home *** CD-ROM | disk | FTP | other *** search
/ HPAVC / HPAVC CD-ROM.iso / pc / T.ZIP / THEFLUE.ZIP / FLUE.NFO < prev    next >
Encoding:
Text File  |  1993-12-18  |  10.7 KB  |  141 lines

  1. ┌─────────────────────────────────────────────────────────────────────────────┐
  2. │                                                                             │
  3. │                    This Virus Came To You By Way Of...                      │
  4. │                                                                             │
  5. │         ▄███████▄       ▄████████▄        ▄█▄        ▄███████▄              │
  6. │        ████▀  ▀███      ███▀   ▀███      █████      ████▀ ▀████             │
  7. │        ████             ███▄   ▄███      █████      ▀█████▄▄                │
  8. │        ████             █████████▀       █████         ▀▀█████▄             │
  9. │        ████▄  ▄███ ▄██▄ ████ ▀████▄ ▄██▄ █████ ▄██▄ ████▄ ▄████ ▄██▄        │
  10. │         ▀███████▀  ▀██▀ ▀██▀   ▀██▀ ▀██▀  ▀█▀  ▀██▀  ▀███████▀  ▀██▀        │
  11. │                                                                             │
  12. │                                                                             │
  13. │                  Computer Research & Information Service                    │
  14. │                                                                             │
  15. │                                                                             │
  16. │       Cris is a group of computer users that have a true interest in        │
  17. │       Computer Viruses and Trojans, as well as how they work.               │
  18. │                                                                             │
  19. │       Members of Cris feel a need, not only to be up on the latest          │
  20. │       Bombs, Trojans, Worms, and Viruses, but to safely transfer these      │
  21. │       files into the hands of other dedicated researchers.                  │
  22. │                                                                             │
  23. │       Cris cannot be held responsible for the use or misuse of these        │
  24. │       files.  Cris releases are sent out to better the knowledge of the     │
  25. │       virus community, for those who would like to learn more about them    │
  26. │       and how they work.                                                    │
  27. │                                                                             │
  28. │       Also, all Cris releases have been pre-tested and informative text     │
  29. │       files are enclosed with valuable information regarding the type of    │
  30. │       virus, how it works, and removal information.  If the virus you       │
  31. │       downloaded is not a Cris release, you don't know what you've got.     │
  32. │                                                                             │
  33. │       DuWayne Bonkoski                                                      │
  34. │       (Original Text Written By Michael Paris)                              │
  35. │                                                                             │
  36. └─────────────────────────────────────────────────────────────────────────────┘
  37.  
  38. ┌─────────────────────────────────────────────────────────────────────────────┐
  39. │ Cris Release Date:12/18/93                                                  │
  40. │ Type: Virus                                                                 │
  41. └─────────────────────────────────────────────────────────────────────────────┘
  42.  
  43. ┌─────────────────────────────────────────────────────────────────────────────┐
  44. │ VSUM Information - Quoted from Patricia M. Hoffman's Hypertext VSUM         │
  45. ├─────────────────────────────────────────────────────────────────────────────┤
  46. │ No Information Found                                                        │
  47. └─────────────────────────────────────────────────────────────────────────────┘
  48.  
  49. ┌─────────────────────────────────────────────────────────────────────────────┐
  50. │ Scanning Results                                                            │
  51. ├─────────────────────────────────────────────────────────────────────────────┤
  52. │                                                                             │
  53. │ McAfee's ViruScan Reports         -  Detected [Flue]                        │
  54. │   File had to be deleted                                                    │
  55. │ F-Prot's ViruScan Reports         -  Detected [Flue]                        │
  56. │   File had to be deleted                                                    │
  57. │ TBAV's ViruScan Reports           -  Detected [Flue]                        │    │
  58. │   Successfully repaired executable                                          │
  59. │                                                                             │
  60. └─────────────────────────────────────────────────────────────────────────────┘
  61.  
  62. ┌─────────────────────────────────────────────────────────────────────────────┐
  63. │ Researcher's Notes                                                          │
  64. ├─────────────────────────────────────────────────────────────────────────────┤
  65. │ The FLUE virus is a polymorphic virus which infects COM files only.  The    │
  66. │ FLUE virus has a very visible way to letting you know it has infected       │
  67. │ a file.  The virus will "flip" a character screen from right to left or     │
  68. │ vice versa.  The screen flip does not work on monochrome monitors, however, │
  69. │ because the virus is hard-coded to read segment B800 which is where screen  │
  70. │ information lies for color text modes.  Monochrome video lies in            │
  71. │ the B000 segment and the virus does not have a routine to sense which       │
  72. │ type of video is being used.                                                │
  73. │                                                                             │
  74. │ The virus hooks interrupt 24 (Critical Error Handler) which causes the      │
  75. │ virus to replicate if a critical error occurs during execution.             │
  76. │                                                                             │
  77. │ The virus does not become memory resident as far as I can tell.             │
  78. │                                                                             │
  79. │ A character string can be found within the virus body which may appear      │
  80. │ un-encrypted within infected files.  The string reads as follows:           │
  81. │                                                                             │
  82. │ Hatsjeee!! <C> 1992/1993 by TridenT / [DαRkRαY]Oh, BTW it's from Holland,   │
  83. │ and is called the FLUEFor those who are interested......                    │
  84. │                                                                             │
  85. │                                                                             │
  86. │ Encryption                                                                  │
  87. │ ==========                                                                  │
  88. │ The FLUE encrypts itself by XOR'ing the body of the virus with a            │
  89. │ randomly generated word varaiable and then uses the variable's complement   │
  90. │ on the next encryption cycle.                                               │
  91. │                                                                             │
  92. │                                                                             │
  93. │ Infection                                                                   │
  94. │ =========                                                                   │
  95. │ The FLUE infects COM files having a length between 500 and 47987 bytes.     │
  96. │ The virus does not check to see if the file has already been infected and   │
  97. │ will attempt to re-infect an already infected file.                         │
  98. │ The decryption routine the virus creates is very polymorphic.  The program  │
  99. │ will randomly change which registers it uses to decrypt itself for each     │
  100. │ infected file.                                                              │
  101. │                                                                             │
  102. │ The infected files grow by a varying number of bytes.  The virus            │
  103. │ copies a random number of bytes from the zero page and appends them to      │
  104. │ the end of the executable before infecting the file.  This is what causes   │
  105. │ the random growth.                                                          │
  106. │                                                                             │
  107. │ Upon execution of an infected file, the virus will try to infect between    │
  108. │ one and eight files plus one more for each directory it moves into.         │
  109. │                                                                             │
  110. │ An interesting note on how the virus appends itself to other COM files.     │
  111. │ At first glance, the source codes does not show any significant file        │
  112. │ write routines that are necessary to cause replication.  It took me         │
  113. │ a while to figure out how the virus accomplished this.  It does this        │
  114. │ by building it's own write routine as it runs in memory.  Just another      │
  115. │ example of the polymorphic capabilities of this virus.                      │
  116. │                                                                             │
  117. │                                                                             │
  118. │ Detection                                                                   │
  119. │ =========                                                                   │
  120. │ All scanners tested will detect this virus.                                 │
  121. │                                                                             │
  122. │ This virus can be detected using the following scan strings (for those      │
  123. │ who are using older/other scan utilities):                                  │
  124. │                                                                             │
  125. │ 89?18B?1B94002?331?1F7?349                 - TBAV                           │
  126. │ 89??8B??B94002??????31??F7??????49         - F-PROT                         │
  127. │ 89?8B?B94002???31?F7???49                  - SCAN                           │
  128. │                                                                             │
  129. │                                                                             │
  130. │ Summary                                                                     │
  131. │ =======                                                                     │
  132. │ I have to admit, the virus was a challenge for me due to it's polymorphic   │
  133. │ capabilities. I had to step through it a couple of times to get a feel      │
  134. │ for what was going on.  I'm not sure why all the polymorphism is used       │
  135. │ in this particular strain since the visual cues easily let you know         │
  136. │ something unusual is happening.  Otherwise, this virus is a pretty fast     │
  137. │ replicator that wants to be noticed in its own little way.                  │
  138. │                                                                             │
  139. └─────────────────────────────────────────────────────────────────────────────┘
  140.  
  141.