home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Shareware 1 2 the Maxx
/
sw_1.zip
/
sw_1
/
UTILS
/
TBAV501.ZIP
/
MTE.DOC
< prev
next >
Wrap
Text File
|
1992-07-20
|
4KB
|
107 lines
Documentation for MuTation Engine Algorithmic Virus Recognition module v2.3
---------------------------------------------------------------------------
--- MTE.AVR 2.3
Added some additional selectivity to avoid false alarms.
Unbelievable what that MTE-beast can do... Anyway, changed the MTE.AVR to
process 80286 specific MTE-viruses too. I have my doubt however whether
a 80286-only virus would be successfull anyway... To detect ALL 80286-
specific MTE variants you need TbScan 4.1 or above.
--- MTE.AVR 2.2
Changed the MTE.AVR to process EXE files too.
Fine tuned the MTE.AVR a little to catch those few remaining samples too!
--- MTE.AVR 2.1
Due to my random generator, a few variants of the Mutation Engine did not
appear in my test set that consisted of 200.000 MTE encrypted files.
This MTE.AVR has been modified to detect these few MTE-variants also.
Thanks to Righard Zwienenberg for his "false negative" samples.
--- MTE.AVR 2.0
Note that the MTE.AVR series v1.x were written by another author.
This MTE.AVR module has been written by Frans Veldman.
To avoid confusion about the author, this MTE.AVR module has an initial
version number starting with v2.0.
This should be the final MTE.AVR. The 1.x versions could be considered as
emergency releases. They only found 85% of the Mutations, and they caused
a lot of false alarms.
This MTE.AVR has been tested over 200.000 of mutants, and it detected
them all. No false alarms occured. If you have a program that causes
false alarm, please sent it to us.
--- MTE.AVR 1.x
The 1.x MTE.AVR versions are written by Edwin Cleton (SaeSoft).
---
MTE 2.3
=======
Copyright (C) 1992 ESaSS B.V. Nijmegen, The Netherlands.
Tel. +31-80-787881
BBS. +31-85-212395 (2:280/200 @fidonet)
Frans Veldman
About MTE
=========
MTE is a Mutation Engine, produced by some guy who calls himself
'Dark Avenger'. The Mutation Engine is some kind of toolkit which
anbles the user to create (or even convert viruses into) viruses
that modify themself upon every infection. The resulting viruses
are not only self-mutating, but also hard to detect. The decryptor
routine itself is built with random instructions. It is impossible
to define something like a 'signature' to detect the mutation
engine.
How can MTE be detected? Consider the following:
- The MTE random code has (unlike other programs) no special
purpose, except for confusion of researchers and scanners.
- The netto effect of the routine makes that some code will
be decrypted.
- The code behind the decryptor routine is encrypted, and
disassembly of this code results in several errors.
- The MTE routine lacks a lot of instructions which are
likely to appear in normal software.
- Any serious researcher determines in a glance whether a
file is infected or not if you supply him a disassembly.
How does MTE.AVR work? The MTE.AVR itself contains some kind of
disassembler. This is really a great advantage over other
detection algorithms like used by the other anti-virus products.
By disassembling the code, the instructions will be clearly
visible, without garbage like operands or immediate data.
MTE.AVR assumes that any file is infected with MTE. However,
as soon as it disassembles an instruction that can not be
generated by MTE, it clears the infection assumption and quits.
There are quiet a lot of instructions which can not be generated
by MTE, so in most cases the AVR module will quit within a few
instructions.
If the disassembly can continue for a reasonable amount of time,
and other conditions are met, the file is infected with MTE.
So far, only a few anti-virus products use a built-in disassembler
to detect MTE (TbScan, HTScan and Gobbler II). Most other products
have a lot of other rules defined, with the result that MTE will
no longer be detected if the virus is not created with the
default configuration of MTE. These viruses will be created soon,
no doubt about that...
Needless to say, MTE.AVR detects them all!