale, Merritt, Peking, Seoul virus.
|
||||
|
||||
Date of Origin: Spring, 1987.
|
||||
|
||||
Place of Origin: Merritt College, Alameda, California.
|
||||
|
||||
Host Machine: PC compatibles. Does not run on 80286.
|
||||
|
||||
Host Files: Remains resident. Infects floppy disk boot sector.
|
||||
|
||||
Increase in Size of Infected Files: n/a.
|
||||
|
||||
Nature of Damage: Resident. Corrupts or overwrites floppy boot sector.
|
||||
|
||||
Detected by: Scanv56+, F-Prot, IBM Scan.
|
||||
|
||||
Removed by: CleanUp, MDisk, F-Prot, or DOS SYS command..
|
||||
|
||||
Scan Code: BB 40 00 8E DB A1 13 00 F7 E3 2D E0 07 8E C0 0E 1F 81 FF 56 34
|
||||
75 04 FF 0E F8 7D. You can also search at offset 00EH for A1 13 00 F7 E3
|
||||
2D E0 07.
|
||||
|
||||
History: First discovered at Merritt college in California in the Spring
|
||||
of 1987. In February, 1988, it popped up at Alameda College, where it
|
||||
received large publicity. In October, 1988, it surfaced at Yale
|
||||
University, where it became known as the Yale virus. The original
|
||||
version caused no intentional damage.
|
||||
|
||||
The original Alameda would only run on an 8088/8086, and was
|
||||
presumably assembled using A86 on such a machine. Because it does not
|
||||
infect hard disks, we may presume that the author's machine did not have
|
||||
one. The original version would not run on an 80286 or an 80386 machine,
|
||||
although it will infect on such a machine. Later versions of the virus
|
||||
can run on an 80286.
|
||||
|
||||
Description of Operation: The Alameda virus spends its life in the boot
|
||||
sector of 5.25" 360K floppy disks. When the machine boots from an
|
||||
infected 360K floppy, the Alameda becomes memory resident, occupying 1K
|
||||
of memory. It infects 360K floppies in the A: drive only. Pressing
|
||||
Ctrl-Alt-Del activates the virus, rather than removing it from memory.
|
||||
At this point, it looks for a floppy in drive A: to infect. It will
|
||||
infect any 360K disk in that drive, whether or not it is a bootable disk.
|
||||
|
||||
The original boot sector is held in track thirty-nine, head zero,
|
||||
sector eight. It does not map this sector bad in the FAT (unlike the
|
||||
Brain) and should that area be used by a file, the virus will die. It
|
||||
apparently uses head 0, sector 8 and not head 1 sector 9 because this is
|
||||
common to both single sided and double sided formats and common to both
|
||||
8-sectored and 9-sectored formats (both the old 160K single sided and
|
||||
later 180K single sided formats).
|
||||
|
||||
Alameda redirects the keyboard interrupt (INT 09H) to look for
|
||||
Ctrl-Alt-Del sequences. When it detects Ctrl-Alt-Del, it will attempt to
|
||||
infect any floppy it finds in drive A:.
|
||||
|
||||
The virus is not malevolent. It contains code to format track
|
||||
thirty-nine, head zero, but this has been disabled. It also contains a
|
||||
count of the number of times it has infected other diskettes, although it
|
||||
is referenced for write only and is not used as part of an activation
|
||||
algorithm. The virus remains resident at all times after it is booted,
|
||||
even if the user removes the floppy from a machine having no bootable
|
||||
hard disk, and reboots with Ctrl-Alt-Del. When Ctrl-Alt-Del is pressed
|
||||
from inside Cassette Basic, it activates and infects the floppy from
|
||||
which the user is attempting to boot.
|
||||
|
||||
Alameda contains no anti-detection mechanisms as does the Brain
|
||||
virus.
|
||||
|
||||
The Alameda contains a rare POP CS instruction that is not understood
|
||||
by 80286 systems, and hangs the system up. The POP CS command is used to
|
||||
pass control to itself in upper memory. When such a machine hangs, the
|
||||
virus has already installed itself in high RAM and hooked the keyboard
|
||||
interrupt, so that the infection can spread if a warm boot is then
|
||||
performed.<Note: In fact, the way the virus is most often discovered is
|
||||
that a 286 won't boot from an infected disk.>
|
||||
|
||||
Removal: Alameda can not only live through an Ctrl-Alt-Del reboot
|
||||
command, but this is its only means of reproduction to other floppy
|
||||
diskettes. The only way to remove it from an infected system is to turn
|
||||
the machine off and reboot with an uninfected copy of DOS. The Norton
|
||||
utilities can be used to identify infected diskettes by looking at the
|
||||
boot sector and the DOS SYS utility can be used to remove it <197> unlike
|
||||
the Brain.
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
42
textfiles.com/virus/NCSA/ncsa020.txt
Normal file
42
textfiles.com/virus/NCSA/ncsa020.txt
Normal file
@@ -0,0 +1,42 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> Alameda-B <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Synonyms: Sacramento Virus, Yale C
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
Derived from: Alameda
|
||||
|
||||
This is the original Alameda Virus that has the POP CS removed.
|
||||
Relocation is accomplished through a long jump instruction. All other
|
||||
characteristics are identical. This version, unlike the original
|
||||
Alameda, runs on a 286.
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
42
textfiles.com/virus/NCSA/ncsa021.txt
Normal file
42
textfiles.com/virus/NCSA/ncsa021.txt
Normal file
@@ -0,0 +1,42 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> Alameda-C <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
Derived from: Alameda-B
|
||||
|
||||
This is the Alameda-B virus that has been modified to disable the
|
||||
boot function after 100 infections. The counter in the original Alameda
|
||||
virus has been re-activated and is interrogated at each bootup. When it
|
||||
reaches 100, the virus disconnects from the original boot sector
|
||||
(control is no longer passed) and the diskette will no longer boot. At
|
||||
infection time, the counter is zeroed on the host diskette.
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
54
textfiles.com/virus/NCSA/ncsa022.txt
Normal file
54
textfiles.com/virus/NCSA/ncsa022.txt
Normal file
@@ -0,0 +1,54 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> Amstrad Virus <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Date of Origin: Reported in November, 1989 by Jean Luz, an NCSA member.
|
||||
Known for about one year prior to that in Spain and Portugal.
|
||||
|
||||
Place of Origin: Spain and Portugal
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
Host Files: COM files other than COMMAND.COM. Not memory resident.
|
||||
|
||||
OnScreen Symptoms: Displays a fake advertisement for the Amstrad
|
||||
computer.
|
||||
|
||||
Increase in Size of Infected Files: 847 bytes.
|
||||
|
||||
Nature of Damage: May corrupt program or overlay files.
|
||||
|
||||
Detected by: Scanv51+, F-Prot, IBM Scan, Pro-Scan.
|
||||
|
||||
Removed by: CleanUp, Scan/D, F-Prot, or simply erase the infected files.
|
||||
|
||||
This virus appears to cause no damage beyond replication, which may
|
||||
occasionally damage a COM file.
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
44
textfiles.com/virus/NCSA/ncsa023.txt
Normal file
44
textfiles.com/virus/NCSA/ncsa023.txt
Normal file
@@ -0,0 +1,44 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> Anarkia <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
Host Files: COM and EXE files.
|
||||
|
||||
Increase in Size of Infected Files: n/a.
|
||||
|
||||
Nature of Damage: Progressively slows CPU operations -- a bit at first,
|
||||
more over time during the session.
|
||||
|
||||
Derived from: Jerusalem B.
|
||||
|
||||
Scan Code: "ANARKIA" replaces "sUMsDos" of the Jerusalem B.
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
43
textfiles.com/virus/NCSA/ncsa024.txt
Normal file
43
textfiles.com/virus/NCSA/ncsa024.txt
Normal file
@@ -0,0 +1,43 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> Apple Virus <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Date of Origin: Fall, 1989.
|
||||
|
||||
Host Machine: Macintosh.
|
||||
|
||||
The Apple virus is a "RESET" instruction followed by a "NOP"
|
||||
instruction. The unusual sequence of statements (normally one would put
|
||||
the "NOP" before the "RESET") makes it a surprisingly hard to detect and
|
||||
disassemble. To propagate, the user must use Apple's Resource Editor
|
||||
(ResEdit) to cut and paste this virus into every program that they want
|
||||
it to infect. The virus seems to be more a tool for virus planters than
|
||||
something that will be causing widespread damage directly.
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
44
textfiles.com/virus/NCSA/ncsa025.txt
Normal file
44
textfiles.com/virus/NCSA/ncsa025.txt
Normal file
@@ -0,0 +1,44 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> April 1st-B <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
Host Files: EXE files.
|
||||
|
||||
Scan Code: 2E A3 17 00 BB 17 00 0E 1F B4 DE CD 21 B4 2A CD 21 81 FA 01 04
|
||||
74 22 81 F9 BC 07 75 06 E8 C5 04.
|
||||
|
||||
An .EXE-infecting version of .COM which will display the
|
||||
characteristic message on execution of any infected .EXE file on April
|
||||
1st, with associated lockup. A similar lockup will occur 1 hour after
|
||||
infection of memory on any day on which the default date 1-1-80 is used.
|
||||
See sURiV.
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
58
textfiles.com/virus/NCSA/ncsa026.txt
Normal file
58
textfiles.com/virus/NCSA/ncsa026.txt
Normal file
@@ -0,0 +1,58 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> Ashar Virus <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Synonyms: Shoe_Virus, UIUC Virus
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
Host Files: Infects floppy disk boot sector. Remains resident.
|
||||
|
||||
Increase in Size of Infected Files: n/a.
|
||||
|
||||
Nature of Damage: Resident. Corrupts or overwrites boot sector.
|
||||
|
||||
Detected by: Scanv41+, F-Prot, IBM Scan.
|
||||
|
||||
Removed by: CleanUp, MDisk, F-Prot, or the DOS SYS command.
|
||||
|
||||
Derived from: Brain
|
||||
|
||||
Scan Code: "ashar", found at offset 04A6 hex in the virus.
|
||||
|
||||
Modifies the Brain virus message to read:
|
||||
|
||||
VIRUS_SHOE RECORD, v9.0. Dedicated to the dynamic memories of millions
|
||||
of virus who are no longer with us today
|
||||
|
||||
This message is never displayed.
|
||||
|
||||
Unlike the Brain, this virus can infect both floppies and hard disks.
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
56
textfiles.com/virus/NCSA/ncsa027.txt
Normal file
56
textfiles.com/virus/NCSA/ncsa027.txt
Normal file
@@ -0,0 +1,56 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> Ashar-B Virus <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Synonyms: Shoe_Virus-B
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
Host Files: Infects floppy disk boot sector. Cannot infect hard disks.
|
||||
Remains resident.
|
||||
|
||||
OnScreen Symptoms: none.
|
||||
|
||||
Increase in Size of Infected Files: n/a.
|
||||
|
||||
Nature of Damage: Resident. Corrupts or overwrites boot sector.
|
||||
|
||||
Detected by: Scanv41+, F-Prot, IBM Scan.
|
||||
|
||||
Removed by: CleanUp, MDisk, F-Prot, or the DOS SYS command.
|
||||
|
||||
Derived from: Ashar
|
||||
|
||||
Scan Code: "ashar", found at offset 04A6 hex in the virus.
|
||||
|
||||
Modifies the Ashar virus message, changing "v9.0" to "v9.1" This
|
||||
message is never displayed. Unlike the original Ashar virus, this
|
||||
version can only infect floppies.
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
53
textfiles.com/virus/NCSA/ncsa028.txt
Normal file
53
textfiles.com/virus/NCSA/ncsa028.txt
Normal file
@@ -0,0 +1,53 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> Austrian Virus And Variants <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Synonyms: 648 Virus.
|
||||
|
||||
Date of Origin: Fall, 1988.
|
||||
|
||||
Place of Origin: London, England.
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
Host Files: COM files.
|
||||
|
||||
Increase in Size of Infected Files: 648 bytes.
|
||||
|
||||
Scan Code: FC 8B F2 81 C6 0A 00 BF 00 01 B9 03 00 F3 A4 8B F2 B4 30 CD 21
|
||||
3C 00 75 03 E9 C7 01.
|
||||
|
||||
This is a COM infector that increases the size of the infected file
|
||||
by 648 bytes without changing date/time or attributes. Intentional
|
||||
damage: one infected file in eight (at random) is changed in such a way
|
||||
that the program will not run. No known unintentional damage. It is not
|
||||
a memory resident virus. It infects the next uninfected COM file in the
|
||||
current directory (similar to the original Friday 13th).
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
39
textfiles.com/virus/NCSA/ncsa029.txt
Normal file
39
textfiles.com/virus/NCSA/ncsa029.txt
Normal file
@@ -0,0 +1,39 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> Austrian-B <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Synonyms: 648-B.
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
This is similar to the original, but it causes infrequent errors in
|
||||
the infected COM file so that the file will not execute. Approximately
|
||||
one file in ten will be corrupted.
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
47
textfiles.com/virus/NCSA/ncsa030.txt
Normal file
47
textfiles.com/virus/NCSA/ncsa030.txt
Normal file
@@ -0,0 +1,47 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> Black Hole <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Synonyms: the Russian Virus.
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
Derived from: Jerusalem-C
|
||||
|
||||
This virus is the Jerusalem-C that has odd text and additional code
|
||||
that is never referenced. A new interrupt eight routine is added to the
|
||||
non-referenced area and a number of interrupt 21 calls which appear
|
||||
meaningless. The additional text includes "ANTIVIRUS". It appears that
|
||||
this virus is a modified version of the Jerusalem-C/New Jerusalem.
|
||||
|
||||
Note that because of the difference in EGA and CGA int 10 usage,
|
||||
Jerusalem A has been observed with the blackhole effect noted on an EGA
|
||||
screen.
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
134
textfiles.com/virus/NCSA/ncsa031.txt
Normal file
134
textfiles.com/virus/NCSA/ncsa031.txt
Normal file
@@ -0,0 +1,134 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> Brain Virus <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Synonyms: Pakistani, Pakistani Brain, Basit Virus.
|
||||
|
||||
Date of Origin: January, 1986.
|
||||
|
||||
Place of Origin: Lahore Pakistan.
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
Host Files: Remains resident. Infects floppy disk boot sector.
|
||||
|
||||
OnScreen Symptoms: None. Use DIR to find a volume label on an infected
|
||||
floppy: "(c) Brain". Using a sector editor, you should be able to find
|
||||
"(c) Brain" in sector 0, as well.
|
||||
|
||||
Increase in Size of Infected Files: n/a.
|
||||
|
||||
Nature of Damage: Resident, taking 3-7K of RAM. Corrupts or overwrites
|
||||
boot sector.
|
||||
|
||||
Detected by: Scanv56+, F-Prot, IBM Scan, Pro-Scan.
|
||||
|
||||
Removed by: CleanUp, MDisk, F-Prot, or DOS SYS command.
|
||||
|
||||
Derived from: This virus appears to be "an original."
|
||||
|
||||
Scan Code: 8C C8 8E D8 8E D0 BC 00 F0 FB A0 06 7C A2 09 7C 8B 0E 07 7C 89
|
||||
0E 0A 7C E8 57 00. You can also search at 15EH for 8B 0E 07 7C 89 0E 0A 7C
|
||||
E8 57.
|
||||
|
||||
This virus originated in January, 1986, in Lahore Pakistan, but the
|
||||
first noticeable infection problems did not surface until 1988<Note: In
|
||||
the spring of 1988, for instance, 100 machines at The Providence
|
||||
Journal-Bulletin were infected with it.>.
|
||||
|
||||
The Brain is unusual in that it includes the valid names, address and
|
||||
phone numbers of the original perpetrators. It was written by two
|
||||
brothers running a computer store in Lahore Pakistan. According to some
|
||||
sources, Basit Farooq Alvi (one of the brothers) wrote the virus so that
|
||||
it would infect machines running bootleg copies of a program he was
|
||||
selling for physicians. The original Brain put a copyright notice in the
|
||||
directory of floppy disks, but did no other damage to floppy disks, and
|
||||
would not infect hard disks.
|
||||
|
||||
This virus consists of a boot sector and three clusters (6 sectors)
|
||||
marked as bad in the FAT. The first of these sectors contains the
|
||||
original boot sector, and the rest contain the rest of the virus. It
|
||||
only infects 360K floppies, and it occupies 7K of memory.
|
||||
|
||||
The original Brain will infect a diskette whenever the diskette is
|
||||
referenced. For example, a DIR command, executing a program from the
|
||||
diskette, copying a file from or to the diskette or any other access will
|
||||
cause the infection to occur. The virus stores the original boot sector,
|
||||
and six extension sectors, containing the main body of the virus, in
|
||||
available sectors which are then flagged as bad sectors. Diskettes have
|
||||
3K of bad sectors (possibly more, if there are genuinely bad sectors, as
|
||||
well.)
|
||||
|
||||
The Brain causes no known intentional damage. However, it can slow
|
||||
diskette access a bit, and may cause time-outs, which can make some
|
||||
diskette drives unusable.
|
||||
|
||||
Any attempts to examine the boot sector are likely to be intercepted
|
||||
by the Brain when it is memory resident, redirecting the "view" to the
|
||||
relocated boot sector. Thus, programs like the Norton Utilities will be
|
||||
unable to "see" the virus.
|
||||
|
||||
There are a number of unused character strings which can be used to
|
||||
identify it:
|
||||
|
||||
Offset 0010H:
|
||||
|
||||
Welcome to the Dungeon
|
||||
|
||||
(c) 1986 Basit & Amjad (pvt) Lt
|
||||
|
||||
d. BRAIN COMPUTER SERVICES..730 NI
|
||||
|
||||
ZAM BLOCK ALLAMA IQBAL TOWN LAHOR
|
||||
|
||||
E-PAKISTAN..PHONE :430791,443248,280530.
|
||||
|
||||
Beware of this VIRUS.....Contact us for vaccin
|
||||
|
||||
ation............... $#@%
|
||||
Offset 0202H:
|
||||
|
||||
|
||||
|
||||
(c) 1986 Basit & Amjads (pvt) Ltd
|
||||
|
||||
Offset 0355H:
|
||||
|
||||
(c) 1986 Basit & Amjads (pvt) Ltd
|
||||
|
||||
Offset 04A6H:
|
||||
|
||||
(c) Brain $
|
||||
|
||||
Infected diskettes are noticeable by "@BRAIN" or "(c) BRAIN"
|
||||
displayed in the volume label. Derivations can infect hard disks, and
|
||||
some have had the "(c) Brain" label removed, to make detection more
|
||||
difficult.
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
49
textfiles.com/virus/NCSA/ncsa032.txt
Normal file
49
textfiles.com/virus/NCSA/ncsa032.txt
Normal file
@@ -0,0 +1,49 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> Brain-B <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Synonyms: Brain-HD, the Hard Disk Brain, Houston Virus.
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
OnScreen Symptoms: none.
|
||||
|
||||
Nature of Damage: Resident, taking 3-7K of RAM. Corrupts or overwrites
|
||||
boot sector.
|
||||
|
||||
Detected by: Scanv56+, F-Prot, IBM Scan.
|
||||
|
||||
Removed by: CleanUp, MDisk, F-Prot, or DOS SYS command.
|
||||
|
||||
Derived from: original Brain virus.
|
||||
|
||||
This virus is identical in every respect to the original Brain, with
|
||||
the single exception that it can infect the C drive.
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
48
textfiles.com/virus/NCSA/ncsa033.txt
Normal file
48
textfiles.com/virus/NCSA/ncsa033.txt
Normal file
@@ -0,0 +1,48 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> Brain-C <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
OnScreen Symptoms: none.
|
||||
|
||||
Nature of Damage: Resident, taking 3-7K of RAM. Corrupts or overwrites
|
||||
boot sector.
|
||||
|
||||
Detected by: Scanv56+, F-Prot, IBM Scan.
|
||||
|
||||
Removed by: CleanUp, MDisk, F-Prot, or DOS SYS command.
|
||||
|
||||
Derived from: Brain-B.
|
||||
|
||||
This virus is the Brain-B that has the volume label code removed. The
|
||||
volume label of infected diskettes does not change with this virus. This
|
||||
virus is difficult to detect since it does nothing overt in the system.
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
111
textfiles.com/virus/NCSA/ncsa034.txt
Normal file
111
textfiles.com/virus/NCSA/ncsa034.txt
Normal file
@@ -0,0 +1,111 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> Cascade Virus <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Synonyms: 1701, Falling Letters, Falling Tears, Fall virus, Autumn
|
||||
Leaves.
|
||||
|
||||
Date of Origin: late 1987.
|
||||
|
||||
Place of Origin: Switzerland?
|
||||
|
||||
Host Machine: The 1701 version will infect both true IBM PC's and PC
|
||||
compatibles; the 1704 version will only affect PC compatibles. This is
|
||||
the only difference between the two versions.
|
||||
|
||||
Host Files: Remains resident. Infects COM files. Uses self-encryption.
|
||||
|
||||
OnScreen Symptoms: If the system month is between September and
|
||||
December, and the system year is either 1980 or 1988, and the monitor is
|
||||
either CGA or VGA, the cascade display will be activated at random
|
||||
intervals.
|
||||
|
||||
Increase in Size of Infected Files: 1701 or 1704 bytes (two different
|
||||
versions).
|
||||
|
||||
Nature of Damage: Affects system run-time operation. Corrupts program or
|
||||
overlay files.
|
||||
|
||||
Detected by: Scanv56+, F-Prot, IBM Scan, Pro-Scan.
|
||||
|
||||
Removed by: M-1704, CleanUp, or F-Prot. You may also follow the
|
||||
instructions for removing the Jerusalem virus.
|
||||
|
||||
Derived from: A NumLock utility Trojan horse.
|
||||
|
||||
Scan Code: Uses self-encryption. FA 8B EC E8 00 00 5B 81 EB 31 01 2E F6
|
||||
87 2A 01 01 74 0F 8D B7 4D 01 BC 82 06 31 34 31 24 46 4C 75 F8. You can
|
||||
also search at offset 01BH for 31 34 31 24 46 4C 75 F8.
|
||||
|
||||
This virus was adapted from a Trojan utility which was claimed to
|
||||
turn of the Num Lock light and mode. The Trojan caused characters on CGA
|
||||
screens to "fall" to the bottom of the screen. In late 1987 this Trojan
|
||||
was turned into a memory resident COM virus, and reported by Rudolf
|
||||
Rindler of Switzerland.
|
||||
|
||||
Two version of the virus exist.
|
||||
|
||||
* The 1701 version increases the size of COM files by 1,701 bytes, and
|
||||
infect both machines containing an IBM copyright notice in the ROM
|
||||
and clones.
|
||||
|
||||
* The 1704 version increases the size of COM files by 1,704 bytes, and
|
||||
infects only clones.
|
||||
|
||||
The virus occurs attached to the end of a COM file. The first three
|
||||
bytes of the program are stored in the virus, and replaced by a branch to
|
||||
the beginning of the virus. It becomes memory-resident when the first
|
||||
infected program is run, and it will then infect every COM file run (even
|
||||
if the file has an EXE extension).
|
||||
|
||||
The virus is unique in several ways:
|
||||
|
||||
* The virus is encrypted (apart from the first 35 bytes) using an
|
||||
algorithm that includes the length of the host program, so every
|
||||
sample looks different.
|
||||
|
||||
* The mechanics of its activation are complex, being based on
|
||||
randomizations, machine types, monitor type, presence or absence of
|
||||
clock cards, and time of year. The virus activates on any machine
|
||||
with a CGA or VGA monitor, in the months of September, October,
|
||||
November or December, in the year 1980 or 1988 (systems without clock
|
||||
cards will often have a date set to 1980).
|
||||
|
||||
* Occasionally, 1701 triggers a "hailstorm". The characters on the
|
||||
screen behave as if the were pinned to the screen, and someone is
|
||||
removing the pins one at a time <197> it looks a bit like a hailstorm,
|
||||
and has appropriate sound effects. In fact, it is a purely
|
||||
audio-visual effect - nothing is happening to your data. But over
|
||||
-reaction at this point -- turning the machine off -- may result in
|
||||
lost clusters and file damage.
|
||||
|
||||
To remove the virus, either run M-1704 or follow the instructions
|
||||
offered for the Jerusalem virus.
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
76
textfiles.com/virus/NCSA/ncsa035.txt
Normal file
76
textfiles.com/virus/NCSA/ncsa035.txt
Normal file
@@ -0,0 +1,76 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> Cascade-B <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Synonyms: 1704-B, 1701-B, Blackjack virus
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
Host Files: Remains resident. Infects COM files.
|
||||
|
||||
OnScreen Symptoms: There is no cascade display on the screen for this
|
||||
version. The system will reboot at random intervals after activation.
|
||||
|
||||
Increase in Size of Infected Files: 1701 bytes (will infect both PCs and
|
||||
compatibles) or 1704 bytes (will infect only PC compatibles).
|
||||
|
||||
Nature of Damage: Affects system run-time operation. Corrupts program or
|
||||
overlay files.
|
||||
|
||||
Detected by: Scanv56+, F-Prot, IBM Scan, Pro-Scan.
|
||||
|
||||
Removed by: M-1704, M-1704C, CleanUp, or F-Prot. You may also follow the
|
||||
instructions for removing the Jerusalem virus.
|
||||
|
||||
Derived from: Cascade.
|
||||
|
||||
Scan Code: Uses self-encryption. FA 8B EC E8 00 00 5B 81 EB 31 01 2E F6
|
||||
87 2A 01 01 74 0F 8D B7 4D 01 BC 85 06 31 34 31 24 46 4C 75 F8. You can
|
||||
also search at offset 01BH for 31 34 31 24 46 4C 77 F8.
|
||||
|
||||
This virus is identical to the Cascade except for these two changes:
|
||||
|
||||
* it activates in the fall of any year;
|
||||
|
||||
* the cascading display has been replaced with a system re-boot when
|
||||
the virus activates.
|
||||
|
||||
The activation uses the same interrupt 8 randomization algorithm, so
|
||||
the reboot will occur at a random time interval after executing an
|
||||
infected program on or after the activation date.
|
||||
|
||||
This virus has the ability to infect a file more than once. Cleanup
|
||||
works well at removing the virus, even from files infected multiple
|
||||
times (Cleanup will have to be run the same number of times that the file
|
||||
is infected). Be warned though, if you find a file has been infected more
|
||||
than once, remove the virus and delete the file, as files infected more
|
||||
than once will hang your computer. Files infected only once by this virus
|
||||
seem to run OK after removing the virus.
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
49
textfiles.com/virus/NCSA/ncsa036.txt
Normal file
49
textfiles.com/virus/NCSA/ncsa036.txt
Normal file
@@ -0,0 +1,49 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> Cascade-C <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Synonyms: 1704-C
|
||||
|
||||
Host Machine: PC compatibles. True IBM PCs won't be infected.
|
||||
|
||||
Host Files: COM files.
|
||||
|
||||
Increase in Size of Infected Files: 1704 bytes.
|
||||
|
||||
Removed by: M-1704C.
|
||||
|
||||
Derived from: Cascade-B
|
||||
|
||||
Scan Code: F6 87 2A 01 01 74 0F 8D B7 4D 01 BC or F6 87 2A 01 01 74 0F 8D
|
||||
B7 4D 01 BC 85 06 31 34 31 24 46 4C 77 F8.
|
||||
|
||||
This virus is the same as the Cascade-B/1704-B, except the
|
||||
activation date has been changed to occur in December of any year.
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
42
textfiles.com/virus/NCSA/ncsa037.txt
Normal file
42
textfiles.com/virus/NCSA/ncsa037.txt
Normal file
@@ -0,0 +1,42 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> Cascade-D <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Synonyms: 1704-D
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
Derived from: Cascade
|
||||
|
||||
Scan Code: F6 87 2A 01 01 74 0F 8D B7 4D 01 BC.
|
||||
|
||||
This virus is the same as the Cascade/1704, except that it is able to
|
||||
infect machines with an IBM copyright notice in the ROM.
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
41
textfiles.com/virus/NCSA/ncsa038.txt
Normal file
41
textfiles.com/virus/NCSA/ncsa038.txt
Normal file
@@ -0,0 +1,41 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> Century Virus <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Synonyms: the Oregon Virus.
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
This is similar to the Jerusalem-C except the activation date is
|
||||
January 1, 2000. When the virus activates, it erases both FATs on all
|
||||
connected drives and then begins writing zeroes to every sector on every
|
||||
attached device. If allowed to continue to completion, it displays the
|
||||
message - " Welcome to the 21st Century".
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
40
textfiles.com/virus/NCSA/ncsa039.txt
Normal file
40
textfiles.com/virus/NCSA/ncsa039.txt
Normal file
@@ -0,0 +1,40 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> Century-B <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
Derived from: Century virus.
|
||||
|
||||
This virus is similar to the original Century virus with the
|
||||
following exception: It waits for BACKUP.COM to be executed and then
|
||||
garbles all program writes. After BACKUP terminates, the output
|
||||
functions return to normal.
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
57
textfiles.com/virus/NCSA/ncsa040.txt
Normal file
57
textfiles.com/virus/NCSA/ncsa040.txt
Normal file
@@ -0,0 +1,57 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> Chaos <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Date of Origin: First reported by James Berry in December, 1989.
|
||||
|
||||
Place of Origin: Possibly Kent, England
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
Host Files: hard disk and floppy disk boot sectors.
|
||||
|
||||
OnScreen Symptoms: None. Infected boot sectors will contain these
|
||||
messages: "Welcome to the New Dungeon", "Chaos", and "Letz be cool
|
||||
guys".
|
||||
|
||||
Increase in Size of Infected Files: n/a
|
||||
|
||||
Nature of Damage: Remains resident. Corrupts or overwrites boot sector,
|
||||
affects system run-time operation, corrupts data files, formats or
|
||||
erases all/part of disk.
|
||||
|
||||
Detected by: Scanv53+.
|
||||
|
||||
Removed by: MDisk, Cleanup, or the DOS SYS command.
|
||||
|
||||
Chaos overwrites the boot sector, and flags the disk as being full of
|
||||
bad sectors upon activation, though these bad sectors are still
|
||||
readable. The activation criteria are unknown.
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
51
textfiles.com/virus/NCSA/ncsa041.txt
Normal file
51
textfiles.com/virus/NCSA/ncsa041.txt
Normal file
@@ -0,0 +1,51 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> Christmas Card <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Date of Origin: December, 1987.
|
||||
|
||||
Host Machine: IBM E-mail system.
|
||||
|
||||
This virus circulated a Christmas greeting throughout IBM's
|
||||
worldwide E-mail system in December, 1987. The virus overloaded the
|
||||
network, forcing IBM to shut it down temporarily.<Note: Knight-Ridder
|
||||
News Service, "For Many Users, `Viruses' are Nothing New" reprinted in
|
||||
The Washington Post, November 28, 1988, p. F25.> The virus was sent by
|
||||
a West German law student to friends through a local European academic
|
||||
research network. The virus told the receiver's computer to display the
|
||||
greeting, then quietly send the virus and message to everyone on the
|
||||
recipient's regular electronic mailing list. It turned out that someone
|
||||
on the list had special, restricted access to IBM's E-mail network of
|
||||
several thousand computers in 145 countries. IBM has since modified
|
||||
their system to make repetition improbable.<Note: Philip J. Hilts,
|
||||
"Computers Face Epidemic of `Information Diseases'; Malicious
|
||||
Programmers Spread Destructive Bits of Bogus Instructions Across the
|
||||
World" The Washington Post, May 8, 1988, p. A3.>
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
60
textfiles.com/virus/NCSA/ncsa042.txt
Normal file
60
textfiles.com/virus/NCSA/ncsa042.txt
Normal file
@@ -0,0 +1,60 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> Christmas Tree Virus <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Synonyms: XA1, 1539 virus
|
||||
|
||||
Date of Origin: March, 1990.
|
||||
|
||||
Place of Origin: West Germany.
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
Host Files: COM files. Non-resident.
|
||||
|
||||
OnScreen Symptoms: Between 12/24 and 1/1 will display a Christmas tree
|
||||
on the screen.
|
||||
|
||||
Increase in Size of Infected Files: 1,539 bytes.
|
||||
|
||||
Nature of Damage: On April 1, running an infected program will destroy
|
||||
the hard disk partition table.
|
||||
|
||||
Detected by: Scan v61+.
|
||||
|
||||
Removed by: Scan/D, or delete the infected files.
|
||||
|
||||
Derived from: apparently an original.
|
||||
|
||||
Discovered by Christoff Fischer, this virus displays the Christmas
|
||||
tree on the screen when the system date is between December 24 and
|
||||
January 1 and an infected program is executed. On April 1, it destroys
|
||||
the partition table of the hard disk.
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
39
textfiles.com/virus/NCSA/ncsa043.txt
Normal file
39
textfiles.com/virus/NCSA/ncsa043.txt
Normal file
@@ -0,0 +1,39 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> Chroma <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Date of Origin: October, 1989.
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
Chroma appears to display a face and talk. While doing so, it places
|
||||
itself throughout the hard disk and marks the sectors as unmovable
|
||||
during de-fragmentation.
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
50
textfiles.com/virus/NCSA/ncsa044.txt
Normal file
50
textfiles.com/virus/NCSA/ncsa044.txt
Normal file
@@ -0,0 +1,50 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> Clone Virus <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
Host Files: boot sector infector.
|
||||
|
||||
OnScreen Symptoms: none.
|
||||
|
||||
Increase in Size of Infected Files: n/a
|
||||
|
||||
Nature of Damage: destroys the FAT after May 5, 1992.
|
||||
|
||||
Derived from: Brain-C
|
||||
|
||||
This virus is the Brain-C that saves the original boot copyright
|
||||
label and restores it to the infected boot. The Basit & [A]mjad original
|
||||
Brain messages have been replaced with non-printable garbage that looks
|
||||
like instructions if viewed through Norton or another utility. Even if
|
||||
the system is booted from a clean diskette, it is virtually impossible to
|
||||
tell, by visual inspection, whether the hard disk is infected.
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
39
textfiles.com/virus/NCSA/ncsa045.txt
Normal file
39
textfiles.com/virus/NCSA/ncsa045.txt
Normal file
@@ -0,0 +1,39 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> Clone-B <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
Derived from: Clone virus.
|
||||
|
||||
This is the Clone virus that has been revised to corrupt the FAT when
|
||||
when your machine is booted after May 5, 1992. There are no other
|
||||
apparent modifications.
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
124
textfiles.com/virus/NCSA/ncsa046.txt
Normal file
124
textfiles.com/virus/NCSA/ncsa046.txt
Normal file
@@ -0,0 +1,124 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> Dark Avenger <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Synonyms: Black Avenger
|
||||
|
||||
Date of Origin: September, 1989.
|
||||
|
||||
Place of Origin: Sofia, Bulgaria. First isolated at U.C. Davis.
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
Host Files: Remains resident. Infects COMMAND.COM, EXE, COM, overlay
|
||||
files.
|
||||
|
||||
Increase in Size of Infected Files: 1800 bytes.
|
||||
|
||||
Nature of Damage: Affects system run-time operation. Corrupts program or
|
||||
overlay files. Directly or indirectly corrupts file linkage.
|
||||
|
||||
Detected by: Scanv36+, F-Prot, IBM Scan, Pro-Scan.
|
||||
|
||||
Removed by: M_DAV, CleanUp, F-Prot.
|
||||
|
||||
The Dark Avenger originated in Sofia, Bulgaria, and was probably
|
||||
imported to the U.S. in September, 1989 by some visiting math professors
|
||||
at U.C. Davis. It was first reported by Randy Dean at the U.C. Davis
|
||||
bookstore.
|
||||
|
||||
It not only infects generic COM and EXE files, but will also infect
|
||||
COMMAND.COM. Only files larger than 1,774 bytes will be infected<Note:
|
||||
Most of the technical information in this section was provided by Daniel
|
||||
Kalchev, of Bulgaria>. Once in COMMAND.COM, the virus will even
|
||||
replicate through the DOS COPY and XCOPY commands, with both the source
|
||||
and destination files being infected in the COPY process. The virus has
|
||||
been named the Dark Avenger because this code appears within the virus.
|
||||
The virus contains the words <197> "The Dark Avenger, copyright 1988,
|
||||
1989" and the message <197> "This program was written in the city of
|
||||
Sofia. Eddie lives.... Somewhere in Time!"
|
||||
|
||||
The Dark Avenger increases the length of infected COM files by 1,800
|
||||
bytes. EXE files are rounded up to the next "paragraph", and the virus
|
||||
is appended.
|
||||
|
||||
The Dark Avenger stays resident in memory (via manipulation of
|
||||
memory control blocks) and infects files via many DOS functions (such as
|
||||
open, close, exec). For this reason, a file may become infected not only
|
||||
when it is executed but even when viewed with PC Tools, when located with
|
||||
some "FileFind" program, or when copied with COPY or XCOPY. During copy
|
||||
commands, both source and target files become infected.
|
||||
|
||||
When the Dark Avenger loads into memory, it begins by destroying the
|
||||
resident portion of COMMAND.COM, which causes reloading of the transient
|
||||
portion. At this time, the virus has already hooked the necessary
|
||||
interrupt and COMMAND.COM is infected first.
|
||||
|
||||
Although it stays resident, the Dark Avenger can't be detected by
|
||||
many programs such as MAPMEM, MI, SMAP, and others. This is because when
|
||||
a such a program is executed, the virus finds the program's own memory
|
||||
control block (MCB) and changes it in a way that it looks like the last
|
||||
of the chain of the MCBs (originally the MCB points to the next MCB in
|
||||
which virus is located). This hint is especially designed to deceive
|
||||
programs such as MAPMEM.
|
||||
|
||||
In addition, in the boot sector, two variables are maintained (at
|
||||
offset 0x08 and 0x0A). The latter is a counter to 15 (initialized to
|
||||
major version of current PC/MS-DOS). It is incremented each time an
|
||||
infected program is executed. When the counter reaches 16, the number
|
||||
from the first variable is used to select a random disk sector, which is
|
||||
then overwritten by the virus. If this sector is used by a file, the file
|
||||
is destroyed. Should the directory sector be selected and overwritten,
|
||||
the results are most unpleasant.
|
||||
|
||||
When the Dark Avenger installs itself, it scans the ROMs of
|
||||
additional controllers to find the address of the INT 0x13 handler (the
|
||||
virus knows how it begins and looks for its own first bytes). After that,
|
||||
it directly calls this address. As a result, it can't be detected by a
|
||||
program waiting for INT 0x13. The Dark Avenger uses INT 0x26 for this,
|
||||
and is detected by many antivirus programs (such as ANTI4US) with this
|
||||
interrupt. The virus affects functions of PC/MS-DOS such as "SetVector"
|
||||
and "Terminate And Stay Resident".
|
||||
|
||||
If anti-virus software attempts to set some of the virus's vital
|
||||
interrupts via "SetVector", the Dark Avenger will prohibit this. If the
|
||||
anti-virus software directly changes the vector table, when the software
|
||||
terminates (via "Terminate And Stay Resident"), the virus restores its
|
||||
vectors.
|
||||
|
||||
As an extremely infectious virus, treat it cautiously. Power down
|
||||
the system with the on/off switch. Re-boot from a write-protected system
|
||||
master diskette. Run SCAN or some other scanner to determine the extent
|
||||
of infection. The virus could conceivably be widespread. A disinfector
|
||||
(M_DAV), written by Morgan Schweers, is available on the National
|
||||
Computer Security Association's BBS that can remove this virus.<Note:
|
||||
The board number is 202 364-1304.> Be sure to re-scan the disk after you
|
||||
think you are finished with disinfection.
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
107
textfiles.com/virus/NCSA/ncsa047.txt
Normal file
107
textfiles.com/virus/NCSA/ncsa047.txt
Normal file
@@ -0,0 +1,107 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> Datacrime <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Synonyms: 1280 virus, Columbus Day, October 12th, October 13th, Friday
|
||||
13th, Munich Virus, Miami Virus
|
||||
|
||||
Date of Origin: March, 1989.
|
||||
|
||||
Place of Origin: Europe.
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
Host Files: non-resident. Infects COM files.
|
||||
|
||||
OnScreen Symptoms: No screen symptoms during propagation. After October
|
||||
12 of any year, it will display the message "DATACRIME VIRUS RELEASED 1
|
||||
MARCH 1989".
|
||||
|
||||
Increase in Size of Infected Files: 1280 bytes.
|
||||
|
||||
Nature of Damage: Corrupts program or overlay files. Formats or erases
|
||||
all/part of disk.
|
||||
|
||||
Detected by: Scanv56+, F-Prot, IBM Scan, Pro-Scan.
|
||||
|
||||
Removed by: AntiCrim, Scan/D, F-Prot, or CleanUp.
|
||||
|
||||
Scan Code: 00 56 8D B4 30 05 CD 21 or 8B 36 01 01 83 EE 03 8B C6 3D 00 00
|
||||
75 03 E9 02 01. Uses self-encryption. You can also search at offset 000H
|
||||
for 2E 8B 36 01 01 83 EE 03 8B C6.
|
||||
|
||||
The 1280 version of Datacrime is the earliest version, followed by
|
||||
the 1168 version. Both versions infect COM files, preserving the COM
|
||||
file's date and time. This virus saves the first three bytes of its host
|
||||
to a "save area" inside the virus shell, replacing them with a branch to
|
||||
the beginning of the virus. It appends the shell to the end of the .COM
|
||||
file on a paragraph boundary. The resulting file apparently must not
|
||||
exceed 64K <197> the stack is at the top of the 64K file, where the shell
|
||||
resides. The stack must have room for virus use. It is not
|
||||
memory-resident.
|
||||
|
||||
All versions of Datacrime activate after October 12th (hence the
|
||||
name October 12). In 1989 <197> its year of release <197> the day after
|
||||
October 12 was Friday the 13th (hence that name). Turning off your
|
||||
computer on that day will not provide any protection against it. The
|
||||
first time an infected program is run on or after Oct. 13, the virus will
|
||||
search through hard drive partitions (C:, then D:, etc.), then the
|
||||
directories of the A: and B: drives (in that order) for an uninfected COM
|
||||
file other than COMMAND.COM. It will ignore any COM file with a D as the
|
||||
seventh letter of its name (as in COMMAND.COM). It will then display the
|
||||
message: "Datacrime virus released 1 March 1989" and do a low-level
|
||||
format of cylinder 0 of the hard disk.
|
||||
|
||||
Due to mistakes in the code, the system is almost certain to crash if
|
||||
the DOS critical error handler is called (caused by a disk missing from a
|
||||
drive, for example). If the computer has an ESDI, RLL, or SCSI
|
||||
controller, the virus may be unsuccessful in formatting the hard disk.
|
||||
|
||||
The effect of this formatting is to wipe out the FAT (file allocation
|
||||
table) and the root directory, making the disk unreadable, except by
|
||||
special utilities.
|
||||
|
||||
Detection:
|
||||
|
||||
* The original version of the Datacrime will not infect files until
|
||||
after April 1st of the year (April Fool's Day).
|
||||
|
||||
* The virus, depending on its variant, appends itself to .COM files
|
||||
(except for COMMAND.COM), increasing the .COM file by either 1168 or
|
||||
1280 bytes. In addition, the Datacrime II variant can infect .EXE
|
||||
files, increasing their size by 1514 bytes.
|
||||
|
||||
* The 1168 byte version contains the hex string EB00B40ECD21B4.
|
||||
|
||||
* The 1280 byte version contains the hex string 00568DB43005CD21. In
|
||||
this version, you can also look for this ten-byte hex pattern:
|
||||
2E8B36010183EE038BC6. Note: the text message is encrypted, so it can't
|
||||
be identified by a text string search or a disk utility.
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
60
textfiles.com/virus/NCSA/ncsa048.txt
Normal file
60
textfiles.com/virus/NCSA/ncsa048.txt
Normal file
@@ -0,0 +1,60 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> Datacrime-B <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Synonyms: 1168 virus.
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
Host Files: EXE files.
|
||||
|
||||
Increase in Size of Infected Files: 1168 bytes.
|
||||
|
||||
Nature of Damage: Corrupts program or overlay files. Formats or erases
|
||||
all/part of disk.
|
||||
|
||||
Detected by: Scanv56+, F-Prot, IBM Scan.
|
||||
|
||||
Removed by: CleanUp, AntiCrim, Scan/D, or F-Prot.
|
||||
|
||||
Derived from: Datacrime (1280).
|
||||
|
||||
Scan Code: EB 00 B4 0E CD 21 B4 or 8B 36 01 01 83 EE 03 8B C6 3D 00 00 75
|
||||
03 E9 FE 00. Uses self-encryption.
|
||||
|
||||
This is the second version of the Datacrime virus. Differences
|
||||
between this version and the original Datacrime:
|
||||
|
||||
* EXE files are infected, COM files are not.
|
||||
|
||||
* Files grow by 1168 bytes, rather than 1280 bytes.
|
||||
|
||||
See the discussion of 1280/Datacrime above for major facts.
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
64
textfiles.com/virus/NCSA/ncsa049.txt
Normal file
64
textfiles.com/virus/NCSA/ncsa049.txt
Normal file
@@ -0,0 +1,64 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> Datacrime II (1514 variant) <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Synonyms: 1514 virus, Columbus Day.
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
Host Files: COM (including COMMAND.COM) and EXE files.
|
||||
|
||||
Increase in Size of Infected Files: 1514 bytes.
|
||||
|
||||
Nature of Damage: Corrupts program or overlay files. Formats part of
|
||||
hard disk on any date up to and including October 12, of any year, except
|
||||
Sunday.
|
||||
|
||||
Detected by: Scanv56+, F-Prot, IBM Scan, Pro-Scan.
|
||||
|
||||
Removed by: CleanUp, AntiCrim, Scan/D, or F-Prot.
|
||||
|
||||
Derived from: Datacrime.
|
||||
|
||||
Scan Code: Uses self-encryption. 5E 81 EE 03 01 83 FE 00 74 2A 2E 8A 94.
|
||||
You can also search at offset 022H for 2E 8A 07 2E C6 05 22 32 C2 D0.
|
||||
|
||||
The major differences between this version and its predecessor:
|
||||
|
||||
* the virus will add 1,514 bytes to infected files;
|
||||
|
||||
* both COM and EXE files are infected;
|
||||
|
||||
* the virus now uses self-encryption.
|
||||
|
||||
* the virus will not format disks on Mondays.
|
||||
|
||||
See the discussion of 1184 below.
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
58
textfiles.com/virus/NCSA/ncsa050.txt
Normal file
58
textfiles.com/virus/NCSA/ncsa050.txt
Normal file
@@ -0,0 +1,58 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> Datacrime II (1184 variant) <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Synonyms: 1184 virus.
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
Host Files: COM files.
|
||||
|
||||
OnScreen Symptoms: none.
|
||||
|
||||
Increase in Size of Infected Files: 1184 bytes.
|
||||
|
||||
Nature of Damage: Corrupts program or overlay files. Formats or erases
|
||||
all/part of disk.
|
||||
|
||||
Detected by: Scanv56+, F-Prot, IBM Scan, Pro-Scan.
|
||||
|
||||
Removed by: CleanUp, AntiCrim, Scan/D, F-Prot.
|
||||
|
||||
Derived from: DataCrime.
|
||||
|
||||
This version is encrypted, so the hex pattern is not visible, but the
|
||||
program can be detected by looking for COM files that are increased in
|
||||
size by 1184 bytes.
|
||||
|
||||
Datacrime 2 can be detected by running a good debugger and
|
||||
single-stepping to find the end of the encryption routine (10 or 20
|
||||
instructions with obvious XOR's and a branch condition in front).
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
63
textfiles.com/virus/NCSA/ncsa051.txt
Normal file
63
textfiles.com/virus/NCSA/ncsa051.txt
Normal file
@@ -0,0 +1,63 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> Datacrime II-B <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Synonyms: 1917 virus, Columbus Day
|
||||
|
||||
Date of Origin: November, 1989.
|
||||
|
||||
Place of Origin: Europe. Isolated by Jan Terpstra of the Netherlands.
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
Host Files: Non resident. Infects COMMAND.COM, EXE, COM files.
|
||||
|
||||
OnScreen Symptoms: none.
|
||||
|
||||
Increase in Size of Infected Files: 1917 bytes.
|
||||
|
||||
Nature of Damage: Corrupts program or overlay files. Also formats or
|
||||
erases part/all of the disk.
|
||||
|
||||
Detected by: Scanv51+, F-Prot.
|
||||
|
||||
Removed by: CleanUp, AntiCrim, Scan/D, F-Prot.
|
||||
|
||||
Derived from: Datacrime II.
|
||||
|
||||
Scan Code: encrypted.
|
||||
|
||||
Differences between this virus and the Datacrime II virus:
|
||||
|
||||
* Files increase in length by 1,917 bytes, rather than 1,184 bytes.
|
||||
|
||||
* The encryption method used by the virus to escape detection is
|
||||
different.
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
70
textfiles.com/virus/NCSA/ncsa052.txt
Normal file
70
textfiles.com/virus/NCSA/ncsa052.txt
Normal file
@@ -0,0 +1,70 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> dBASE Virus <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Synonyms: DBF virus
|
||||
|
||||
Place of Origin: New York.
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
Host Files: Remains resident. Infects COM files and overlay files. May
|
||||
infect EXE files.
|
||||
|
||||
Increase in Size of Infected Files: 1864 bytes.
|
||||
|
||||
Nature of Damage: Corrupts DBF files. Affects system run-time operation.
|
||||
Corrupts program or overlay files.
|
||||
|
||||
Detected by: Scanv47+, F-Prot, IBM Scan, Pro-Scan.
|
||||
|
||||
Removed by: CleanUp, Scan/D, or F-Prot.
|
||||
|
||||
Discovered by Ross Greenburg of New York, this is a memory resident
|
||||
.COM/.OVL virus, which attempts to infect the dBASE program. When an
|
||||
infected application is executed, the virus installs in memory, looking
|
||||
for an open operation on .DBF files. Any writes to this file have two
|
||||
bytes transposed at random. The virus keeps track of which files and
|
||||
bytes have been altered using a file called BUG.DAT in the same directory
|
||||
as the .DBF files. Reads of data are corrected by the resident portion of
|
||||
the virus, thus data appear correct. However, when BUG.DAT is 90 days
|
||||
old, the virus overwrites/nulls the root directory and FAT structures.
|
||||
If the DBF file can be recovered, it will be recovered with non-obvious
|
||||
errors.
|
||||
|
||||
After this virus has been detected, if you remove the infected DBase
|
||||
program and replace it with a clean copy, your DBF files that were opened
|
||||
during the period that you were infected will be useless since they are
|
||||
garbled on the disk even though they would be displayed as expected by
|
||||
the infected Dbase program. To avoid file damage, keep multiple backups,
|
||||
and keep hard copy of your transactions. Running a program such as
|
||||
Deskview will permit you to look in your dBASE directory for BUG.DAT
|
||||
during dBASE operations.
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
117
textfiles.com/virus/NCSA/ncsa053.txt
Normal file
117
textfiles.com/virus/NCSA/ncsa053.txt
Normal file
@@ -0,0 +1,117 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> Den Zuk <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Synonyms: Venezuelan, The Search.
|
||||
|
||||
Place of Origin: Indonesia?
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
Host Files: Remains resident. Infects floppy disk boot sector.
|
||||
|
||||
OnScreen Symptoms: a purple "DEN ZUK" graphic will appear after a
|
||||
CTRL-ALT-DEL is performed if the system has a CGA, EGA, or VGA monitor
|
||||
and an infected floppy in drive A:. The rather pretty graphic slides in
|
||||
from the sides of the screen.
|
||||
|
||||
Increase in Size of Infected Files: n/a.
|
||||
|
||||
Nature of Damage: Affects system run-time operation. Corrupts or
|
||||
overwrites boot sector of 360K floppies. The original causes no
|
||||
intentional damage. Some variations may reformat a floppy disk after a
|
||||
counter reaches a value of 5 to 10 (depending on the version.)
|
||||
|
||||
Detected by: Scanv56+, F-Prot, IBM Scan, Pro-Scan.
|
||||
|
||||
Removed by: MDisk, F-Prot, or the DOS SYS command.
|
||||
|
||||
Derived from: Ohio virus
|
||||
|
||||
Scan Code: FA 8C C8 8E D8 8E D0 BC 00 F0 FB B8 78 7C 50 C3. You can also
|
||||
search at 03EH for BB 90 7C 53 C3 B9 B0 7C 51 C3.
|
||||
|
||||
Den Zuk (translation: "The Search") was written as an anti-virus
|
||||
virus. Its target: Brain infections. When this virus finds a
|
||||
Brain-infected diskette, it removes Brain and puts a copy of itself in
|
||||
place. It also looks for old versions of itself and "upgrades" them if
|
||||
necessary. The virus resides on track 40 on diskettes (normally 360K
|
||||
diskettes only have tracks numbered 0-39), and thus takes up no usable
|
||||
space.
|
||||
|
||||
The virus was designed as a boot sector infector that infects 360KB 5
|
||||
1/4" floppies. It infects through any access to the host diskette. It can
|
||||
survive a warm reboot. It will infect data (non-system) diskettes, which
|
||||
in turn can pass on the infection if an accidental attempt to boot from
|
||||
the data disk occurs.
|
||||
|
||||
Den Zuk has a bug which causes it to attempt to infect 3.5"
|
||||
diskettes. This will overwrite the diskette's FAT and cause a read (or
|
||||
write) failure. It cannot infect a hard disk, and will not attempt to do
|
||||
so. If an infected system is rebooted from the hard disk, the virus will
|
||||
de-activate. This is not the case with rebooting from a clean floppy -
|
||||
which will become infected.
|
||||
|
||||
Den Zuk demonstrates what can (and will) go wrong with
|
||||
anti-virus-viruses. The programmer did not anticipate 1.2M or 3.5"
|
||||
diskettes. When the virus infects a disk of that type, it will destroy
|
||||
data. Also, several "hacked" versions of this virus have been reported:
|
||||
|
||||
* One variant will disable the SYS command and destroy all data on
|
||||
drive C: on (Friday) September 13, 1991.
|
||||
|
||||
* Another variant uses a counter which keeps track of how many times
|
||||
the system has been rebooted. When the limit is reached (usually 5 to
|
||||
10 reboots), the drive A: floppy is reformatted.
|
||||
|
||||
You may find the following text strings on infected disks:
|
||||
|
||||
Welcome to the
|
||||
|
||||
C l u b
|
||||
|
||||
<197>The HackerS<197>
|
||||
|
||||
Hackin'
|
||||
|
||||
All The Time
|
||||
|
||||
The HackerS
|
||||
|
||||
If the virus has successfully removed the Brain, the volume label of
|
||||
infected diskettes may be changed to "Y.C.1.E.R.P.". The Den Zuk virus
|
||||
will also remove an Ohio virus infection before infecting the diskette
|
||||
with Den Zuk, presumably because the Ohio is the first draft and a bit
|
||||
cruder than Den Zuk.
|
||||
|
||||
The Den Zuk virus was probably written by the same person as the Ohio
|
||||
virus: the "Y.C.1.E.R.P." string is found in the Ohio virus, and the
|
||||
viral code is similar in many respects.
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
70
textfiles.com/virus/NCSA/ncsa054.txt
Normal file
70
textfiles.com/virus/NCSA/ncsa054.txt
Normal file
@@ -0,0 +1,70 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> Devil's Dance <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Synonyms: Mexican virus
|
||||
|
||||
Date of Origin: December, 1989.
|
||||
|
||||
Place of Origin: Reported by Mau Fragoso of Mexico City.
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
Host Files: Remains resident, infects COM files.
|
||||
|
||||
OnScreen Symptoms: After a warm reboot, you will see the message "DID YOU
|
||||
EVER DANCE WITH THE DEVIL IN THE WEAK MOONLIGHT? PRAY FOR YOUR DISKS!!
|
||||
The Joker" Also, after your first 2,000 keystrokes, screen colors will
|
||||
begin to change.
|
||||
|
||||
Increase in Size of Infected Files: 941 bytes.
|
||||
|
||||
Nature of Damage: Corrupts data files, program or overlay files, affects
|
||||
system run-time operation, corrupts file linkage.
|
||||
|
||||
Detected by: Scanv52+.
|
||||
|
||||
Removed by: CleanUp, Scan/D, or delete infected files.
|
||||
|
||||
This virus will infect a file multiple times until the file becomes
|
||||
too large to fit in available memory. Once an infected program has been
|
||||
run, any subsequent warm boot (CTRL-ALT-DEL) will result in the message
|
||||
noted above.
|
||||
|
||||
The Devil's Dance virus is destructive.
|
||||
|
||||
* After the first 2,000 keystrokes, the virus starts changing the
|
||||
colors of text displayed on the monitor.
|
||||
|
||||
* After the first 5,000 keystrokes, the virus erases the first copy of
|
||||
the FAT. At this point, whenever the system is rebooted, it will
|
||||
display the message above, destroy the first copy of the FAT, then
|
||||
proceed with the boot process.
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
101
textfiles.com/virus/NCSA/ncsa055.txt
Normal file
101
textfiles.com/virus/NCSA/ncsa055.txt
Normal file
@@ -0,0 +1,101 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> Disk Killer <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Synonyms: Ogre, Disk Ogre, Computer Ogre.
|
||||
|
||||
Date of Origin: Spring, 1989.
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
Host Files: Remains resident. Infects both floppy and hard disk boot
|
||||
sectors.
|
||||
|
||||
Increase in Size of Infected Files: n/a.
|
||||
|
||||
Nature of Damage: Corrupts or overwrites boot sector. Affects system
|
||||
run-time operation. Corrupts program or overlay files. Corrupts data
|
||||
files. Formats or erases all/part of disk.
|
||||
|
||||
Detected by: Scanv39+, F-Prot, IBM Scan, Pro-Scan.
|
||||
|
||||
Removed by: MDISK, CleanUp, F-Prot, or DOS COPY and SYS commands.
|
||||
|
||||
The Disk Killer is a boot sector virus that infects both hard disks
|
||||
and floppies.
|
||||
|
||||
The first organization to report this virus was Birchwood systems in
|
||||
San Jose in early Summer, 1989. Additional reports were received from
|
||||
Washington, Oklahoma, Minnesota and Arizona. It was finally isolated at
|
||||
Wedge Systems in Milpitas, California. Disk Killer was isolated on
|
||||
September 26, 1989.
|
||||
|
||||
The virus spreads by writing copies of itself to three unused
|
||||
clusters on either a floppy or hard disk, marking them as "bad" in the
|
||||
FAT to prevent overwriting. The boot sector is modified to execute the
|
||||
virus code during the boot, permitting it to infect any new disks exposed
|
||||
to the system.
|
||||
|
||||
The virus counts the number of disks it has infected and does no harm
|
||||
until it has reached a predetermined limit. When the limit is reached or
|
||||
exceeded and the system is rebooted, this message is displayed:
|
||||
|
||||
"Disk Killer <197> Version 1.00 by COMPUTER OGRE. Don't turn off the
|
||||
power or remove the diskettes while Disk Killer is processing! ...
|
||||
PROCESSING ... Now you can turn off the power. I wish you luck."
|
||||
|
||||
During "processing", it writes clusters of a single character
|
||||
randomly all over the disk, effectively trashing it.
|
||||
|
||||
Note that when the message is displayed, if the system is turned off
|
||||
immediately it may be possible to salvage some files on the disk using
|
||||
various utility programs, as this virus first destroys the boot sector,
|
||||
FATs, and root directory.
|
||||
|
||||
The internal messages do not appear in sector zero, but are stored in
|
||||
sector 152 on floppy disks and an as yet undetermined location on hard
|
||||
disks. This had always added to the confusion over the virus because
|
||||
message remnants were sometimes discovered in the middle of executable
|
||||
files, and it was assumed that the virus was a COM or EXE infector.
|
||||
|
||||
If your boot sector does not contain the standard DOS error messages,
|
||||
then immediately power down and clean out the boot. Infected boot
|
||||
sectors begin with FAEB. You can check boot sectors with a tool such as
|
||||
Norton's NU. If the DOS messages are not there (non-system disk; etc.),
|
||||
then the system is infected. MDISK will remove the virus.
|
||||
|
||||
Disk Killer can be removed by using MDisk, or the DOS SYS command, to
|
||||
overwrite the boot sector on your hard disk or bootable floppies. On
|
||||
non-system floppies, files can be copied to non-infected floppies,
|
||||
followed by reformatting the infected floppies. Be sure to turn the
|
||||
system off, then reboot the system from a write-protected master
|
||||
diskette before attempting to remove the virus, or you will be
|
||||
reinfected by the virus in memory.
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
73
textfiles.com/virus/NCSA/ncsa056.txt
Normal file
73
textfiles.com/virus/NCSA/ncsa056.txt
Normal file
@@ -0,0 +1,73 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> Do Nothing Virus <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Synonyms: Stupid virus
|
||||
|
||||
Date of Origin: October, 1989.
|
||||
|
||||
Place of Origin: Israel.
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
Host Files: Resident. Infects COM files.
|
||||
|
||||
Increase in Size of Infected Files: 608 bytes.
|
||||
|
||||
Nature of Damage: Corrupts program files. Does no apparent damage.
|
||||
|
||||
Detected by: Scanv49+, F-Prot, Pro-Scan.
|
||||
|
||||
Removed by: CleanUp, Scan/D, or F-Prot.
|
||||
|
||||
This virus was first reported in October, 1989 by Uval Tal in Israel.
|
||||
It infects the first COM file in the current directory, and will
|
||||
re-infect it again and again. It infects no other files, and causes no
|
||||
other damage.
|
||||
|
||||
It has been called the "stupid" virus because it is so ineffectual
|
||||
compared to other viruses. For instance:
|
||||
|
||||
* It always installs in memory in the same location, at address
|
||||
9800:100H
|
||||
|
||||
* Any program which attempts to use this memory location destroys the
|
||||
memory-resident copy of the virus.
|
||||
|
||||
* It can only infect systems with 640K of memory.
|
||||
|
||||
* It can not reach across directories.
|
||||
|
||||
* It cannot determine if the file it is infecting has previously been
|
||||
infected.
|
||||
|
||||
* It does no apparent damage to anything but the first COM file in a
|
||||
directory.
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
54
textfiles.com/virus/NCSA/ncsa057.txt
Normal file
54
textfiles.com/virus/NCSA/ncsa057.txt
Normal file
@@ -0,0 +1,54 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> EDV <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Date of Origin: January, 1990.
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
Host Files: Remains resident. Infects boot sector of both floppies and
|
||||
hard disks, and infects hard disk partition tables.
|
||||
|
||||
Increase in Size of Infected Files: n/a
|
||||
|
||||
Nature of Damage: Corrupts or overwrites boot sector. Affects system
|
||||
run-time operation.
|
||||
|
||||
Detected by: Scanv58+, IBM Scan.
|
||||
|
||||
Removed by: MDisk/P.
|
||||
|
||||
Scan Code: "MSDOS Vers. E.D.V." appears at the end of the boot sector on
|
||||
infected floppies.
|
||||
|
||||
The EDV virus was first reported by David Chess at IBM. It is a boot
|
||||
sector and partition table virus. Troublesome, it causes program crashes
|
||||
and some data destruction.
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
52
textfiles.com/virus/NCSA/ncsa058.txt
Normal file
52
textfiles.com/virus/NCSA/ncsa058.txt
Normal file
@@ -0,0 +1,52 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> Eight Tunes Virus <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Synonyms: 1971 virus
|
||||
|
||||
Date of Origin: January, 1990.
|
||||
|
||||
Place of Origin: Germany.
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
Host Files: Remains resident. Infects COM and EXE files.
|
||||
|
||||
OnScreen Symptoms: Plays one of eight German folk songs on the speaker.
|
||||
|
||||
Increase in Size of Infected Files: 1,975 bytes increase (about).
|
||||
|
||||
Nature of Damage: Corrupts COM and EXE files. Affects system run-time
|
||||
operation. Contains no destructive code.
|
||||
|
||||
Detected by: Scanv62+.
|
||||
|
||||
Scan Code:
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
46
textfiles.com/virus/NCSA/ncsa060.txt
Normal file
46
textfiles.com/virus/NCSA/ncsa060.txt
Normal file
@@ -0,0 +1,46 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> Friday 13th-B <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
Host Files: COM files.
|
||||
|
||||
Nature of Damage: Corrupts COM files.
|
||||
|
||||
Derived from: Friday 13th.
|
||||
|
||||
This virus is identical to the original except that it infects every
|
||||
file in the current subdirectory. It will also infect every COM file in
|
||||
the system path if the infected COM program is in the path. The only way
|
||||
this virus can spread beyond the current subdirectory is if an infected
|
||||
program ends up in the system PATH. Then every COM file in the currently
|
||||
selected subdirectory will get infected.
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
44
textfiles.com/virus/NCSA/ncsa061.txt
Normal file
44
textfiles.com/virus/NCSA/ncsa061.txt
Normal file
@@ -0,0 +1,44 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> Friday 13th-C <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
OnScreen Symptoms: The message "We hope we haven't inconvenienced you"
|
||||
appears upon activation.
|
||||
|
||||
Nature of Damage: Corrupts COM files.
|
||||
|
||||
Derived from: Friday 13th-B.
|
||||
|
||||
This is the Friday the 13th-B except a message has been added that
|
||||
displays - "We hope we haven't inconvenienced you" appears whenever
|
||||
the virus activates.
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
92
textfiles.com/virus/NCSA/ncsa062.txt
Normal file
92
textfiles.com/virus/NCSA/ncsa062.txt
Normal file
@@ -0,0 +1,92 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> Fu Manchu <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Synonyms: 2080, 2086
|
||||
|
||||
Date of Origin: March 10, 1988.
|
||||
|
||||
Place of Origin: written by Sax Rohmer.
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
Host Files: Remains resident. Infects COM, EXE, overlay files.
|
||||
|
||||
OnScreen Symptoms: You may see the message "You will hear from me again!"
|
||||
|
||||
Increase in Size of Infected Files: 2086 bytes for COM files, 2080 bytes
|
||||
for EXE files.
|
||||
|
||||
Nature of Damage: Affects system run-time operation. Corrupts COM and
|
||||
EXE files. Some versions corrupt overlay, SYS, and BIN files.
|
||||
|
||||
Detected by: Scanv56+, F-Prot, IBM Scan, Pro-Scan.
|
||||
|
||||
Removed by: CleanUp, Scan/D, or F-Prot.
|
||||
|
||||
Derived from: Jerusalem.
|
||||
|
||||
Scan Code: encrypted. You may be able to find the marker "sAXrEMHOr" in
|
||||
infected files. You can also search at offset 1EEH for FC B4 E1 CD 21 80
|
||||
FC E1 73 16.
|
||||
|
||||
The virus occurs attached to the beginning of a COM file, or the end
|
||||
of an EXE file. It is a rewritten ("improved") version of the Jerusalem
|
||||
virus, and most of what is said for that virus applies here with the
|
||||
following changes:
|
||||
|
||||
* The code to delete programs, slow down the machine, and display the
|
||||
black window has been removed, as has the dead area at the end of the
|
||||
virus and some sections of unused code.
|
||||
|
||||
* The marker is now 'rEMHOr' (six bytes), and the preceeding 'sU' is
|
||||
now 'sAX' (Sax Rohmer - creator of Fu Manchu).
|
||||
|
||||
* COM files now increase in length by 2086 bytes & EXE files 2080
|
||||
bytes. EXE files are now only infected once.
|
||||
|
||||
* One in sixteen times on infection a timer is installed which runs for
|
||||
a random number of half-hours (maximum 7.5 hours). At the end of this
|
||||
time the message "The world will hear from me again!" is displayed in
|
||||
the center of the screen and the machine reboots. This message is
|
||||
also displayed every time Ctrl-Alt-Del is pressed on an infected
|
||||
machine, but the virus does not survive the reboot.
|
||||
|
||||
* There is further code which activates on or after the first of August
|
||||
1989. This monitors the keyboard buffer, and makes derogatory
|
||||
additions to the names of politicians (Thatcher, Reagan, Botha &
|
||||
Waldheim), censors out two four-letter words, and to "Fu Manchu" adds
|
||||
"virus 3/10/88 - latest in the new fun line!" All these additions go
|
||||
into the keyboard buffer, so their effect is not restricted to the
|
||||
monitor. All messages are encrypted.
|
||||
|
||||
Some versions of this virus can infect overlay, SYS, and BIN files.
|
||||
It is still rare in the U.S.
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
61
textfiles.com/virus/NCSA/ncsa063.txt
Normal file
61
textfiles.com/virus/NCSA/ncsa063.txt
Normal file
@@ -0,0 +1,61 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> Ghost Virus (boot version) <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Synonyms: Ghostballs
|
||||
|
||||
Date of Origin: September, 1989.
|
||||
|
||||
Place of Origin: Iceland.
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
Host Files: hard disk and floppy disk boot sectors.
|
||||
|
||||
Increase in Size of Infected Files: n/a.
|
||||
|
||||
Nature of Damage: Corrupts or overwrites boot sector.
|
||||
|
||||
Detected by: Scanv46+, F-Prot.
|
||||
|
||||
Removed by: CleanUp, MDisk, F-Prot, or use the DOS SYS command.
|
||||
|
||||
This virus was discovered in September, 1989 by Fridrik Skulason at
|
||||
Icelandic University. The virus infects the boot sectors of hard disks
|
||||
and floppies. The virus replaces the boot sector of infected systems
|
||||
with a boot virus similar to Ping Pong. Random file corruption by this
|
||||
virus has been reported.
|
||||
|
||||
The Ghost Boot virus is usually discovered along with the Ghost COM
|
||||
virus. If you disinfect the boot sector to get rid of the Boot virus,
|
||||
unless you also remove the COM virus, your boot sectors will again have
|
||||
the Ghost Boot virus. It appears that the two viruses assist in the
|
||||
propagation of each other.
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
67
textfiles.com/virus/NCSA/ncsa064.txt
Normal file
67
textfiles.com/virus/NCSA/ncsa064.txt
Normal file
@@ -0,0 +1,67 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> Ghost Virus (COM version) <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Synonyms: Ghostballs.
|
||||
|
||||
Date of Origin: September, 1989.
|
||||
|
||||
Place of Origin: Iceland.
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
Host Files: COM files.
|
||||
|
||||
Increase in Size of Infected Files: 2351 bytes.
|
||||
|
||||
Nature of Damage: Corrupts or overwrites boot sector; corrupts COM
|
||||
files.
|
||||
|
||||
Detected by: Scanv46+, F-Prot, IBM Scan, Pro-Scan.
|
||||
|
||||
Removed by: MDisk or DOS SYS command (accompanied by erasing infected
|
||||
COM files), or use CleanUp or F-Prot.
|
||||
|
||||
The Ghost viruses (both boot and COM) were discovered at Icelandic
|
||||
University by Fridrik Skulason. The Ghost COM virus infects generic COM
|
||||
files, increasing the file size by 2,351 bytes.
|
||||
|
||||
Symptoms of this virus are very similar to the Ping Pong virus, and
|
||||
random file corruption may occur on infected systems.
|
||||
|
||||
The Ghost COM virus may be the first virus to infect both files (COM
|
||||
files in this case) and boot sectors. After the boot sector is infected,
|
||||
it also acts as a virus (see Ghost BOOT virus).
|
||||
|
||||
To remove this virus, turn off the computer and reboot from a
|
||||
write-protected disk. Then use MDisk, NDD, or the DOS SYS command to
|
||||
replace the boot sector on the infected disk. Any infected .COM files
|
||||
must also be replaced with clean copies.
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
60
textfiles.com/virus/NCSA/ncsa065.txt
Normal file
60
textfiles.com/virus/NCSA/ncsa065.txt
Normal file
@@ -0,0 +1,60 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> Golden Gate Virus <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Synonyms: the 500 Virus, Mazatlan.
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
Host Files: boot sector.
|
||||
|
||||
Increase in Size of Infected Files: n/a
|
||||
|
||||
Nature of Damage: Infects boot sector of floppies, may eventually
|
||||
reformat the hard disk.
|
||||
|
||||
Detected by: ScanV60+. (Identifies it as the Alameda).
|
||||
|
||||
Removed by: MDisk, F-Prot, or the DOS SYS command.
|
||||
|
||||
Derived from: Alameda.
|
||||
|
||||
This is the Alameda or SF Virus that has been modified to format the
|
||||
C: drive when the counter runs out. The activation occurs after 500
|
||||
infections, instead of 100 infections. Note that in all three of these
|
||||
strains, the counter is zeroed on the host diskette at infection time.
|
||||
Thus, the activation period on this virus will on the average stretch
|
||||
into many years. No corruption will occur until 500 new diskettes have
|
||||
been infected from within a given machine. Since the infection can only
|
||||
occur when the system is booted with a new diskette, infection is not
|
||||
frequent with this virus. The majority of infections will probably never
|
||||
activate. The IBM PC will have long since been supplanted by another
|
||||
architecture in most environments.
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
45
textfiles.com/virus/NCSA/ncsa066.txt
Normal file
45
textfiles.com/virus/NCSA/ncsa066.txt
Normal file
@@ -0,0 +1,45 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> Golden Gate-B <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
Host Files: infects the boot sector of floppy disks.
|
||||
|
||||
Increase in Size of Infected Files: n/a.
|
||||
|
||||
Nature of Damage: May only infect floppies. May do no other damage.
|
||||
|
||||
Derived from: Golden Gate virus.
|
||||
|
||||
This virus is the Golden Gate virus that has had the activation delay
|
||||
reset to 30 infections. This virus should activate within a couple of
|
||||
years in most environments.
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
50
textfiles.com/virus/NCSA/ncsa067.txt
Normal file
50
textfiles.com/virus/NCSA/ncsa067.txt
Normal file
@@ -0,0 +1,50 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> Golden Gate-C <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Synonyms: Mazatlan virus.
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
Host Files: boot sector of floppies and hard disk.
|
||||
|
||||
Increase in Size of Infected Files: n/a.
|
||||
|
||||
Nature of Damage: infects both floppies and hard disks. May reformat
|
||||
hard disks.
|
||||
|
||||
Derived from: Golden Gate-B virus.
|
||||
|
||||
This virus is the Golden Gate virus that is able to infect a hard
|
||||
disk. It is a nasty virus, since it has more of an opportunity to do
|
||||
damage than previous versions. Prior versions were limited since systems
|
||||
with hard disks are only infrequently booted from floppy and booting
|
||||
from the hard disk overwrote earlier versions.
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
38
textfiles.com/virus/NCSA/ncsa068.txt
Normal file
38
textfiles.com/virus/NCSA/ncsa068.txt
Normal file
@@ -0,0 +1,38 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> Golden Gate-D <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
Derived from: Golden Gate-C.
|
||||
|
||||
This virus is identical to Golden Gate-C, except the counter has been
|
||||
disabled (similar to original Alameda).
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
54
textfiles.com/virus/NCSA/ncsa069.txt
Normal file
54
textfiles.com/virus/NCSA/ncsa069.txt
Normal file
@@ -0,0 +1,54 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> Halloechen Virus <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Place of Origin: West Germany
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
Host Files: COM and EXE files. Memory resident.
|
||||
|
||||
OnScreen Symptoms: keyboard input will appear garbled.
|
||||
|
||||
Increase in Size of Infected Files: 2,011 bytes.
|
||||
|
||||
Detected by: Scanv57+.
|
||||
|
||||
Removed by: delete infected files or run Scan/D.
|
||||
|
||||
First reported by Christoff Fischer of the University of Karlsruhe,
|
||||
West Germany. It is now widespread in West Germany.
|
||||
|
||||
When an infected program is run, Halloechen installs in memory. From
|
||||
memory, it infects any EXE or COM which is run, providing the program is
|
||||
less than about 62K in size, and has a file date outside the current
|
||||
system date's month. During the infection, the file's size is increased
|
||||
to a multiple of 16, then the 2,011 bytes of virus code are added to it.
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
57
textfiles.com/virus/NCSA/ncsa070.txt
Normal file
57
textfiles.com/virus/NCSA/ncsa070.txt
Normal file
@@ -0,0 +1,57 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> Holland Girl <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Synonyms: 1332 virus, Sylvia.
|
||||
|
||||
Place of Origin: the Netherlands.
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
Host Files: COM files. Remains resident.
|
||||
|
||||
Increase in Size of Infected Files: 1332 bytes.
|
||||
|
||||
Nature of Damage: Corrupts program or overlay files.
|
||||
|
||||
Detected by: Scanv50+, F-Prot, IBM Scan, Pro-Scan.
|
||||
|
||||
Removed by: CleanUp, F-Prot, or Scan/D.
|
||||
|
||||
This virus was first reported by Jan Terpstra in the Netherlands. It
|
||||
infects COM files (but not COMMAND.COM), increasing their size by 1332
|
||||
bytes.
|
||||
|
||||
It contains the name, address, and phone number of a Dutch woman
|
||||
named Sylvia, and requests that post cards be sent to her. It may have
|
||||
been written by an ex-boyfriend.
|
||||
|
||||
Potential damage from this virus is not yet known.
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
82
textfiles.com/virus/NCSA/ncsa071.txt
Normal file
82
textfiles.com/virus/NCSA/ncsa071.txt
Normal file
@@ -0,0 +1,82 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> Icelandic 1 <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Synonyms: Saratoga 1, Icelandic, One in Ten, Disk Crunching Virus.
|
||||
|
||||
Date of Origin: June, 1989.
|
||||
|
||||
Place of Origin: Iceland.
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
Host Files: Remains resident. Infects EXE files.
|
||||
|
||||
Increase in Size of Infected Files: 642 bytes. A variant adds 656 bytes.
|
||||
Another grows by 671 bytes. File lengths after infection are divisible
|
||||
by 16.
|
||||
|
||||
Nature of Damage: Affects system run-time operation. Corrupts program
|
||||
files.
|
||||
|
||||
Detected by: Scanv56+, F-Prot, Pro-Scan.
|
||||
|
||||
Removed by: CleanUp, Scan/D, or F-Prot.
|
||||
|
||||
Scan Code: Infected files always end with 44 18 5F 19. You can also
|
||||
search at offset 0C6H for 2E C6 06 87 02 0A 90 50 53 51.
|
||||
|
||||
The Icelandic virus was first detected in June, 1989, disassembled a
|
||||
week later, and the disassembly was made available around the beginning
|
||||
of July. The basic Icelandic virus is a resident EXE-file infector that
|
||||
infects every second EXE file executed, and sometimes will mark a free
|
||||
cluster on a hard disk as bad (the "damage" routine).
|
||||
|
||||
The Icelandic virus will copy itself to the top of free memory the
|
||||
first time an infected program is executed. Once in high memory, it hides
|
||||
from memory mapping programs. If a program later tries to write to this
|
||||
area of memory, the computer will crash. If the virus finds that some
|
||||
other program has "hooked" Interrupt 13, it will not proceed to infect
|
||||
programs. If Interrupt 13 has not been "hooked", it will attempt to
|
||||
infect every 10th program executed.
|
||||
|
||||
The virus attaches itself to the end of the programs it infects, and
|
||||
infected files will always end with "4418,5F19"H.
|
||||
|
||||
On systems with 12-bit FATs (floppy drives or 10 MB hard disks), the
|
||||
virus will not cause any damage. However, on systems with 16-bit FATs
|
||||
(hard disks larger than 10 MB), the virus will select one unused FAT
|
||||
entry and mark the entry as a bad sector each time it infects a program.
|
||||
|
||||
It is likely that as of this writing, the virus has not been detected
|
||||
outside of Iceland. Several variants are known, including Saratoga 2,
|
||||
Icelandic Virus Version 2, and MIX1. See also the table.<Note: Prepared
|
||||
by Y. Radai, Hebrew University of Jerusalem.><$&3 Icelandic>
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
73
textfiles.com/virus/NCSA/ncsa072.txt
Normal file
73
textfiles.com/virus/NCSA/ncsa072.txt
Normal file
@@ -0,0 +1,73 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> Icelandic Virus Version 2 <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Synonyms: System Virus, One in Ten virus
|
||||
|
||||
Date of Origin: July, 1989.
|
||||
|
||||
Place of Origin: Iceland.
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
Host Files: Remains resident. Infects EXE files.
|
||||
|
||||
Increase in Size of Infected Files: 632 or 661 bytes.
|
||||
|
||||
Nature of Damage: Affects system run-time operation. Corrupts program or
|
||||
overlay files.
|
||||
|
||||
Detected by: Scanv56+, F-Prot, IBM Scan, Pro-Scan.
|
||||
|
||||
Removed by: CleanUp, Scan/D, or F-Prot.
|
||||
|
||||
Derived from: Icelandic virus.
|
||||
|
||||
Scan Code: You can search at offset 0B8H for 2E C6 06 79 02 02 90 50 53
|
||||
51.
|
||||
|
||||
This version of the Icelandic virus differs from the Icelandic in
|
||||
that it bypasses INT21 and doesn't have the code to mark a cluster bad.
|
||||
It doesn't have the INT13 check that the second version does.
|
||||
|
||||
Each time the Icelandic-II virus infects a program, it will modify
|
||||
the file's date, thus making it fairly obvious that the program has been
|
||||
changed. The virus will also remove the read-only attribute from files,
|
||||
but does not restore it after infecting the program.
|
||||
|
||||
The Icelandic-II virus can infect programs even if the system is
|
||||
running an anti-viral TSR that monitors interrupt 21, such as FluShot+.
|
||||
|
||||
On hard disks larger than 10 MB, there are no bad sectors marked in
|
||||
the FAT as there is with the Icelandic virus.
|
||||
|
||||
Although this version has been called version 2, it may actually have
|
||||
been the first released draft, and the Icelandic 1 may be the second.
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
69
textfiles.com/virus/NCSA/ncsa073.txt
Normal file
69
textfiles.com/virus/NCSA/ncsa073.txt
Normal file
@@ -0,0 +1,69 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> Icelandic Virus Version 3 <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Synonyms: December 24th virus
|
||||
|
||||
Date of Origin: December, 1989.
|
||||
|
||||
Place of Origin: Iceland.
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
Host Files: Remains resident. Infects EXE files.
|
||||
|
||||
OnScreen Symptoms: The message "Gledelig jol" may appear on December 24.
|
||||
|
||||
Increase in Size of Infected Files: 843, 853, or 863 bytes.
|
||||
|
||||
Nature of Damage: Affects system run-time operation. Corrupts program
|
||||
files.
|
||||
|
||||
Detected by: Scanv57+, F-Prot, IBM Scan, Pro-Scan.
|
||||
|
||||
Removed by: CleanUp, Scan/D, or F-Prot, or delete infected files.
|
||||
|
||||
Derived from: Icelandic virus.
|
||||
|
||||
Scan Code: May be identified by the last four bytes of an infected
|
||||
program, "1844,195F"H -- a reversal of the ID of Icelandic I and II. You
|
||||
can also search at offset 106H for 2E C6 06 6F 02 0A 90 50 53 51.
|
||||
|
||||
The Icelandic-III virus is very similar to the Icelandic Virus, from
|
||||
which it was adapted. There are minor changes including the addition of
|
||||
several NOP instructions.
|
||||
|
||||
This virus will not infect any program previously infected by
|
||||
Icelandic or Icelandic-II.
|
||||
|
||||
If an infected program is run on December 24th of any year, programs
|
||||
subsequently run will be stopped, later displaying the message "Gledileg
|
||||
jol" ("Merry Christmas" in Icelandic) instead.
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
41
textfiles.com/virus/NCSA/ncsa074.txt
Normal file
41
textfiles.com/virus/NCSA/ncsa074.txt
Normal file
@@ -0,0 +1,41 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> IRQ Ver 41.0 Virus <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
The IRQ virus attacks the file C:dir as well as the first executable
|
||||
file that it finds listed in your startup-sequence files. It is to your
|
||||
advantage to check all your disks startup files and the first executable
|
||||
file referenced once infected with the IRQ virus.
|
||||
|
||||
KV (KillVirus) will detect the IRQ Ver 41.0 virus in an executable file
|
||||
and remove the virus from the file.
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
87
textfiles.com/virus/NCSA/ncsa075.txt
Normal file
87
textfiles.com/virus/NCSA/ncsa075.txt
Normal file
@@ -0,0 +1,87 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> Italian Virus <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Synonyms: Bouncing Ball, Vera Cruz, Ping-Pong, Bouncing Dot, Missouri
|
||||
virus.
|
||||
|
||||
Date of Origin: March, 1988.
|
||||
|
||||
Host Machine: PC compatibles. Original version won't infect 80286 or
|
||||
80386 computers or hard disks.
|
||||
|
||||
Host Files: Remains resident. Infects boot sector on any disk with at
|
||||
least two sectors per cluster.
|
||||
|
||||
OnScreen Symptoms: A bouncing ball or dot may appear on the screen upon
|
||||
activation.
|
||||
|
||||
Increase in Size of Infected Files: n/a.
|
||||
|
||||
Nature of Damage: Affects system run-time operation. Corrupts or
|
||||
overwrites boot sector. Does no apparent damage.
|
||||
|
||||
Detected by: Scanv56+, F-Prot, IBM Scan.
|
||||
|
||||
Removed by: CleanUp, MDisk, F-Prot, or DOS SYS command.
|
||||
|
||||
Scan Code: 8E D8 A1 13 04 2D 02 00 A3 13 04 B1 06 D3 E0 2D C0 07 8E C0 BE
|
||||
00 7C 8B FE B9 00. You can also search at offset 07CH for C7 06 4C 00 D0
|
||||
7C 8C 0E 4E 00.
|
||||
|
||||
Description of Operation: This is a boot sector virus. Some forms infect
|
||||
only floppies, others will also infect the boot sector of hard disks.
|
||||
This virus consists of a boot sector and 1 cluster (2 sectors used)
|
||||
marked as bad in the first copy of the FAT. The first of these sectors
|
||||
contains the rest of the virus, and the second contains the original boot
|
||||
sector. It infects all disks which have at least two sectors per
|
||||
cluster, and it occupies 2K of memory.
|
||||
|
||||
When this virus activates (randomly) a bouncing dot/bouncing diamond
|
||||
(ASCII 4) /bouncing smiley face (ASCII 2)<Note: Depends on the strain
|
||||
which is running. There are at least three strains.> appears on the
|
||||
screen and can only be removed through reboot. The virus can be triggered
|
||||
by a disk access, should one occur during a one second window that occurs
|
||||
about every half hour. When triggered, the dot bounces off the edges of
|
||||
the screen, and passes through any text, with replacement after it.
|
||||
Sometime, this doesn't work properly, the bouncing character interacts
|
||||
with the characters on the screen, and screen displays are messed up.
|
||||
Infected diskettes have 1K in bad sectors, infected hard disks have 2K
|
||||
(and other numbers of bad sectors are possible). No known intentional
|
||||
damage. Unintentional damage - the two copies of the FAT are left
|
||||
different; DOS might not like this. Attempts to infect diskettes slows
|
||||
them down, and some computers won't read floppies, due to time-outs. No
|
||||
other damage is done.
|
||||
|
||||
Recovery: Recover by powering down the system, and then using a
|
||||
write-protected DOS disk to boot. Use the SYS command from the floppy to
|
||||
attempt to re-create a good boot sector. Alternatively, use the program
|
||||
MD.
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
71
textfiles.com/virus/NCSA/ncsa076.txt
Normal file
71
textfiles.com/virus/NCSA/ncsa076.txt
Normal file
@@ -0,0 +1,71 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> Italian-B <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Synonyms: Bouncing Ball, Vera Cruz, Ping-Pong-B, Bouncing Dot.
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
Host Files: Remains resident. Infects floppy and hard disk boot sectors.
|
||||
(The original infected only floppy disks).
|
||||
|
||||
Increase in Size of Infected Files: n/a.
|
||||
|
||||
Nature of Damage: Affects system run-time operation. Corrupts program or
|
||||
overlay files.
|
||||
|
||||
Detected by: Scanv56+, F-Prot, IBM Scan, Pro-Scan.
|
||||
|
||||
Removed by: CleanUp, MDisk, F-Prot, or DOS SYS command.
|
||||
|
||||
Derived from: Italian.
|
||||
|
||||
This is a variation of Italian that is able to infect hard disks.
|
||||
|
||||
Some of the characteristics are:
|
||||
|
||||
* Fairly long time before activation (a number of minutes at least)
|
||||
|
||||
* It displays a ball character, not the Diamond Character
|
||||
|
||||
* Once activated, the ball bounces around the screen until the system
|
||||
is shut off.
|
||||
|
||||
* Formatted system & non-system disks are infected and have the one bad
|
||||
spot created by the virus.
|
||||
|
||||
* When a user attempts to format the hard disk, format scans the disk OK
|
||||
and then reports that track 0 is bad.
|
||||
|
||||
* Formatted system floppy disks tend to lock up the PC on boot, and warm
|
||||
reboot doesn't work.
|
||||
|
||||
* The main problem is re-infection and spreading to other machines.
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
58
textfiles.com/virus/NCSA/ncsa077.txt
Normal file
58
textfiles.com/virus/NCSA/ncsa077.txt
Normal file
@@ -0,0 +1,58 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> ItaVir <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Synonyms: 3880 virus
|
||||
|
||||
Date of Origin: March, 1990.
|
||||
|
||||
Place of Origin: Milan, Italy.
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
Host Files: EXE files. Non-resident.
|
||||
|
||||
Increase in Size of Infected Files: 3,880 bytes
|
||||
|
||||
Detected by: Scan v.60+.
|
||||
|
||||
Removed by: Scan/D, or delete whatever is infected.
|
||||
|
||||
Recognition of this virus is straightforward. EXE files will grow in
|
||||
length by 3,880 bytes, and a file named ?OMMAND.COM (where ? is a non-
|
||||
printing character) will be found on the disk. This file contains the
|
||||
virus, and is used as a source of the code during infection.
|
||||
|
||||
Itavir won't activate until it has been in the system for 24 hours or
|
||||
more. Upon activation, it corrupts the boot sector, so that the system
|
||||
will not boot after power down. A message (in Italian) is displayed, and
|
||||
ASCII codes 0-255 are sent to all ports. Some monitors will flicker or
|
||||
(if VGA) will hiss when this occurs.
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
170
textfiles.com/virus/NCSA/ncsa078.txt
Normal file
170
textfiles.com/virus/NCSA/ncsa078.txt
Normal file
@@ -0,0 +1,170 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> Jerusalem Virus <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Synonyms: Israeli, Friday the 13th, Black Hole, Black Box, PLO, 1808
|
||||
(EXE), 1813 (COM), sUMsDos, Russian.
|
||||
|
||||
Date of Origin: December 24, 1987 (date first detected in Israel).
|
||||
|
||||
Place of Origin: Israel.
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
Host Files: Remains resident. Infects COM, EXE, overlay files.
|
||||
|
||||
Increase in Size of Infected Files: 1808 bytes for EXE files (usually),
|
||||
1813 bytes for COM files.
|
||||
|
||||
Nature of Damage: Affects system run-time operation. Corrupts program or
|
||||
overlay files.
|
||||
|
||||
Detected by: Scanv56+, F-Prot, IBM Scan, Pro-Scan.
|
||||
|
||||
Removed by: CleanUp, UNVIRUS, IMMUNE, M-J, Scan/D/A, Saturday, F-Prot.
|
||||
|
||||
Derived from: Suriv03
|
||||
|
||||
Scan Code: 8E D0 BC 00 07 50 B8 C5 00 50 CB FC 06 2E 8C 06 31 00 2E 8C 06
|
||||
39 00 2E 8C 06 3D 00 2E 8C 06 41 00 8C C0. You can also search at offset
|
||||
095H for FC B4 E0 CD 21 80 FC E0 73 16.
|
||||
|
||||
History: The Jerusalem virus was first discovered at the Hebrew
|
||||
University in Jerusalem on December 24, 1987, and reported to the virus
|
||||
research community by Y. Radai of the Hebrew University of Jerusalem. My
|
||||
personal suspicion is that the virus was written by a Palestinian, or
|
||||
other enemy of Israel, and planted within Israel. Israel was declared an
|
||||
independent state on May 14, 1948. Friday, May 13, 1988 would have been
|
||||
40 years in which Palestine was no longer sovereign. Although it was
|
||||
detected in late 1987, it contained code to prevent it from going off
|
||||
until May 13, 1988. Other viruses set to go off on Friday the 13th are
|
||||
likely copy-cats, whose authors simply thought that Friday the 13th was
|
||||
unlucky, wanted a trigger date, and thought this would do fine.
|
||||
|
||||
Operation: This virus is a memory resident infector. Any "clean
|
||||
program" run after an infected program is run will become infected. Both
|
||||
COM and EXE files are infected. The virus occurs attached to the
|
||||
beginning of a COM file, or the end of an EXE file. A COM file also has
|
||||
the five-byte marker attached to the end. This marker is usually (but
|
||||
not always) "MsDos", and is preceeded in the virus by "sU". "sUMsDos" is
|
||||
not usually found in newer varieties of this virus. COM files increase
|
||||
in length by 1813 bytes. EXE files usually increase by 1808 bytes, but
|
||||
the displacement at which to write the virus is taken from the length in
|
||||
the EXE header and not the actual length. This means that part or all of
|
||||
this 1808 bytes may be overwritten on the end of the host program.
|
||||
|
||||
It becomes memory-resident when the first infected program is run,
|
||||
and it will then infect every program run except COMMAND.COM. COM files
|
||||
are infected once only, EXE files are re-infected each time they are run.
|
||||
|
||||
|
||||
Interrupt 8 is redirected. After the system has been infected for
|
||||
thirty minutes (by running an infected program), an area of the screen
|
||||
from row 5 column 5 to row 16 column 16 is scrolled up two lines creating
|
||||
a black two line "window". From this point a time-wasting loop is
|
||||
executed with each timer interrupt, slowing the system down by a factor
|
||||
of 10.
|
||||
|
||||
If the system was infected with a system date of Friday the
|
||||
thirteenth, every program run will be deleted instead. This will
|
||||
continue irrespective of the system date until the machine is rebooted.
|
||||
The end of the virus, from offset 0600H, is rubbish and will vary from
|
||||
sample to sample.
|
||||
|
||||
Jerusalem contains a flaw which makes it re-infect EXE (but not COM)
|
||||
files over and over (up to five times or until the file becomes too big
|
||||
to fit into memory, whichever comes first.)
|
||||
|
||||
The names 1808 and 1813 come from the fact that files grow by 1808 or
|
||||
1813 bytes, without changing their date and time or read/write/hidden
|
||||
attributes. COMMAND.COM does not grow, to help it avoid detection. In
|
||||
fact, it seems likely that the disk version of COMMAND.COM is not
|
||||
modified, but that the in-memory copy of COMMAND.COM is modified when an
|
||||
infected program is run.
|
||||
|
||||
The virus causes some intentional damage:
|
||||
|
||||
* there is code in the virus for deleting each program that you run on
|
||||
every Friday 13th. On January 13 (Friday), 1989, this virus made a
|
||||
shambles of hundreds of PC-compatibles in Britain<Note: Jonathan
|
||||
Randal, "Friday the 13th is Unlucky for British Computer Users;
|
||||
Software Virus Disrupts IBM PC Programs" The Washington Post,
|
||||
January 14, 1989, p. D10.>
|
||||
|
||||
* The virus re-directs interrupt 8 (among others) and one-half hour
|
||||
after an infected program loads, the new timer interrupt introduces a
|
||||
delay which slows down the processor by a factor of 10. (see figure).
|
||||
|
||||
It is difficult to estimate the total dollar value of damage done by
|
||||
this virus to date. In just one case, reported in the Israeli newspaper
|
||||
Maariv, it destroyed $15,000 worth of software and two disks in which
|
||||
7,000 hours of work had been invested.<Note: Reported by Jonathan
|
||||
Randal, "Friday the 13th is Unlucky for British Computer Users; Software
|
||||
Virus Disrupts IBM PC Programs" The Washington Post, January 14, 1989,
|
||||
p. D10.>
|
||||
|
||||
Disinfection can be a complex process. UNVIRUS will easily
|
||||
eradicate this virus and 5-6 others as well. IMMUNE will prevent further
|
||||
infection.
|
||||
|
||||
Alternatively, shareware programs written by Dave Chamber and
|
||||
distributed through bulletin boards under the name M-J may be used. M-J
|
||||
removes the virus from hard disks; M-JFA removes the virus from floppy
|
||||
disks that are inserted into the system's A drive; M-JFB removes the
|
||||
virus from floppy disks that are inserted into the system's B
|
||||
drive.<Note: The M-J disinfector is successful in removing the Jerusalem
|
||||
virus in virtually all instances. However, it will destroy, on the
|
||||
average, one EXE file in ten during the disinfection attempt. It will not
|
||||
harm COM files. It is recommended that every infected program be
|
||||
executed after the disinfection process. Programs that have been
|
||||
disabled during the disinfection process will not execute.>
|
||||
|
||||
Alternatively, here is the process for removal:
|
||||
|
||||
* power down the system.
|
||||
|
||||
* Boot from a write-protected, clean system master diskette.
|
||||
|
||||
* Delete all of the infected programs as indicated by VIRUSCAN.
|
||||
|
||||
* Replace the programs from original write-protected program
|
||||
distribution diskettes.
|
||||
|
||||
* Do not execute any program from the infected hard disk until the
|
||||
disinfection process is complete.
|
||||
|
||||
* After cleaning all hard drives in the infected system, all floppies
|
||||
that have come into contact with the system should be SCANned and
|
||||
disinfected in the same manner.
|
||||
|
||||
Another means of detection: using PCtools or another text search
|
||||
utility, search for the ASCII string "sUMsDos". This string is present
|
||||
in all copies of this particular virus strain.
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
59
textfiles.com/virus/NCSA/ncsa079.txt
Normal file
59
textfiles.com/virus/NCSA/ncsa079.txt
Normal file
@@ -0,0 +1,59 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> Jerusalem-B <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Synonyms: Arab Star, Black Box, Black Window, Hebrew University
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
Host Files: Remains resident. Infects SYS, COM, EXE, overlay files.
|
||||
|
||||
Increase in Size of Infected Files: 1808 bytes (EXE files), 1813 bytes
|
||||
(COM files). Sometimes does not re-infect EXE files.
|
||||
|
||||
Nature of Damage: Affects system run-time operation. Corrupts program
|
||||
files.
|
||||
|
||||
Detected by: Scanv56+, F-Prot, IBM Scan.
|
||||
|
||||
Removed by: CleanUp, F-Prot, Saturday, M-Jruslm, UnVirus.
|
||||
|
||||
Derived from: Jerusalem virus.
|
||||
|
||||
This virus is identical to the Jerusalem except:
|
||||
|
||||
* it is sometimes able to successfully identify pre-existing
|
||||
infections in EXE files and may only infect them once.
|
||||
|
||||
* It may not slow the system after infection.
|
||||
|
||||
It is easily the most common of all PC viruses. It can infect SYS,
|
||||
COM, EXE, and overlay files.
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
66
textfiles.com/virus/NCSA/ncsa080.txt
Normal file
66
textfiles.com/virus/NCSA/ncsa080.txt
Normal file
@@ -0,0 +1,66 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> Jerusalem-C <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Synonyms: the New Jerusalem.
|
||||
|
||||
Date of Origin: October 14, 1989.
|
||||
|
||||
Place of Origin: first reported in the Netherlands by Fidonet SYSOPS Jan
|
||||
Terpstra and Ernst Raedecker. May have originated elsewhere in Europe.
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
Host Files: Remains resident. Infects COM, EXE, SYS, BIN, PIF, overlay
|
||||
files.
|
||||
|
||||
Increase in Size of Infected Files: 1808 bytes (EXE), 1813 bytes (COM).
|
||||
|
||||
Nature of Damage: Affects system run-time operation. Corrupts program or
|
||||
overlay files.
|
||||
|
||||
Detected by: Scanv45+, F-Prot.
|
||||
|
||||
Removed by: CleanUp, Saturday, F-Prot.
|
||||
|
||||
Derived from: Jerusalem-B.
|
||||
|
||||
This virus seems to be a special version designed to elude virus
|
||||
detectors, including McAfee's Scan versions prior to 45 and IBM's
|
||||
VIRSCAN of October 20, 1989 and earlier.
|
||||
|
||||
This virus is identical to Jerusalem-B except that the timer
|
||||
interrupt delay code has been bypassed. That is, it will not slow your
|
||||
computer when it has activated. This virus is virtually invisible until
|
||||
it activates. It infects both .EXE and .COM files and activates on any
|
||||
Friday the 13th, deleting infected programs when you attempt to run
|
||||
them. This virus is memory resident, and as with the other Jerusalem
|
||||
viruses, may infect overlay, .SYS, .BIN, and .PIF files.
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
39
textfiles.com/virus/NCSA/ncsa081.txt
Normal file
39
textfiles.com/virus/NCSA/ncsa081.txt
Normal file
@@ -0,0 +1,39 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> Jerusalem-D <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
Derived from: Jerusalem-C.
|
||||
|
||||
This is the Jerusalem-C that destroys both versions of the FAT on any
|
||||
Friday the 13th after 1990. The code that originally deleted executed
|
||||
programs has been overwritten with the FAT destructive code.
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
38
textfiles.com/virus/NCSA/ncsa082.txt
Normal file
38
textfiles.com/virus/NCSA/ncsa082.txt
Normal file
@@ -0,0 +1,38 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> Jerusalem-E <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
Derived from: Jerusalem-D.
|
||||
|
||||
This is identical to the Jerusalem-D variety except the activation
|
||||
is any Friday the 13th after 1992.
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
97
textfiles.com/virus/NCSA/ncsa083.txt
Normal file
97
textfiles.com/virus/NCSA/ncsa083.txt
Normal file
@@ -0,0 +1,97 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> Joker <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Synonyms: Jocker
|
||||
|
||||
Date of Origin: December, 1989.
|
||||
|
||||
Place of Origin: Poland.
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
Host Files: Non resident. Infects EXE files.
|
||||
|
||||
OnScreen Symptoms: Infected programs display bogus error messages.
|
||||
|
||||
Nature of Damage: Damages program files.
|
||||
|
||||
Detected by: Scanv57+, Pro-Scan.
|
||||
|
||||
Removed by: CleanUp, Scan/D, or delete infected files.
|
||||
|
||||
The Joker was isolated in Poland in December, 1989. This virus is a
|
||||
generic .EXE file infector, and is a poor replicator (ie. it does not
|
||||
quickly infect other files).<Note: Note that reports are mixed on this
|
||||
virus. Some claim that it is resident, and infects COM and COMMAND.COM,
|
||||
but not EXE files.>
|
||||
|
||||
Infected programs will display bogus error messages and comments,
|
||||
which cam be found in the infected files at the beginning of the viral
|
||||
code. Some of the messages and comments include:
|
||||
|
||||
Incorrect DOS version
|
||||
|
||||
Invalid Volume ID Format failure
|
||||
|
||||
Please put a new disk into drive A:
|
||||
|
||||
End of input file
|
||||
|
||||
END OF WORKTIME. TURN SYSTEM OFF!
|
||||
|
||||
Divide Overflow
|
||||
|
||||
Water detect in Co-processor
|
||||
|
||||
I am hungry! Insert HAMBURGER into drive A:
|
||||
|
||||
NO SMOKING, PLEASE!
|
||||
|
||||
Thanks.
|
||||
|
||||
Don't beat me !!
|
||||
|
||||
Don't drink and drive.
|
||||
|
||||
Another cup of cofee ?
|
||||
|
||||
OH, YES!
|
||||
|
||||
Hard Disk head has been destroyed. Can you borrow me your one?
|
||||
|
||||
Missing light magenta ribbon in printer!
|
||||
|
||||
In case mistake, call GHOST BUSTERS
|
||||
|
||||
Insert tractor toilet paper into printer.
|
||||
|
||||
This virus may also alter .DBF files, adding messages to them.
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
55
textfiles.com/virus/NCSA/ncsa084.txt
Normal file
55
textfiles.com/virus/NCSA/ncsa084.txt
Normal file
@@ -0,0 +1,55 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> Jork Virus <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
Host Files: Remains resident. Infects floppy disk boot sector.
|
||||
|
||||
Increase in Size of Infected Files: n/a.
|
||||
|
||||
Nature of Damage: Corrupts or overwrites boot sector.
|
||||
|
||||
Derived from: Shoe_virus (Ashar).
|
||||
|
||||
This virus is exactly the same as the Shoe_virus (Ashar) in
|
||||
operation. It was patched to replace offset 0202H, which reads as
|
||||
follows in the Shoe virus:
|
||||
|
||||
(c) 1986 Brain & Amjads (pvt) Ltd
|
||||
|
||||
with
|
||||
|
||||
(c) 1986 Jork & Amjads (pvt) Ltd
|
||||
|
||||
Another patch the author made to the Shoe_virus was to reduce the
|
||||
identifying text at offset 0010H to "Welcome to the Dungeon (c) 1986
|
||||
Brain".
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
51
textfiles.com/virus/NCSA/ncsa085.txt
Normal file
51
textfiles.com/virus/NCSA/ncsa085.txt
Normal file
@@ -0,0 +1,51 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> June 16th Virus <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Synonyms: Pretoria virus
|
||||
|
||||
Date of Origin: April, 1990
|
||||
|
||||
Place of Origin: South Africa.
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
Host Files: COM files including COMMAND.COM. Non-resident.
|
||||
|
||||
OnScreen Symptoms: A large hard disk may slow down during infection.
|
||||
|
||||
Increase in Size of Infected Files: 879 bytes.
|
||||
|
||||
Nature of Damage: Infects all COM files on the hard disk when an infected
|
||||
program is first run. Erases all entries in root directory on any June
|
||||
16. All FAT entries are replaced with tye word "ZAPPED".
|
||||
|
||||
Scan Code: encrypted.
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
52
textfiles.com/virus/NCSA/ncsa086.txt
Normal file
52
textfiles.com/virus/NCSA/ncsa086.txt
Normal file
@@ -0,0 +1,52 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> Kennedy Virus <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Synonyms: Dead Kennedy
|
||||
|
||||
Date of Origin: April, 1990
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
Host Files: COM files other than COMMAND.COM
|
||||
|
||||
Increase in Size of Infected Files: 333 bytes.
|
||||
|
||||
Nature of Damage: not destructive.
|
||||
|
||||
Removed by: delete any infected files.
|
||||
|
||||
Scan Code: In the virus, you can find the following text strings:
|
||||
"\command.com" and "The Dead Kennedys".
|
||||
|
||||
This virus activates on three dates: June 6, November 18, and
|
||||
November 22. November 22 is the date of the assassination of John F.
|
||||
Kennedy.
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
49
textfiles.com/virus/NCSA/ncsa087.txt
Normal file
49
textfiles.com/virus/NCSA/ncsa087.txt
Normal file
@@ -0,0 +1,49 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> Korea Virus <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Synonyms: LBC boot.
|
||||
|
||||
Date of Origin: March, 1990
|
||||
|
||||
Place of Origin: Seoul, Korea.
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
Host Files: boot sectors of 360K floppies. Memory resident.
|
||||
|
||||
Increase in Size of Infected Files: n/a.
|
||||
|
||||
Detected by: Scanv61+.
|
||||
|
||||
Removed by: M-Disk, or DOS SYS command.
|
||||
|
||||
In its current version, this virus does nothing but spread.
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
133
textfiles.com/virus/NCSA/ncsa088.txt
Normal file
133
textfiles.com/virus/NCSA/ncsa088.txt
Normal file
@@ -0,0 +1,133 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> Lehigh <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Date of Origin: late 1987.
|
||||
|
||||
Place of Origin: Lehigh University, Pennsylvania.
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
Host Files: Remains resident. Infects COMMAND.COM.
|
||||
|
||||
Increase in Size of Infected Files: overwrites files.
|
||||
|
||||
Nature of Damage: Corrupts program or overlay files. Overwrites the FAT
|
||||
and boot sector after infecting four floppies.
|
||||
|
||||
Detected by: Scanv56+, F-Prot, IBM Scan, Pro-Scan.
|
||||
|
||||
Removed by: CleanUp, or use MDisk and replace COMMAND.COM with a clean
|
||||
copy, or use F-Prot.
|
||||
|
||||
Scan Code: 50 53 80 FC 4B 74 08 80 FC 4E 74 03 E9 77 01 8B DA 80 7F 01 3A
|
||||
75 05 8A 07 EB 07. You can also search at offset 01CH for B4 19 CD 44 04
|
||||
61 1E 51 52 57.
|
||||
|
||||
History: This is a COMMAND.COM infector that first surfaced at Lehigh
|
||||
University in late 1987. It is one of the best known of viruses, and
|
||||
widely discussed and analyzed.
|
||||
|
||||
Description of Operation: Infects only COMMAND.COM, where it overwrites
|
||||
the stack space. If a disk which contains an uninfected copy of
|
||||
COMMAND.COM is accessed, that copy is also infected. A count of
|
||||
infections is kept within each copy of the virus, and when this count
|
||||
reaches 4, every disk (including hard disks) currently in the computer
|
||||
is trashed by overwriting the initial tracks (boot sector & FAT).
|
||||
Infection changes the date and time of the infected file. If a floppy
|
||||
with an uninfected COMMAND.COM is write-protected, there will be a
|
||||
"WRITE PROTECT ERROR" message from DOS.
|
||||
|
||||
I have reprinted below the warning that Kenneth van Wyk distributed
|
||||
on this virus.
|
||||
|
||||
"WARNING: MS-DOS COMMAND.COM "virus" program will
|
||||
reformat your disks!!
|
||||
|
||||
"Last week, some of our student consultants discovered a virus
|
||||
program that's been spreading rapidly throughout Lehigh University. I
|
||||
thought I'd take a few minutes and warn as many of you as possible
|
||||
about this program since it has the chance of spreading much farther
|
||||
than just our University. We have no idea where the virus started, but
|
||||
some users have told me that other universities have recently had
|
||||
similar problems.
|
||||
|
||||
"The virus: the virus itself is contained within the stack space of
|
||||
COMMAND.COM. When a PC is booted from an infected disk, all a
|
||||
user need do to spread the virus is to access another disk via TYPE,
|
||||
COPY, DIR, etc. If the other disk contains COMMAND.COM, the virus
|
||||
code is copied to the other disk. Then, a counter is incremented on the
|
||||
parent. When this counter reaches a value of 4, any and every disk in
|
||||
the PC is erased thoroughly. The boot tracks are nulled, as are the FAT
|
||||
tables, etc. All Norton's horses couldn't put it back together again... :-)
|
||||
This affects both floppy and hard disks. Meanwhile, the four children
|
||||
that were created go on to tell four friends, and then they tell four
|
||||
friends, and so on, and so on.
|
||||
|
||||
"Detection: while this virus appears to be very well written, the
|
||||
author did leave behind a couple footprints. First, the write date of the
|
||||
COMMAND.COM changes. Second, if there's a write protect tab on an
|
||||
uninfected disk, you will get a WRITE PROTECT ERROR... So, boot up
|
||||
from a suspected virus'd disk and access a write protected disk - if an
|
||||
error comes up, then you're sure. Note that the length of
|
||||
COMMAND.COM does not get altered.
|
||||
|
||||
"I urge anyone who comes in contact with publicly accessible disks
|
||||
to periodically check their own disks. Also, exercise safe computing -
|
||||
always wear a write protect tab.
|
||||
|
||||
"This is not a joke. A large percentage of our public site disks has
|
||||
been gonged by this virus in the last couple days."<Note: Kenneth R. van
|
||||
Wyk, User Services Senior Consultant, Lehigh University Computing
|
||||
Center, (215)-758-4988>
|
||||
|
||||
The Lehigh original virus has been sporadically reported at dozens
|
||||
of installations outside of the university for over a year. It is not a
|
||||
particulary successful replicator <197> probably because of the
|
||||
extremely short activation fuse - and it is difficult to detect and
|
||||
report because there are few symptoms prior to activation. But there
|
||||
should certainly be no surprise that it's in the public domain.
|
||||
|
||||
John McAfee has written: "The belief that viruses can be contained by
|
||||
early counter-action is belied by the Lehigh University experience. I
|
||||
have spoken to a number of individuals at the University who belived
|
||||
that the virus had somehow been contained because "no copies of the
|
||||
virus were distributed to outside organizations". This assumed, of
|
||||
course, that the original virus writer gave up after being foiled at
|
||||
Lehigh and did not insert the virus at any other location, and that all
|
||||
copies of the virus at Lehigh had indeed been accounted for. The first
|
||||
issue rests solely in the hands of the perpetrator and is beyond any
|
||||
containment controls. The second issue relies on an error-free
|
||||
containment process - allowing no possibility for overlooking, losing or
|
||||
mistaking an infected diskette. In any case, the Lehigh virus was by no
|
||||
means contained. I received a copy, as did virtually every virus
|
||||
researcher, in mid-1988, and infection reports issued throughout the
|
||||
year from universities, corporations and individual computer users."
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
54
textfiles.com/virus/NCSA/ncsa089.txt
Normal file
54
textfiles.com/virus/NCSA/ncsa089.txt
Normal file
@@ -0,0 +1,54 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> Lehigh-2 <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
Host Files: Remains resident. Infects COMMAND.COM only.
|
||||
|
||||
Increase in Size of Infected Files: overwrites files.
|
||||
|
||||
Nature of Damage: Corrupts program or overlay files. Overwrites the FAT
|
||||
and boot sector after infecting four floppies.
|
||||
|
||||
Detected by: Scanv56+, F-Prot, IBM Scan, Pro-Scan.
|
||||
|
||||
Removed by: CleanUp, or use MDisk and replace COMMAND.COM with a clean
|
||||
copy, or use F-Prot.
|
||||
|
||||
Derived from: Lehigh virus.
|
||||
|
||||
Scan Code: 50 53 80 FC 4B 74 08 80 FC 4E 74 03 E9 77 01 8B DA 80 7F 01 3A
|
||||
75 05 8A 07 EB 07.
|
||||
|
||||
A version of the Lehigh virus modified to retain its infection
|
||||
counter in RAM. After 10 infections, it corrupts the boot sector and
|
||||
FATs.
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
60
textfiles.com/virus/NCSA/ncsa090.txt
Normal file
60
textfiles.com/virus/NCSA/ncsa090.txt
Normal file
@@ -0,0 +1,60 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> Lisbon virus <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Date of Origin: November, 1989.
|
||||
|
||||
Place of Origin: Lisbon, Portugal.
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
Host Files: COM files.
|
||||
|
||||
Increase in Size of Infected Files: 648 bytes.
|
||||
|
||||
Nature of Damage: Corrupts one out of eight COM programs by overwriting.
|
||||
|
||||
Detected by: Scanv49+, F-Prot, IBM Scan, Pro-Scan.
|
||||
|
||||
Removed by: CleanUp, Scan/D, or F-Prot.
|
||||
|
||||
Derived from: Vienna
|
||||
|
||||
This virus was discovered by Jean Luz, an NCSA member in Lisbon,
|
||||
Portugal, in November, 1989. It infects COM files and increases the size
|
||||
of infected programs by 648 bytes. It destroys 1 out of 8 infected
|
||||
programs by overwriting "@AIDS" on top of the first five bytes of the
|
||||
infected program.
|
||||
|
||||
The virus is very similar to Vienna, except that almost every word in
|
||||
the virus has been shifted 1-2 bytes in order to avoid virus
|
||||
identification/detection programs which could identify the Vienna
|
||||
virus.
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
69
textfiles.com/virus/NCSA/ncsa091.txt
Normal file
69
textfiles.com/virus/NCSA/ncsa091.txt
Normal file
@@ -0,0 +1,69 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> LodeRunner <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Synonyms: Load Runner, Apple II GS Virus
|
||||
|
||||
Date of Origin: July, 1989.
|
||||
|
||||
Place of Origin: France.
|
||||
|
||||
Host Machine: Apple II GS.
|
||||
|
||||
Host Files: Boot block virus
|
||||
|
||||
Increase in Size of Infected Files: n/a
|
||||
|
||||
Nature of Damage: Erases boot blocks of disk in slot 5, drive 1. No
|
||||
files are damaged.
|
||||
|
||||
The damage done by this virus is minimal --it destroys only the boot
|
||||
blocks of a 3.5" disk (5.25" disks and hard disks seem to be immune),
|
||||
leaving all the files and directories intact (it can, however, render
|
||||
some copy-protected games unusable). LOAD RUNNER has a finite life-span
|
||||
built in -- at the same time it starts damaging, it also stops
|
||||
propagating, and being a boot block virus, it destroys copies of itself
|
||||
when it destroys the boot blocks.
|
||||
|
||||
Virus copies itself to $E1/BC00 thru $E1/BFFF. Virus resides in the
|
||||
boot blocks of a 3.5" disk. Copies itself to $E1/BC00 when disk is
|
||||
booted. Copies itself to disk in slot 5, drive 1 when
|
||||
CONTROL-APPLE-RESET is pressed. Propagation routine gains control by
|
||||
patching undocumented system vector in Memory Manager. Original boot
|
||||
blocks are not saved --virus contains code to emulate standard boot
|
||||
process. Infects disks in slot 5, drive 1 only. Infection of disks
|
||||
occurs when CONTROL-APPLE-RESET is pressed. Infection of host machine
|
||||
occurs when an infected disk is booted.
|
||||
|
||||
Triggered by any date between Oct. 1 and Dec. 31 inclusive, of any
|
||||
year. Damage occurs when an infected disk is booted. If damage occurs,
|
||||
further infection will not occur. (Note that the damage process wipes
|
||||
the virus off of the infected disk.)
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
75
textfiles.com/virus/NCSA/ncsa092.txt
Normal file
75
textfiles.com/virus/NCSA/ncsa092.txt
Normal file
@@ -0,0 +1,75 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> MacMag <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Synonyms: Peace virus.
|
||||
|
||||
Date of Origin: February, 1988.
|
||||
|
||||
Place of Origin: Montreal, Canada.
|
||||
|
||||
Host Machine: Macintosh.
|
||||
|
||||
MacMag may hold the record for the virus that achieved the greatest
|
||||
notoriety in the shortest period of time. Thousands of machines were
|
||||
infected in less than a month! A Macintosh virus, it was planted by
|
||||
Richard Brandow, publisher of MacMag, a Canadian Macintosh magazine.
|
||||
The message it displayed was "Richard Brandow, publisher of MacMag, and
|
||||
its entire staff would like to take the opportunity to convey their
|
||||
universal message of peace to all Macintosh users around the world." The
|
||||
"universal message of peace" flashed on the screens of thousands of
|
||||
Macintosh owners on March 2, 1988, did no other damage, then erased its
|
||||
own instructions.
|
||||
|
||||
The author, Drew Davidson, "thought we'd release it and it would be
|
||||
kind of neat."<Note: Philip Elmer-DeWitt, "Invasion of the Data
|
||||
Snatchers!", Time Magazine, September 26, 1988, p. 62 ff.>
|
||||
|
||||
This was probably the first virus to find its way into commercial
|
||||
software. Richard Brandow, a collaborator with Davidson and publisher
|
||||
of a Canadian computer magazine, distributed the virus with game
|
||||
software called "Mr. Potato Head" at a February, 1988 meeting of the
|
||||
Montreal Macintosh users group. Marc Canter, who was speaking at the
|
||||
meeting, worked for MacroMind Inc. of Chicago, a firm doing consulting
|
||||
work for Aldus. He brought the game home, tried it on his Mac, then began
|
||||
to review software to be shipped to Aldus. The virus infected the disk
|
||||
sent to Seattle, which was reproduced. About 3,000<Note: Knight-Ridder
|
||||
new service, "For Many Users, `Viruses' are Nothing New" reprinted in
|
||||
The Washington Post, November 28, 1988, p. F25.> to 5,000<Note: George
|
||||
Tibbits "New Computer `Virus' Giving Software Firms a Headache" The
|
||||
Washington Post, March 17, 1988, p. C11.> copies of an infected Aldus
|
||||
Freehandteaching disk were made with a disk duplicating machine, then
|
||||
shipped to computer stores around the country. Aldus recalled all of the
|
||||
copies.
|
||||
|
||||
MacMag can be ignored. If there is still a copy left, it will destroy
|
||||
itself after displaying its message. Nevertheless, it can be detected
|
||||
and killed with Disinfectant.
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
38
textfiles.com/virus/NCSA/ncsa093.txt
Normal file
38
textfiles.com/virus/NCSA/ncsa093.txt
Normal file
@@ -0,0 +1,38 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> Madonna <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Place of Origin: Brazil.
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
While Madonna sings in your video, you lose your disk. Reported in
|
||||
Brazil.
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
38
textfiles.com/virus/NCSA/ncsa094.txt
Normal file
38
textfiles.com/virus/NCSA/ncsa094.txt
Normal file
@@ -0,0 +1,38 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> Mailson <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Place of Origin: Brazil.
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
Produces an inversion of characters on the screen and and printer.
|
||||
Named after a Brazilian politician.
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
130
textfiles.com/virus/NCSA/ncsa095.txt
Normal file
130
textfiles.com/virus/NCSA/ncsa095.txt
Normal file
@@ -0,0 +1,130 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> MIX1 <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Synonyms: MIX/1
|
||||
|
||||
Date of Origin: First reported on August 22, 1989.
|
||||
|
||||
Place of Origin: First detected in Israel. May have been written
|
||||
elsewhere.
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
Host Files: Remains resident. Infects EXE files larger than 8K only in
|
||||
one version, 16K in another version.
|
||||
|
||||
OnScreen Symptoms: You will see a bouncing ball after a crash, which will
|
||||
occur after the sixth infection. (A variant will not crash the system.)
|
||||
|
||||
Increase in Size of Infected Files: 1618 bytes.
|
||||
|
||||
Nature of Damage: Affects system run-time operation. Corrupts program or
|
||||
overlay files.
|
||||
|
||||
Detected by: Scanv37+, F-Prot, IBM Scan, Pro-Scan.
|
||||
|
||||
Removed by: CleanUp, Scan/D, Virus Buster, or F-Prot.
|
||||
|
||||
Derived from: Icelandic-1.
|
||||
|
||||
Scan Code: "MIX1" will be the last four bytes of any infected EXE.
|
||||
|
||||
MIX1 is a variant of the Icelandic-1 virus, like the Saratoga. The
|
||||
Icelandic virus was first detected in June, 1989, disassembled a week
|
||||
later, and the disassembly was made available around the beginning of
|
||||
July. The MIX1 virus appeared on several BBSs in Israel on August 22, and
|
||||
may have been written in any country, and then sent via modem to Israeli
|
||||
boards.
|
||||
|
||||
The virus is put at the end of the .EXE file and the header is changed
|
||||
to point to the virus. Infected files can be manually identified by a
|
||||
characteristic "MIX1" always being the last 4 bytes of an infected file.
|
||||
Using Debug, if byte 0:33C equals 77h, then the MIX1 virus is in memory.
|
||||
EXE file execution through interrupt 21h service 4bh triggers the virus.
|
||||
The infected .EXE files grow by 1618-1634 bytes, depending on its
|
||||
original size. It will not infect files smaller than 8K. Once an infected
|
||||
program is run, the virus occupies 2,048 bytes of memory.
|
||||
|
||||
Some peculiarities include:
|
||||
|
||||
* All output through vectors 14h and 17h -- the serial and parallel
|
||||
ports -- is garbled.
|
||||
|
||||
* The NumLock key/light stays on.
|
||||
|
||||
* After the 6th infection, booting may crash the computer due to a bug,
|
||||
and a bouncing ball may appear on the monitor.
|
||||
|
||||
* Memory allocation is done through direct MCB control.
|
||||
|
||||
* It does not allocate stack space, and therefore makes some files
|
||||
unusable.
|
||||
|
||||
* It infects only files which are bigger than 16K, which makes
|
||||
disassembly very hard.<Note: Portions of the description contributed
|
||||
by Yuval Tal.>
|
||||
|
||||
The modifications to Icelandic I appear to be intended to fool virus
|
||||
detection programs. The changes include replacing instructions with
|
||||
other equivalent ones. For example,
|
||||
|
||||
XOR AX,AX
|
||||
|
||||
has been replaced with:
|
||||
|
||||
MOV AX,0000
|
||||
|
||||
and
|
||||
|
||||
MOV ES,AX
|
||||
|
||||
has been replaced with:
|
||||
|
||||
PUSH AX
|
||||
|
||||
POP ES
|
||||
|
||||
Also, NOP instructions have been inserted in several places,
|
||||
including inside the identification strings used by VIRUSCAN and most
|
||||
other similar programs. This seems to be a response by virus writers to
|
||||
anti-virus programs that look for infection by using identification
|
||||
strings. This method has been used in the '286 variant of the Ping-Pong
|
||||
virus.
|
||||
|
||||
Apart from these changes, parts of the virus are almost identical to
|
||||
other variants of the Icelandic virus. In the installation part, the
|
||||
code to check INT 13 has been removed (as in Saratoga and Icelandic-2).
|
||||
|
||||
In a variant, the infection routine has been modified to infect every
|
||||
file (instead of every tenth program run), and to not infect a program
|
||||
unless it is at least 16K long. A variant of the virus will not crash the
|
||||
system.
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
85
textfiles.com/virus/NCSA/ncsa096.txt
Normal file
85
textfiles.com/virus/NCSA/ncsa096.txt
Normal file
@@ -0,0 +1,85 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> New Zealand Virus <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Synonyms: Stoned Virus, Australian Virus, Hawaii, Marijuana, San Diego
|
||||
virus, Smithsonian virus.
|
||||
|
||||
Date of Origin: early 1988.
|
||||
|
||||
Place of Origin: Wellington, New Zealand.
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
Host Files: Remains resident. Infects boot sector of 360K floppy disk.
|
||||
|
||||
OnScreen Symptoms: The screen will sometimes display "Your PC is now
|
||||
stoned!"
|
||||
|
||||
Increase in Size of Infected Files: n/a.
|
||||
|
||||
Nature of Damage: Affects system run-time operation. Corrupts or
|
||||
overwrites boot sector. Directly or indirectly corrupts file linkage.
|
||||
|
||||
Detected by: Scanv56+, CleanUp, F-Prot, IBM Scan, Pro-Scan.
|
||||
|
||||
Removed by: CleanUp, MDisk, F-Prot.
|
||||
|
||||
Scan Code: 1E 50 80 FC 02 72 17 80 FC 04 73 12 0A D2 75 0E 33 C0 8E D8 A0
|
||||
3F 04 A8 01 75 03 E8 07 00. You can also search at offset 045H for B8 01
|
||||
02 0E 07 BB 00 02 B9 01.
|
||||
|
||||
History: This virus was first reported in Wellington, New Zealand in
|
||||
early 1988.
|
||||
|
||||
Description of Operation: This virus consists of a boot sector only. It
|
||||
infects any disk inserted in a drive after it becomes activated during a
|
||||
boot, and it occupies 1K of memory. The original boot sector is held in
|
||||
track zero, head one, sector three on a floppy disk, and track zero, head
|
||||
zero, sector two on a hard disk. The boot sector contains two character
|
||||
strings: "Your PC is now Stoned!" and "LEGALISE MARIJUANA!". The first
|
||||
of these messages is only displayed one in eight times when booting from
|
||||
an infected floppy, the second is unreferenced. In some variations, the
|
||||
message is displayed on every 32nd boot.
|
||||
|
||||
In the original version of this virus, only 360 KB 5 1/4" floppies
|
||||
were infected. While the original version was unable to infect a hard
|
||||
disk, other versions (such as New Zealand B) are capable of doing so.
|
||||
|
||||
The virus can (unintentionally) trash 1.2 Mb floppies if they have
|
||||
more than 32 files, and trashes about 5% of hard disks.<Note: Dr. Alan
|
||||
Solomon. "The Information Center - PC Security", 1989.>
|
||||
|
||||
Removal: The Stoned virus can be removed from 360KB diskettes by using
|
||||
either the MDisk, CleanUp, or F-Prot programs. It can also be removed
|
||||
from diskettes by using the DOS SYS command. Be sure to power down your
|
||||
system and reboot from a clean, write-protected floppy prior to
|
||||
attempting disinfection.
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
71
textfiles.com/virus/NCSA/ncsa097.txt
Normal file
71
textfiles.com/virus/NCSA/ncsa097.txt
Normal file
@@ -0,0 +1,71 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> New Zealand-B <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Synonyms: Stoned-B.
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
Host Files: Remains resident. Infects boot sector of floppy disk and
|
||||
partition table of hard disk.
|
||||
|
||||
OnScreen Symptoms: The screen will sometimes display "Your PC is now
|
||||
stoned!"
|
||||
|
||||
Increase in Size of Infected Files: n/a.
|
||||
|
||||
Nature of Damage: Affects system run-time operation. Corrupts or
|
||||
overwrites boot sector. Directly or indirectly corrupts file linkage.
|
||||
|
||||
Detected by: Scanv56+, CleanUp, F-Prot, IBM Scan, Pro-Scan.
|
||||
|
||||
Removed by: CleanUp, MDisk, F-Prot.
|
||||
|
||||
Derived from: New Zealand.
|
||||
|
||||
Scan Code: You can search at offset 043H for B8 01 02 0E 07 BB 00 02 33
|
||||
C9.
|
||||
|
||||
This is a variation of New Zealand. Much of the code has been
|
||||
reorganized. The only significant change in function, however, is that
|
||||
the original boot sector is stored at track zero, head zero, sector seven
|
||||
on a hard disk. The second string ("Legalise Marijuana!") is not
|
||||
transferred when infecting a hard disk. The virus occupies space in the
|
||||
hard disk's partition table.
|
||||
|
||||
The hard disk is infected as soon as an infected floppy is booted. No
|
||||
intentional damage is done by New Zealand-B, except systems with RLL
|
||||
controllers will frequently hang.
|
||||
|
||||
Removal instructions are the same as for the original New Zealand
|
||||
virus for diskettes. However, an infected hard disk must be disinfected
|
||||
by using MDisk with the /P parameter, with CleanUp, or NDD, because the
|
||||
partition table has been infected.
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
59
textfiles.com/virus/NCSA/ncsa098.txt
Normal file
59
textfiles.com/virus/NCSA/ncsa098.txt
Normal file
@@ -0,0 +1,59 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> New Zealand-C <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Synonyms: Stoned-C.
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
Host Files: Remains resident. Infects boot sector of floppy disk and
|
||||
partition table of hard disk.
|
||||
|
||||
OnScreen Symptoms: The screen will not display any message.
|
||||
|
||||
Increase in Size of Infected Files: n/a.
|
||||
|
||||
Nature of Damage: Affects system run-time operation. Corrupts or
|
||||
overwrites boot sector. Directly or indirectly corrupts file linkage.
|
||||
|
||||
Detected by: Scanv56+, CleanUp, F-Prot, IBM Scan, Pro-Scan.
|
||||
|
||||
Removed by: CleanUp, MDisk, F-Prot.
|
||||
|
||||
Derived from: New Zealand-B
|
||||
|
||||
This is the Stoned-B virus that no longer displays the "Stoned"
|
||||
message. This virus is difficult to detect.
|
||||
|
||||
Removal instructions are the same as for the original New Zealand
|
||||
virus for diskettes. However, an infected hard disk must be disinfected
|
||||
by using MDisk with the /P parameter or CleanUp, because the partition
|
||||
table has been infected.
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
53
textfiles.com/virus/NCSA/ncsa099.txt
Normal file
53
textfiles.com/virus/NCSA/ncsa099.txt
Normal file
@@ -0,0 +1,53 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> New Zealand-D <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
Host Files: Remains resident. Infects boot sector of 360K, 1.2M, and
|
||||
1.44M disk.
|
||||
|
||||
OnScreen Symptoms: The screen will sometimes display "Your PC is now
|
||||
stoned!"
|
||||
|
||||
Increase in Size of Infected Files: n/a.
|
||||
|
||||
Nature of Damage: Affects system run-time operation. Corrupts or
|
||||
overwrites boot sector. Directly or indirectly corrupts file linkage.
|
||||
|
||||
Detected by: Scanv56+, CleanUp, F-Prot, IBM Scan, Pro-Scan.
|
||||
|
||||
Removed by: CleanUp, MDisk, F-Prot.
|
||||
|
||||
Derived from: New Zealand (original)
|
||||
|
||||
Scan Code: 1E 50 80 FC 02 72 17 80 FC 04 73 12 0A D2 75 0E 33 C0 8E D8 A0
|
||||
3F 04 A8 01 75 03 E8 07 00.
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
87
textfiles.com/virus/NCSA/ncsa100.txt
Normal file
87
textfiles.com/virus/NCSA/ncsa100.txt
Normal file
@@ -0,0 +1,87 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> nVIR <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Host Machine: Macintosh.
|
||||
|
||||
nVIR is a Macintosh virus that has now led to numerous strains,
|
||||
including MEV#, AIDS, nFLU, and nVIR A and B.
|
||||
|
||||
When you run an application infected with nVIR A or B on a clean
|
||||
system, the infection spreads from the application to the system file.
|
||||
After rebooting, the infection in turn spreads from the system to other
|
||||
applications, as they are run. The effect can be devastating (see
|
||||
sidebar).
|
||||
|
||||
At first, nVIR A and B only replicate. When the system file is first
|
||||
infected, a counter is initialized to 1000. The counter is decremented
|
||||
by 1 each time the system is booted, and it is decremented by 2 each time
|
||||
an infected application is run.
|
||||
|
||||
When the counter reaches 0, nVIR A will sometimes either say "Don't
|
||||
Panic" (if MacinTalk is installed in the system folder) or beep (if
|
||||
MacinTalk is not installed in the system folder). This will happen on a
|
||||
system boot with a probability of 1/16. It will also happen when an
|
||||
infected application is launched with a probability of 31/256. In
|
||||
addition, when an infected application is launched, nVIR A may say
|
||||
"Don't Panic" twice or beep twice, with a probability of 1/256.
|
||||
|
||||
When the counter reaches 0, nVIR B will sometimes beep. nVIR B does
|
||||
not call MacinTalk. The beep will happen on a system boot with a
|
||||
probability of 1/8. A single beep will happen when an infected
|
||||
application is launched with a probability of 15/64. A double beep will
|
||||
happen when an infected application is launched with a probability of
|
||||
1/64.
|
||||
|
||||
It is possible for nVIR A and nVIR B to mate and sexually reproduce,
|
||||
resulting in new viruses combining parts of their parents.
|
||||
|
||||
For example, if a system is infected with nVIR A, and if an
|
||||
application infected with nVIR B is run on that system, part of the nVIR
|
||||
B infection in the application is replaced by part of the nVIR A
|
||||
infection from the system. The result contains part from each of its
|
||||
parents, and behaves like nVIR A.
|
||||
|
||||
Similarly, if a system is infected with nVIR B, and if an application
|
||||
infected with nVIR A is run on that system, part of the nVIR A infection
|
||||
in the application is replaced by part of the nVIR B infection from the
|
||||
system. The result is very similar to its sibling described in the
|
||||
previous paragraph, except that it has the opposite "sex" - each part is
|
||||
from the opposite parent. It behaves like nVIR B.
|
||||
|
||||
These offspring are new viruses. If they are taken to a clean system
|
||||
they will infect that system, which will in turn infect other
|
||||
applications. The descendents are identical to the original offspring.
|
||||
|
||||
Incestual matings of these children with each other and with their
|
||||
parents produce results that contain various combinations of parts from
|
||||
their parents.<Note: This material prepared by John Norstad, Academic
|
||||
Computing and Network Services.>
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
82
textfiles.com/virus/NCSA/ncsa101.txt
Normal file
82
textfiles.com/virus/NCSA/ncsa101.txt
Normal file
@@ -0,0 +1,82 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> Ohio <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Date of Origin: May, 1989.
|
||||
|
||||
Place of Origin: First reported at Ohio State University. May have
|
||||
originated in Indonesia.
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
Host Files: Remains resident. Infects 360K floppy boot sector.
|
||||
|
||||
Increase in Size of Infected Files: n/a.
|
||||
|
||||
Nature of Damage: Corrupts or overwrites boot sector.
|
||||
|
||||
Detected by: Scanv56+, F-Prot, IBM Scan, Pro-Scan.
|
||||
|
||||
Removed by: MDisk, F-Prot, or DOS SYS command.
|
||||
|
||||
Derived from: May be an original. Den Zuk may have been derived from it.
|
||||
|
||||
Scan Code: see below.
|
||||
|
||||
The Ohio virus is a boot sector virus first discovered at Ohio State
|
||||
University by Terry Reeves in May, 1989. It only infects 360K floppies.
|
||||
It will infect any new diskette as soon as the diskette is accessed
|
||||
(COPY, DIR, DEL, program load, etc.), similar to the Brain. The virus
|
||||
will freeze the system if a <<Ctrl>><<Alt>><<Del>> is pressed and a cold
|
||||
boot is then required. When the virus activates, the first copy of the
|
||||
FAT becomes corrupted. No other symptoms have been reported.
|
||||
|
||||
The Ohio virus is similar in many respects to the Den Zuk virus, and
|
||||
may be an early version of Den Zuk. A diskette infected with Ohio will be
|
||||
immune to infection by the Pakistani Brain virus.
|
||||
|
||||
The following text strings appear in the Ohio virus:
|
||||
|
||||
V I R U S
|
||||
|
||||
b y
|
||||
|
||||
The Hackers
|
||||
|
||||
Y C 1 E R P
|
||||
|
||||
D E N Z U K 0
|
||||
|
||||
Bandung 40254
|
||||
|
||||
Indonesia
|
||||
|
||||
(C) 1988, The Hackers Team....
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
64
textfiles.com/virus/NCSA/ncsa102.txt
Normal file
64
textfiles.com/virus/NCSA/ncsa102.txt
Normal file
@@ -0,0 +1,64 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> Oropax Virus <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Synonyms: Music virus, Musician virus.
|
||||
|
||||
Date of Origin: December, 1989.
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
Host Files: Remains resident; infects COM files.
|
||||
|
||||
Increase in Size of Infected Files: length increases by 2756-2806 bytes,
|
||||
so that total length is evenly divisible by 51. Most common length
|
||||
increase is 2,773 bytes.
|
||||
|
||||
Nature of Damage: Affects system run-time operation; corrupts program
|
||||
files.
|
||||
|
||||
Detected by: Scanv53+, F-Prot, IBM Scan, Pro-Scan.
|
||||
|
||||
Removed by: CleanUp, SCAN/D, F-Prot, or delete infected files.
|
||||
|
||||
A memory resident virus infecting COM files. When an infected
|
||||
application is executed, the virus installs in memory trapping the DOS
|
||||
21h interrupt. Thereafter, when a program attempts to create a
|
||||
subdirectory, remove a subdirectory, create a file, open a file, delete
|
||||
a file, get/set file attributes, rename a file, delete a file (with FCB),
|
||||
create file (with FCB) or rename a file (with FCB), one COM file is
|
||||
infected in the home directory. COMMAND.COM, COM files with length
|
||||
divisible by 51, COM files with an attribute other than normal or
|
||||
archive, or COM files with a length of 61980 bytes will not be infected.
|
||||
The virus seems to activate randomly after infecting a file. If
|
||||
activated, five minutes after infection it will play 3 or 6 melodies
|
||||
(depending on version) repeatedly with a 7 minute interval in between
|
||||
each.
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
84
textfiles.com/virus/NCSA/ncsa103.txt
Normal file
84
textfiles.com/virus/NCSA/ncsa103.txt
Normal file
@@ -0,0 +1,84 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> Palette Virus <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Synonyms: Zero Bug virus, 1536 virus
|
||||
|
||||
Date of Origin: September, 1989.
|
||||
|
||||
Place of Origin: The Netherlands
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
Host Files: COM files. Memory resident.
|
||||
|
||||
Increase in Size of Infected Files: 1536 bytes.
|
||||
|
||||
Detected by: Scanv38+, F-Prot.
|
||||
|
||||
Removed by: Scan/D, F-Prot, or delete the infected files.
|
||||
|
||||
Scan Code: EB 2B 90 5A 45 CD 60 2E C6 06 25 06 01 90 2E 80 3E 26 06 00 8D
|
||||
3E 08 06 0E 07 75 5E 2E C6 06 26 06 05 90.
|
||||
|
||||
This virus infects .COM files, causing them to grow by 1536 bytes,
|
||||
but its main mission is to infect the copy of COMMAND.COM that is pointed
|
||||
to by the environment variable COMSPEC. If COMSPEC does not point to
|
||||
anything useful, the virus will install itself as a resident extension,
|
||||
taking over INT 21h.
|
||||
|
||||
From the moment the virus has infected COMMAND.COM or has installed
|
||||
itself as a TSR, the virus will intercept DOS INT 21h, function calls 11h
|
||||
(find first file), 12h (find next file), 57 (get/set file date & time),
|
||||
3Eh (close file), 40h (write to file or device) and 3Ch (create file).
|
||||
|
||||
All COM files that are accessed via function calls 3Ch, 3Eh and 40h
|
||||
(by DOS itself or from any other program) will be infected by the virus.
|
||||
This includes actions like COPY and XCOPY. Any COM file you create by
|
||||
yourself via a compiler, linker, DEBUG or EXE2BIN will also be infected.
|
||||
|
||||
The extra 1536 bytes in infected files will not show up when you
|
||||
display a directory of your disk. The virus intercepts DOS function
|
||||
calls Find First, Find Next and Get/Set file date & time. If a COM file
|
||||
found by these DOS functions has been infected by the virus, the
|
||||
information in the DTA (Disk Transfer Area) will be changed to show the
|
||||
actual filesize minus 1536 bytes. DIR and most full-screen file
|
||||
utilities (Like Norton and PCTOOLS) will be fooled by this trick. This
|
||||
makes it very hard to detect the virus by simply checking the size of COM
|
||||
files, because infected files will show up with their ORIGINAL size!
|
||||
|
||||
If (and only if) the currently loaded COMMAND.COM is infected, the
|
||||
virus will also hook the timer interrupt 1Ch. After a while a smiley face
|
||||
(ASCII character 01) will move over your screen and "eat" all zeroes it
|
||||
can find. Hence the name "Zero Bug" for this virus. The virus does not
|
||||
format disks or erase files.
|
||||
|
||||
The virus seems not to be spread very widely and may be rather new.
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
53
textfiles.com/virus/NCSA/ncsa104.txt
Normal file
53
textfiles.com/virus/NCSA/ncsa104.txt
Normal file
@@ -0,0 +1,53 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> Payday Virus <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Date of Origin: November, 1989.
|
||||
|
||||
Place of Origin: First isolated in the Netherlands.
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
Host Files: Remains resident; infects COM, EXE files.
|
||||
|
||||
Increase in Size of Infected Files: 1808 bytes (EXE files) and 1813 bytes
|
||||
(COM files).
|
||||
|
||||
Nature of Damage: Corrupts program or overlay files.
|
||||
|
||||
Detected by: Scanv51+, F-Prot.
|
||||
|
||||
Removed by: CleanUp, M-JRUSLM, UnVirus, Saturday, F-Prot.
|
||||
|
||||
Derived from: Jerusalem-B.
|
||||
|
||||
This virus provides a simple change in the Jerusalem B, activating on
|
||||
any Friday except Friday the 13th, hence the name "Payday".
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
64
textfiles.com/virus/NCSA/ncsa105.txt
Normal file
64
textfiles.com/virus/NCSA/ncsa105.txt
Normal file
@@ -0,0 +1,64 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> Pentagon Virus <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Place of Origin: Washington, D.C.
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
Host Files: Resident. 360K floppy disk boot sector.
|
||||
|
||||
Increase in Size of Infected Files: n/a.
|
||||
|
||||
Nature of Damage: Corrupts or overwrites boot sector.
|
||||
|
||||
Detected by: Scanv56+, F-Prot.
|
||||
|
||||
Removed by: MDisk, CleanUp, or DOS SYS command.
|
||||
|
||||
Scan Code: You can search at offset 03EH for 8E D8 FB BD 44 7C 81 76 06.
|
||||
|
||||
The Pentagon virus consists of:
|
||||
|
||||
* a normal MS-DOS 3.20 boot sector where the name "IBM" has been
|
||||
replaced by "HAL".
|
||||
|
||||
* A file with the name of the hex character 0F9H. This file contains the
|
||||
portion of the virus code which would not fit into the boot sector, as
|
||||
well as the original boot sector of the infected disk. This file is
|
||||
addressed by its absolute address, rather than name.
|
||||
|
||||
* A file named PENTAGON.TXT that does not appear to be used or contain
|
||||
any data. Portions of this virus are encrypted.
|
||||
|
||||
The Pentagon virus will look for and remove the Brain virus from any
|
||||
disk that it infects. It is memory resident, occupying 5K of RAM, and can
|
||||
survive a warm reboot.
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
54
textfiles.com/virus/NCSA/ncsa106.txt
Normal file
54
textfiles.com/virus/NCSA/ncsa106.txt
Normal file
@@ -0,0 +1,54 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> Perfume Virus <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Synonyms: 765, 4711
|
||||
|
||||
Date of Origin: December, 1989 or earlier.
|
||||
|
||||
Place of Origin: Poland or Germany.
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
Host Files: Non-resident. Infects COM files including COMMAND.COM
|
||||
|
||||
Increase in Size of Infected Files: 765 bytes.
|
||||
|
||||
Detected by: Scanv57+, F-Prot, IBM Scan, Pro-Scan.
|
||||
|
||||
Removed by: F-Prot or delete infected files.
|
||||
|
||||
Derived from: Jerusalem
|
||||
|
||||
The virus may ask you a question, and not infect should you answer
|
||||
the question with "4711", the name of a German perfume. In the most
|
||||
common version of this virus, however, the questions have been
|
||||
overwritten with meaningless characters.
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
64
textfiles.com/virus/NCSA/ncsa107.txt
Normal file
64
textfiles.com/virus/NCSA/ncsa107.txt
Normal file
@@ -0,0 +1,64 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> Saratoga Virus <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Synonyms: 642, One in Two
|
||||
|
||||
Date of Origin: July, 1989
|
||||
|
||||
Place of Origin: Calfornia
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
Host Files: Memory resident. Infects EXE files.
|
||||
|
||||
Increase in Size of Infected Files: 642 bytes.
|
||||
|
||||
Detected by: Scanv56+, F-Prot, IBM Scan.
|
||||
|
||||
Removed by: CleanUp, Scan/D, F-Prot, or delete infected files.
|
||||
|
||||
Derived from: Icelandic II?
|
||||
|
||||
This virus appears to be derived from the Icelandic-II viruses.
|
||||
Modifications include:
|
||||
|
||||
* When Saratoga copies itself to memory, it modifies the memory block
|
||||
so that it appears to belong to the operating system, thus preventing
|
||||
reuse of the block.
|
||||
|
||||
* Like Icelandic-II, this virus can infect programs which have been
|
||||
marked Read-Only, though it does not restore the Read-Only attribute
|
||||
to the file afterwards.
|
||||
|
||||
Similar to the Icelandic-II virus, the Saratoga can infect programs
|
||||
even if the system has installed an anti-viral TSR which "hooks"
|
||||
interrupt 21, such as FluShot+.
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
53
textfiles.com/virus/NCSA/ncsa108.txt
Normal file
53
textfiles.com/virus/NCSA/ncsa108.txt
Normal file
@@ -0,0 +1,53 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> Saturday the 14th virus <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Synonyms: Durban
|
||||
|
||||
Date of Origin: March, 1990
|
||||
|
||||
Place of Origin: Durban, South Africa.
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
Host Files: COM (but not COMMAND.COM), EXE, and overlay files. Remains
|
||||
resident.
|
||||
|
||||
Increase in Size of Infected Files: 669-685 bytes.
|
||||
|
||||
Nature of Damage: Overwrites the first 100 sectors of A:, B:, and C:,
|
||||
destroying the boot sector, partition table, and FATs.
|
||||
|
||||
Detected by: Scan v61+.
|
||||
|
||||
Removed by: Scan/D, or delete whatever is infected.
|
||||
|
||||
Activates on any Saturday the 14th.
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
52
textfiles.com/virus/NCSA/ncsa109.txt
Normal file
52
textfiles.com/virus/NCSA/ncsa109.txt
Normal file
@@ -0,0 +1,52 @@
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<20> VIRUS REPORT <20>
|
||||
<20> SF Virus <20>
|
||||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Date of Origin: April, 1989.
|
||||
|
||||
Place of Origin: California
|
||||
|
||||
Host Machine: PC compatibles.
|
||||
|
||||
Host Files: Memory resident. Infects floppy disk boot sector.
|
||||
|
||||
Increase in Size of Infected Files: n/a
|
||||
|
||||
Detected by: Scanv56+ (identifies it as the Alameda).
|
||||
|
||||
Removed by: CleanUp, MDisk, F-Prot, or use the DOS SYS command.
|
||||
|
||||
Derived from: Alameda
|
||||
|
||||
A modification of the Alameda, the SF Virus activates when the
|
||||
counter indicates it has infected 100 diskettes. The virus replicates
|
||||
with each warm boot, infecting and reformatting any 360K disk in the
|
||||
floppy drive.
|
||||
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||||
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
||||
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
||||
<EFBFBD> Security Association. It contains information compiled from <20>
|
||||
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
||||
<EFBFBD> presented here is accurate. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
||||
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
||||
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
||||
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
||||
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
||||
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
||||
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
||||
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
||||
<EFBFBD> <20>
|
||||
<EFBFBD> This document may be distributed in any format, providing <20>
|
||||
<EFBFBD> this message is not removed or altered. <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue
Block a user