home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Turnbull China Bikeride
/
Turnbull China Bikeride - Disc 2.iso
/
STUTTGART
/
ANTIVIRUS
/
SCANNER
/
AVRD158t
< prev
Wrap
Text File
|
1992-10-27
|
104KB
|
2,863 lines
This is the textual version of the AVRD. In order to minimise
editing overhead this version is now derived directly from the
source of the HyperText version. The derivation is performed
by a program, so the formatting may not always be perfect -
but we'd rather spend our time coding !Killer/!Scanner !
Ignore any references to clicking in specific places in the
document - this facility is only available in the HyperText
version.
###########################################################################
The Archimedes Virus Reference Document
---------------------------------------------------------------------------
Version 1.58h (October 25, 1992)
Copyright © 1991, 1992 Tor O. Houghton and Alan Glover
This document is copyright. Profit based distribution (whether PD
or Shareware) without prior consent from the authors, is strictly
illegal. If in doubt, contact one of the authors. Note that this
version of !ClearView also has certain conditions upon it's distribution.
This is the hypertext form of this document, using the Binary Star
!ClearView package. Click here (on the underlined word) for a brief
guide to using this software and details about obtaining enhanced
versions.
A full list of the contents, and an index of the viruses covered
in this edition of this document can be seen by clicking the 'index'
icon (the rightmost one), or the underlined word in this sentence.
###########################################################################
Abstract
---------------------------------------------------------------------------
As the number of people using the Archimedes range of computers has
increased over the years, so has the number of viruses.
This document should be of interest to all users of an Acorn computer
running a version of RISC OS, and contains the compiled information
from various virus researchers and their killers. In particular,
it is (as the title suggests) a compendium of the knowledge about
viruses of Tor Houghton and Alan Glover.
The purpose of this document is to give as many details as possible
on each virus known, and to assist those who think they might be
infected by a virus.
A dilemma occurred as this document took form. How much information
should be included? If we provided too much information, this document
could well become an effective "cookbook" for people wanting to write
a virus. This is not our intention. The professionals and programmers
who read this will easily identify the missing or omitted information
because they already have this background knowledge - it is part
of the working tools of our profession.
The document is not intended to provide very detailed technical information
on a virus (although this may happen as a way of explaining it),
but to allow the reader to understand what the virus generally does,
what makes it activate and what it does upon activation. Most important,
however, it should help the user with the removal!
1.0 Introduction
---------------------------------------------------------------------------
A virus is nothing magical. Anyone with a bit of programming skills
and some knowledge about the machine's operating system is capable
of creating a virus. Usually these programmers think it is fun, they've
read too many cyberpunk books, or they are generally pitiful creatures
who like to inflict damage.
Final note: In spite of many journalist's secret wishes, a computer
virus cannot spread from one type of computer to another. For example,
a virus written on a PC running MS-DOS or Windows cannot infect the
Archimedes - in native mode. If you are using the PC emulator, a
virus functions perfectly under this environment too (probably with
a few exceptions due to the fact that there are about 1000 viruses
running under this particular operating system). The only area in
which some crossover is possible is hardware - if you have a DOS
virus which thrashes the floppy disc out of alignment, it will obviously
affect it when it is used normally!
1.1 Some Definitions
---------------------------------------------------------------------------
Connectivity: The level of ability a computer has to connect to other
computers. Nowadays it is very easy to, for example, phone a BBS
and download new software. The higher level of connectivity, the
higher the level of possible exposure to computer viruses. The same
may also be considered true of other sources of software, such as
PD libraries.
Trojan Horse: This is a generic name (taken from Greek mythology)
for a penetration method that includes hidden code. An example of
this is the Link virus which, while being helpful in the ways of
converting backspace to delete, also launches a virus into your computer.
Virus: A computer virus can be defined as a malicious program capable
of replicating itself. See "A Computer Security Glossary for the
Advanced Practitioner" in the Computer Security Journal IV, No. 1,
1987 for a similar description. Please note that most computer viruses
on the Archimedes do nothing but replicate, although there are a
few exceptions.
Worm: A computer program which moves through your computer system,
altering data as it copies itself and deleting the old copy. If a
worm reproduces it could also be called a virus. There are no reports
of worms on the Archimedes, mainly because it is such a closed system,
and would be detected much too easily to become a hazard. Networks
are more exposed to such nasties.
1.2 Entry Explanations
---------------------------------------------------------------------------
Name: The most common name of the virus. Often chosen because of
some text found in the virus, or like CeBIT, connected to some event
(the biggest computer show in Europe).
Aliases: Names which other anti-viral agent documents (usually brief
notes which are included with the program) use for the same virus.
This includes names that are commonly used by BBS users etc.
Origin: The country where the virus seems to have originated from.
Isolation Date: The date (as detailed as possible) when the virus
was first found.
Effective Length: The length the virus occupies on the disc. The
actual length in memory may well be shorter.
Virus Type: Task refers to viruses written as a multitasking program
(i.e. appears on the Task Manager, with or without a task name).
Resident refers to viruses which, by reserving some memory, insert
themselves as a machine code program invisible to the task manager.
By monitoring certain interrupts the virus is able to spread. Also,
if the virus attaches itself to files, this is noted along with what
type of files it infects.
Symptoms: Odd behaviour which might occur if the virus is loaded.
This could be spurious crashes or files suddenly appearing (or disappearing!).
Take note that this has nothing to do with what the virus actually
does when it activates, as this will be detailed as extensive as
possible under the 'general comments' section.
Detection: Refers to anti-virus agents (complete with earliest version
number) which to our knowledge detects the virus. Please be so kind
as to update me on this, as I know there are several anti-virus programs
wandering around which I don't have!
Removal: Refers either to programs which remove the virus from the
infected file (complete with earliest version number), or if possible,
which files to delete without destroying the program. Where it says
'Remove named file(s)', take note that if there is a !Boot file present,
be sure to check this too (i.e. with !Edit). In particular, never
assume that a Module may be RMKilled, or that an application task
may be Quit. It might disappear, but it may also set up a time bomb
with serious effects on the system.
As a rule, it is unwise to attempt to remove a virus from memory
yourself. However some anti-virus programs contain specific code
to detect and remove viruses which are present in memory. Where an
anti-virus program is known to be able to do this the program and
version is given. The criteria for this is that the anti-virus program
either neutralises or removes the virus from memory, leaving the
machine in a safe enough state for the anti-virus program to remove
the infection from your media. Even with this protection, you should
still do a CTRL-Reset as soon as possible after you have been infected.
General Comments: As detailed information about the virus as possible.
Also, if there are any mutated versions of the virus, these are stated
here too, along with any relevant information. Please note that the
number after the virus name states how many bytes it occupies on
the disc.
Source: The person who provided the information about the virus concerned.
Where a name does not appear, it will probably have been written
by Tor Houghton or Alan Glover. In some cases, an acknowledgment
will be included to someone who has helped in the isolation or analysis
of the virus.
Sometimes square brackets ("[]") with a comment might appear. These
are our comments, and offer additional useful information which we
thought the original author left out.
###########################################################################
Virus index
---------------------------------------------------------------------------
Click on the virus name to find out more about it
Archie FF8
Arcuebus
BBCEconet
Bigfoot
CeBIT
Code Sicarius
Extend
Funky
Garfield_I
Garfield_W
Handler
Icon Icon-A, Filer, Poison, NewVirus
Image
Increment
Irqfix
Link
Mode87
Module ModVir, Illegal
MyMod Silicon Herpes
NetManager
NetStatus Boot
Parasite *
Runopt
Sprite *
SpriteUtils
T2 *
Terminator *
Thanatos * RISCOSExt
Traphandler
Valid
Vigay DataDQM, Shakes
Viruses marked with an asterisk (*) indicate that they carry malicious
code. Any detection of one of these viruses should be treated thus:
1) Perform a CTRL-RESET as soon as possible.To be safe, press F12
and type FX 200,3 beforehand. This should get the virus out of memory,
just leaving the storage media to be cleaned. Remember that infection
can be as easy as opening a filer viewer!
2) Load a virus killer, and check that the virus is not active. Some
virus killers (e.g. Pineapple's !Killer) are capable of removing
any resident virus, and withstanding infection attempts whilst doing
this. Bear in mind that not all anti-virus programs are intended
to start up in an environment where a virus is active.
3) Run the virus killer through the system, opening the minimum possible
number of filer windows. Obviously, if you keep your copy of the
virus killer on a write-protected floppy this is quite easy! Remember
to check removable discs too!
Please note that spurious resets and/or errors which occur are usually
the results of poor programming, and is therefore not considered
malicious (it merely depicts the programmer's skills - he should
have stuck to LOGO).
Although not usually marked as malicious, some viruses will cause
the !Boot of an application to be overwritten. This can cause things
which usually happen automatically (eg: locating !System) to fail.
###########################################################################
Archie
===========================================================================
Last Updated: 21st April 1992
Aliases: FF8
Origin: United Kingdom
Isolation Date: 1988
Effective Length: 920 bytes
Virus Type: Resident Absolute (FF8) file infector.
Symptoms: May cause "Address exception" or "Undefined
instruction" errors. Absolute files will grow
in length.
---------------------------------------------------------------------------
Detection Media: Killer 1.17+ Memory: Interferon 2.00+
Scanner 1.02+ Killer 1.17+
Removal Media: Killer 1.17+ Memory: Killer 1.17+
---------------------------------------------------------------------------
General Comments:
This is a piece of ARM code that is appended to executables with
the Absolute (&FF8) filetype. It is 920 (&398) bytes long and has
a tell-tale 4-character string at the end of its code, "1210", which
is used as an "already-infected" flag. The first instruction of the
original executable is saved near the end of the virus code space
and is replaced by a branch to the first instruction of the Archie
virus code.
What Archievirus does when first run:
1.Attempts to infect executables (Absolute filetype) with the filespecs
"@.*" and "%.*". In other words, all executables in the current and
library directory are attacked.
2.Uses OS_File 36 as a "semaphore" to see if it is lodged in RMA.
If a call to OS_File 36 returns with an error, then it hasn't infected
the RMA yet, so it proceeds to claim 920 bytes of RMA, copy itself
into there and points a claim of the OS_File vector to its new RMA
location.
3.The time is checked to see if it is the 13th of the month. If so,
the code loops indefinitely, displaying the 45-character message
(in the virus, this message is EORed with &64, and is therefore
not easy to spot.):
Hehe...ArchieVirus strikes again...
4.Assuming it wasn't the 13th of the month (and NO, it doesn't check
for a Friday!), then the original first instruction of the executable
is replaced and the original normal code continues from &8000 onwards.
The OS_File vector claim is quite important, because this serves
two purposes:
a.It allows OS_File 36 to return without an error, signalling that
the RMA is already infected.
b.It checks for OS_Files 0 and 10 (Save memory to file), 11 (create
empty file) and 12,14,16 and 255 (Load file). If any of these are
encountered then an infection attack is activated (see step 1 above).
(Source: Richard K. Lloyd)
###########################################################################
Arcuebus
===========================================================================
Last Updated: 25th October 1992
Aliases:
Origin: UK
Isolation Date: October 1992
Effective Length: 9619 bytes
Virus Type: Resident application infector
Symptoms: Extra module files appear in applications
---------------------------------------------------------------------------
Detection Media: Killer 1.381+ Memory: Killer 1.381+
VProtect 1.24+
Removal Media: Killer 1.381+ Memory: Killer 1.381+
---------------------------------------------------------------------------
General Comments:
This virus spreads as a module within applications. The module has
eight possible names: ProgUtil, Resource, InfoFile, SystemRS, ModularR,
PureMath, SoundMdl and GraphMdl. When loaded (from a !Boot file)
it installs itself as a NetStatus 3.07 (15 Sep 1988).
A quick check for this virus is to press <F12> and type 'Help Virus'.
The following text will be displayed:
Congratulations. Your system has the Arcuebus virus.
The following data may interest you:-
Virus generation number: Dnnn
This copy was born: <date/time>
At the same time a sound sample (loaded as a voice called Percussion-Bass)
is played. This says 'I am a servant of the <???>'. If anyone who
hears this has a good idea what the last word is - do tell us!
(Source: Paul Frohock)
###########################################################################
BBCEconet
===========================================================================
Last Updated: 29th June 1992
Aliases:
Origin: United Kingdom
Isolation Date: April 1992
Effective Length: 5280 bytes
Virus Type: Resident Absolute (FF8) file infector.
Symptoms: Module "BBCEconet 0.09" resident in RMA (&018xxxxx)
(see also Mode87!).
---------------------------------------------------------------------------
Detection Media: Killer 1.33+ Memory: Killer 1.33+
Scanner 1.33+ Interferon 2.12+
Scanner 1.34+
VProtect 1.15+
Removal Media: Killer 1.33+ Memory: Killer 1.33+
Scanner 1.34+
---------------------------------------------------------------------------
General Comments:
The action of this virus bears a marked similarity to Link, i.e.
it appends code to absolutes and uses a module to perform the infection
(in this case BBCEconet, which it installs).
As with Link, it attempts to infect %.Squeeze. However, both viruses
use the same check to see whether a file is infected so it is not
possible to have an absolute simultaneously infected by Link and
BBCEconet.
The majority of this virus is kept encrypted when it is not executing,
and it also encrypts a segment at the beginning of the absolute file.
The encryption key changes with each infection. In short, you need
dedicated software to remove it.
The datestamp will not change, and as with Link, it temporarily patches
Interferon to allow itself to infect without any alarms being given.
There are various date fired routines, outlined below.
Friday 13th:
It's Friday! Why are you working?
I first infected a commercial program with good help from
Dr. Blob.
Now you're infected too - and probably most of your penpals.
I've got more in store!
And... I've created XXXX copies of myself.
Good luck!
December 25th:
Merry Christmas!
April 1st:
E.T. phones home!
(It sends ATD 0749 679794 to the serial port, so if you have a Hayes
compatible modem connected, it will dial this number - a well-known
bulletin board service in Somerset.)
June 25th:
Ph'nglui mglw'nafh Chtulhu R'lyeh fthagn.
And... I've created XXXX copies of myself.
[The non-english part of this message was introduced by H.P. Lovecraft
in his short story The Call of Cthulhu, where it translates to "In
his house at R'lyeh, dead Cthulhu waits dreaming." Probably used
by the virus writer as proof that he has read this book.]
All of these messages will appear in an error box titled "Ouch! You've
been bitten!" It may also clear the screen and print the word "LOVE"
in mode 12.
(Source: Alan Glover)
###########################################################################
Bigfoot
===========================================================================
Last Updated: 11th September 1992
Aliases:
Origin: United Kingdom
Isolation Date: August 1992
Effective Length: 5535 or 5580 bytes
Virus Type: Task. Stores code as separate file.
Symptoms: Additional files with random names in capital
letters appear in applications
---------------------------------------------------------------------------
Detection Media: Killer 1.381+ Memory: Killer 1.381+
Scanner 1.47+ (5580 byte strain only?)
Removal Media: Killer 1.381+ Memory: Killer 1.381+
delete named file, remove line from !Boot.
---------------------------------------------------------------------------
General Comments:
This is a fairly simple BASIC program, which installs as a desktop
task called Bigfoot.
It has messages for certain dates, namely:
25 Dec:
Happy Christmas from BigFoot ... The VIRUS
05 Nov:
"Wizz Bang! Its Guyfalks night BigFoot Strikes again!
04 Jul:
"Hay there its the 4th of July ,American Independence! Best wishes
from BigFoot
15 Mar:
This is a HOLD UP! Give me all the PD software you can get,,, Or
you SYSTEM gets it!!! By the way its the end of the fishing season.
It infects by creating or modifying the !Boot file, using a random
name of 1-10 upper case characters. The virus is saved as a BASIC
file of the same name. However the BASIC itself always has REM>Bigfoot
on the first line.
Apart from spreading, it has no malicious code.
The 5535 byte version can not be Quitted from the Task Manager.
(Source: Alan Glover, with thanks to Paul Frohock and David Cox for
initial analysis)
###########################################################################
CeBIT
===========================================================================
Last Updated: 21st April 1992
Aliases: Lord of Darkness, TlodMod
Origin: Germany
Isolation Date: March 1991
Effective Length: 1240 bytes
Virus Type: Resident !Boot file infector, stores code as
separate file.
Symptoms: File "TlodMod" in application directories.
---------------------------------------------------------------------------
Detection Media: Killer 1.17+ Memory: Interferon 2.00+
Scanner 1.23+ Killer 1.17+
VProtect 1.06+ Scanner 1.20+
Removal Media: Killer 1.17+ Memory: Killer 1.17+
delete named file, remove last line from !Boot.
---------------------------------------------------------------------------
General Comments:
This is a module called "TlodMod" with the following title string:
TlodMod 1.11 (11 Nov 1990) by Devil the LORD OF DARKNESS
It is 1240 (&4D8) bytes long and hooks itself into UpCallV. It then
activates once a minute and first checks for the existence of <Obey$Dir>.TlodMod.
If this already exists, then no further action is taken. If it doesn't,
however, it then attempts to append the following line to <Obey$Dir>.!Boot:
rme. TlodMod 0 rml. <Obey$Dir>.TlodMod
If it succeeds at this, a counter is incremented and the module is
replicated as <Obey$Dir>.TlodMod. Every 16th successful infection
will trip the virus into issuing a "*Wipe $.path.file*" (which will
inevitably fail!) and then displaying a message accompanied by a
simple graphic.
The message displayed is thus:
This is a warning to all Users,
I am back on the Archimedes ...
Your Archie is infected now and
with him most of your programms.
Don't worry, nothing is damaged,
but keep in mind the protection!
And always think about the other
side of THE LORD OF DARKNESS ...
Virus generation is <counter>
(Source: Richard K. Lloyd)
###########################################################################
Code
===========================================================================
Last Updated: 11th September 1992
Aliases:
Origin: UK
Isolation Date: June 1992
Effective Length: 2251 bytes
Virus Type: Resident !Boot file infector, stores code as
separate file.
Symptoms: File "Code" in application directories.
---------------------------------------------------------------------------
Detection Media: Killer 1.360+ Memory: Killer 1.360+
Scanner 1.42+ VProtect 1.17+
Removal Media: Killer 1.360+ Memory: Killer 1.360+
Scanner 1.42+
---------------------------------------------------------------------------
General Comments:
This virus installs itself as a desktop task called "Window Manager".
The 'Code' file is filetyped as &FF8, but is actually plain BASIC.
The virus can either extend a !Boot or create one - if one is created
it will be 44 bytes long.
The only effects from this virus will be the the loss of sprites
for some applications, since the !Boot file it creates does not contain
an IconSprites statement to load the sprites.
(Source: Alan Glover)
###########################################################################
Extend
===========================================================================
Last Updated: 21st April 1992
Aliases:
Origin: United Kingdom
Isolation Date: October 1990
Effective Length: 940 bytes
Virus Type: Resident task. Stores code as separate file.
Symptoms: File "MonitorRM", "CheckMod", "ExtendRM", "OSextend",
"ColourRM", "Fastmod", "CodeRM" or "MemRM" in
application directory. Each time the code is
executed it grabs 1k of RMA - this will eventually
lead to a system crash.
---------------------------------------------------------------------------
Detection Media: Killer 1.17+ Memory: Interferon 2.00+
VProtect 1.06+ Killer 1.17+
Hunter 1.00+ Scanner 1.20+
Scanner 1.36+
Removal Media: Killer 1.17+ Memory: Killer 1.17+
delete named file, remove extra lines from !Boot.
---------------------------------------------------------------------------
General Comments:
It's a module which can go under 8 different filenames (the name
is picked at random using the current time as a seed):
MonitorRM, CheckMod, ExtendRM, OSextend, ColourRM, Fastmod, CodeRM
or MemRM.
However, the module itself has the following title string:
Extend 1.56 (08 Jul 1989)
It is 940 (&3AC) bytes long and initialises itself as a nameless
Wimp task which then looks for Wimp Message 5 (double-click). It
attempts to either create an !Boot in the application directory or
append to an already existing one with the following lines:
IconSprites <Obey$Dir>.!Sprites [0D]
RMEnsure Extend 0 RMRun <Obey$Dir>.ModName [0D]
||[FF]
The "IconSprites" line is omitted if it is appended to an existing
!Boot. "ModName" is one of the 8 possible filenames. The Extend Virus
uses the &FF (i.e. decimal 255) byte at the end as a self-check to
see if has infected the !Boot file already. Of course, it copies
itself to the new name inside the application directory as you would
expect. Note the incorrect use of &0D (decimal 13) to terminate the
lines, rather than the more correct &0A (decimal 10).
A shift-double-click does NOT cause an infection, but it DOES claim
yet another 1K of never-to-be-released RMA.
There is no damage apart from the claiming of RMA (which will eventually
lead to a system crash).
(Source: Richard K. Lloyd)
###########################################################################
Funky
===========================================================================
Last Updated: 25th October 1992
Aliases:
Origin: UK
Isolation Date: October 1992
Effective Length: 1308 bytes
Virus Type: Resident application infector
Symptoms: Sprite file called 'Funky!', application task
called 'Window Dude'
---------------------------------------------------------------------------
Detection Media: Killer 1.381+ Memory: Killer 1.381+
VProtect 1.24+
Removal Media: Killer 1.381+ Memory: Killer 1.381+
---------------------------------------------------------------------------
General Comments:
In common with the Icon family, this is a BASIC program hidden under
a Sprite filetype. It initialises as a desktop task called 'Window
Dude' and infects by saving copies of itself and amending !Boot files.
(Source: Paul Frohock)
###########################################################################
Garfield_I
===========================================================================
Last updated: 11th September 1992
Aliases:
Origin: United Kingdom
Isolation Date: June 1992
Effective Length: 1640, not including the files "!Boot", "!Run"
and "!Sprites".
Virus Type: Resident application infector.
Symptoms: Directory "!Pic" with files "!Boot", "!Run",
"!Mod" (module) and "!Sprites". Recursive infections
possible.
---------------------------------------------------------------------------
Detection Media: Killer 1.362+ Memory: Killer 1.362+
Scanner 1.42+ VProtect 1.20+
Scanner 1.47+
Removal Media: Killer 1.362+ Memory: Killer 1.362+
Scanner 1.42+ Scanner 1.47+
---------------------------------------------------------------------------
General Comments:
Garfield_I is a resident virus, lodging itself in the RMA as a module
"IconManager". When active, it creates a directory inside an application
called "!Pic" with the files "!Boot", "!Run", "!Mod" and "!Sprites".
The virus code is contained in "!Mod". It then proceeds to add the
following lines to the infected application's "!Boot" file:
RMEnsure IconManager 1.27 <obey$dir>.!pic
Garfield_I uses the default Acorn sprite file sprite, so a casual
glimpse in an application folder will not reveal it unless you a)
use a different sprite for sprite files or you b) open the folder
with "full info".
It does not check for multiple infections. Infected applications
will, more often than not, contain "!Pic" directories inside "!Pic"
directories.
Garfield_I activates on the first Monday of any month, displaying
"The Garfield Virus is here to stay"
then repeatedly
"Don't you just hate Mondays?"
until the machine is reset or switched off.
(Source: Alan Glover)
###########################################################################
Garfield_W
===========================================================================
Last Updated: 11th September 1992
Aliases:
Origin: United Kingdom
Isolation Date: June 1992
Effective Length: 1480, not including the files "!Boot", "!Run"
and "!Sprites".
Virus Type: Resident application infector.
Symptoms: Directory "!Obey" with files "!Boot", "!Run",
"!Mod" (module) and "!Sprites". Recursive infections
possible.
---------------------------------------------------------------------------
Detection Media: Killer 1.360+ Memory: Killer 1.360+
Scanner 1.41+ Scanner 1.41+
VProtect 1.17+ Interferon 2.00+
Removal Media: Killer 1.360+ Memory: Killer 1.360+
Scanner 1.41+
---------------------------------------------------------------------------
General Comments:
Garfield_W is a resident virus, lodging itself in the RMA as a module
"WimpAIDS". When active, it creates a directory inside an application
called "!Obey" with the files "!Boot", "!Run", "!Mod" and "!Sprites".
The virus code is contained in "!Mod". It then proceeds to add the
following lines to the infected application's "!Boot" file:
<Obey$Dir>.!Obey
|Above line is inoculation for the wimp virus
Garfield_W uses the default Acorn Obey file sprite, so a casual glimpse
in an application folder will not reveal it unless you a) use a different
sprite for obey files or you b) open the folder with "full info".
Garfield_W does not check for multiple infections. Infected applications
will, more often than not, contain "!Obey" directories inside "!Obey"
directories.
Garfield_W activates on the first Monday of any month, displaying
"The Garfield Virus is here to stay"
then repeatedly
"Don't you just hate Mondays?"
until the machine is reset or switched off.
[ Note: Although both Garfield_I and Garfield_W call themselves Garfield,
and give the same message, we have given them separate entries since
certain items differ between them - notably application and module
names. ]
(Source: Alan Glover)
###########################################################################
Handler
===========================================================================
Last Updated: 25th October 1992
Aliases:
Origin: UK
Isolation Date: October 1992
Effective Length: 1532 bytes
Virus Type: Resident application infector
Symptoms: Desktop Task called 'Task Handler'.
---------------------------------------------------------------------------
Detection Media: Killer 1.381+ Memory: Killer 1.381+
VProtect 1.24+
Removal Media: Killer 1.381+ Memory: Killer 1.381+
---------------------------------------------------------------------------
General Comments:
This virus is loaded by a !run file, so is likely to spread slower
than most. It renames the original !Run file to Obey. The virus itself
is in an absolute called Handler.
It may display a message:
You have been infected with the Handler VIRUS
The Virus is just to see how good a program can infect
Sorry if it has up set you in any way, Thats about all i can
say!
Generation :
Press any key to change the channel.
(Source: Paul Frohock)
###########################################################################
Icon
===========================================================================
Last Updated: 7th July 1992
Aliases: Icon-A, Filer, Poison, NewVirus
Origin: United Kingdom
Isolation Date: 1990?
Effective Length: 5498 bytes in base version
Virus Type: Task. Stores code as separate file.
Symptoms: Nameless wimp task on the Task Manager. Silly
error messages may appear without reason. The
files "Icon", "Poison", "Splodge" or "NewVirus"
in application directories
---------------------------------------------------------------------------
Detection Media: Killer 1.17+ Memory: Killer 1.17+
Scanner 1.32+ Scanner 1.32+
IVSearch 2.05+ (note 1)
VProtect 1.06+
Hunter 1.00+ (note 1)
Removal Media: Killer 1.17+ Memory: Killer 1.17+
delete named file, remove last line from !Boot.
---------------------------------------------------------------------------
General Comments:
The Icon virus family is a type of very contagious viruses. They
are harmless to that extent that they do not destroy files. However,
they are very annoying (although I must admit some of the messages
were quite amusing!). Common for all the viruses in the Icon family
is that the virus is an unnamed wimp task written in BASIC. It spreads
by adding a few lines to the !Boot file of an application (without
checking for multiple infections), and then saving the code as a
file as with filetype sprite.
<set the wimpslot>
BASIC -quit <obey$dir>.<virusfile>
The original virus displayed a stupid error message on start-up,
and then every so often after that. Commonly also called the Filer
virus as the error message header claims that it's from the Filer.
Here are a few examples of what type of error messages which might
appear:
".desreveR maertS tuptuO"
"This error should not occur."
"Previous error did not occur."
"Could not reach top of stack."
Known variant(s) of the Icon virus are:
Icon-2096
Filename: Poison
Random error code replaced with a *I am stuck - which might log the
user on to a network if they're very unfortunate!
Icon-2616
Filename: Icon
No silly messages from this version - also has the name of the person
who modified it (yes, the UK Computer Crimes Unit have acted on
this!).
Icon-2631
Filename: Splodge
Identical to 2616, except the change of name.
Icon-5498
Filename: Icon, though the in-core name is 'Extra'.
Does have silly messages.
Icon-5574
Filename: Icon
As 5498 with missing Hourglass_On call added. Silly message less
likely to appear when it is loaded.
Icon-5737
Filename: NewVirus
As 5574, but with a three-key sequence to exit the program. High
likelihood of a silly error at startup. Insignificant changes to
!Boot save routine.
Icon-5742
Filename: Icon
Bugfix of 5737. Less likely to give silly errors when loaded.
(Source: Alan Glover)
###########################################################################
Image
===========================================================================
Last Updated: 21st April 1992
Aliases:
Origin: Northern Ireland ?
Isolation Date: Jan. 1992 by Svlad Cjelli
Effective Length: 512 bytes
Virus Type: Resident, although not in RMA
Symptoms: Files "Image" and "!Spr" in application directories.
The file "image" has no filetype, but !Spr has
the type Obey.
---------------------------------------------------------------------------
Detection Media: Killer 1.26+ Memory: Killer 1.26+
Scanner 1.13+
VProtect 1.07+
Removal Media: Killer 1.26+ Memory: Killer 1.26+
Scanner 1.15+
delete "Image". If there is a "!Spr" file, delete
!Run and rename !Spr as !Run, otherwise delete
!Boot.
---------------------------------------------------------------------------
General Comments:
This virus carries no payload, but spreads VERY fast, to the extent
that you can delete the file, only to see it instantly re-appear
again if it is in memory!
It loads its code into the OS workspace, at &5500, it is therefore
liable to crash the machine should the OS use that area of workspace.
The !Run or !Boot file looks like this:
LOAD <OBEY$DIR>.IMAGE 5500[0d]GO 5500[0d]
It's action on infection is to save <Obey$Dir>.Image, and then either
to create a !Boot file if one does not exist, or if it does, rename
the !Run file to !Spr and then create a new !Run file.
(Sources: Alan Glover, Svlad Cjelli)
###########################################################################
Increment
===========================================================================
Last Updated: 18th September 1992
Aliases:
Origin: UK, Cornwall ?
Isolation Date: September 1992
Effective Length: 464 bytes
Virus Type: Resident
Symptoms: CMOS configuration settings seem to change randomly
---------------------------------------------------------------------------
Detection Media: Killer 1.375+ Memory: Killer 1.375+
Scanner 1.49+ Scanner 1.49+
VProtect 1.23+
Removal Media: Killer 1.375+ Memory: Killer 1.375+
---------------------------------------------------------------------------
General Comments:
The virus appends itself to existing !boot files. The virus may not
be immediately obvious when an infected !boot file is viewed in !Edit
because it inserts 28 or more line feeds between the legitimate file
and the viral appendage. However CTRL-Down Arrow will move down to
the bottom of the file and expose the telltale signs of a machine
code appendage on the end of the file.
On each infection the virus will increment a CMOS RAM location -
the location is incremented too on each infection with the effect
of seemingly random problems appearing (including ROM modules becoming
unplugged for example).
(Source: Alan Glover, with thanks to Lee Davies)
###########################################################################
Irqfix
===========================================================================
Last Updated: 14th September 1992
Aliases:
Origin: United Kingdom
Isolation Date: September 1992
Effective Length: 940 bytes
Virus Type: Resident task. Stores code as separate file.
Symptoms: File "RiscExtRM", "WimpPoll", "OSSystem", "MiscUtil",
"FastRom", "IRQFix" or "AppRM" in application
directory. Each time the code is executed it
grabs 1k of RMA - this will eventually lead to
a system crash.
---------------------------------------------------------------------------
Detection Media: Killer 1.374+ Memory: Killer 1.374+
Scanner 1.48+ Scanner 1.48+
VProtect 1.22+
Removal Media: Killer 1.374+ Memory: Killer 1.374+
Scanner 1.48+
delete named file, remove extra lines from !Boot.
---------------------------------------------------------------------------
General Comments:
This is a variant of Extend which uses IRQFix as the module name,
and different filenames. In all other respects the code is identical
to Extend.
(Source: Alan Glover, with thanks to Alex Belton)
###########################################################################
Link
===========================================================================
Last Updated: 21st April 1992
Aliases:
Origin: United Kingdom
Isolation Date: January 10th, 1992
Effective Length: 1416 bytes
Virus Type: Resident Absolute file infector. Also a Trojan
Horse.
Symptoms: Module 'BSToDel' in module list. Files are re-stamped.
---------------------------------------------------------------------------
Detection Media: Killer 1.27+ Memory: Interferon 2.10+
Scanner 1.03+ Killer 1.27+
Hunter 1.16+ Hunter 1.16+
Scanner 1.20+
Removal Media: Killer 1.27+ Memory: Killer 1.27+
Hunter 1.16+ Inteferon 2.10+
Scanner 1.20+ Hunter 1.16+
Scanner 1.20+
---------------------------------------------------------------------------
General Comments:
The reason why I found the Link virus was because of the module 'BSToDel'
appearing in the module list. Also, suddenly Killer 1.17 didn't work
(It gave an "Integrity check failed" and refused to load)! As I already
have made my own 'backspace to delete' utility as a module, I wondered
where that module came from! (It certainly wasn't as a separate module
on the disc.)
Before installing itself as a module, it infects %.Squeeze (if there
is a library directory, and if Squeeze is indeed in it) - just in
case there wasn't enough room in the RMA. Then it hooks onto the
FSControlV and InsV vectors. The latter so that it can do what the
module title expects it to do: convert backspace (&08) to delete
(&7F) (the reason why I also typed it as a Trojan Horse).
The FSControl vector is used so that it can look for certain actions
- namely *Run and *Copy. When it detects one of these, it does the
following.
Replaces the first three instructions in the file with its own, making
an absolute branch to the end of the file. The rest of the module
is then stored here, with the original three instructions too. To
make
detection a bit more difficult, it encrypts itself with an EOR variant
(different key each time).
On any Friday the 13th, it will display the message
Message from LINK: Active since 30-Nov-91
every time it infects a program. [As Alan pointed out, this date
is fixed, so meaning that it bears no relationship to the time which
a system became infected.]
The virus does no damage apart from attaching itself to files. Files
infected by the Link virus are re-stamped to the date they were infected.
Also, at the end of the module (and effectively each infected file
- although encrypted) the word 'LINK' appears. I first thought this
was used as an 'already infected' flag, but this is not so. What
it does is check the second instruction in the file, and if this
is 'MOV PC,R0' (probably reckons that few programs have this as their
second instruction) it recognizes it as infected. If not, the file
is infected. This method of checking the file might add to the difficulty
of making an inoculator.
Why didn't Interferon detect this virus?
At first, I thought that there might be a bug in Interferon, but
as I found out, the Link virus checks to see if Interferon is in
memory by using OS_Module 18 (look-up module name). By doing this,
it also finds where the module code is. Then, it changes a CMP instruction
within the code so that Interferon never detects OS_GBPB. After the
infection is finished, the Link virus changes the code back to what
it was. [I'm working on a CRC routine for a future version of Interferon
at the moment, so Interferon should be 100% operational 'real soon
now'.]
###########################################################################
Mode87
===========================================================================
Last Updated: 11th September 1992
Aliases:
Origin: Unknown. UK?
Isolation Date: Unknown - possibly autumn 1991
Effective Length: 848 bytes
Virus Type: Resident !Boot file infector.
Symptoms: Module 'Mode87' in application directories.
---------------------------------------------------------------------------
Detection Media: Killer 1.360+ Memory: Killer 1.360+
Scanner 1.41+ Interferon 1.10+
VProtect 1.17+
Removal Media: Killer 1.360+ Memory: Killer 1.360+
Scanner 1.41+
---------------------------------------------------------------------------
General Comments:
Mode87 installs itself in the RMA as "BBCEconet". The way to tell
the difference from this and the original Acorn network module, is
that the address of where the module lies is at &01xxxxxx instead
of a ROM address (&03xxxxxx) by typing *Modules. If Acorn's original
module is not *Unplugged, it will install itself on top of this,
and not easily seen in the module list.
Mode87 is not malevolent. Although it destroys the original !Boot
file of an application, it is not treated as a virus with serious
damage potential. Mode87 simply overwrites any !Boot file already
there (and if there isn't one, it creates a new one) with:
| Boot file
IconSprites <Obey$Dir>.!Sprites
RMLoad <Obey$Dir>.Mode87
[00][00][00]
Then it proceeds to save itself as a module with the filename "Mode87".
If it has reached an infection count of 256, an expanding circle
(black, if you are using the standard desktop palette) will "eat"
your screen. Control will then return to normal.
Mode87 releases its vector claim on OS_FSControl, so it is quite
safe to *RMKill it.
(Source: Tor Houghton)
###########################################################################
Module
===========================================================================
Last Updated: 11th September 1992
Aliases: Illegal, ModVir
Origin: Unknown
Isolation Date: October 1991
Effective Length: 956 bytes
Virus Type: Resident module infector.
Symptoms: Modules grow by approx. 1k, and are re-datestamped.
May cause system crashes when accessing files
(load, save, etc.
---------------------------------------------------------------------------
Detection Media: Killer 1.17+ Memory: Interferon 2.00+
Hunter 1.00+ Killer 1.17+
Scanner 1.14+ Hunter 1.00+
VProtect 1.10+
Removal Media: Killer 1.26+ Memory: Killer 1.26+
Hunter 1.00+ Hunter 1.00+
Scanner 1.46+
---------------------------------------------------------------------------
General Comments:
This is a very nicely written virus which appends itself to modules,
redirecting three module entry points to pass through itself before
being handed on to the module's original entry point. It spreads
by infecting a module as it is loaded, and then the newly loaded
module infects the next one loaded, and so on...
This virus is likely to be very widespread, since it was distributed
on the Archimedes World February 1992 cover disc in the MicroDrive
demo (in it, several modules were infected). It does nothing until
6th September 1992, when it will display the message:
Your computer has been virus infected. This is intended to be a friendly
virus, and hasn't done any damage to your disc as is possible now,
but it isn't active anymore from now on. Be more careful with illegal
software next time!
[Along with a generation counter. Another interesting observation
is that it does not infect locked modules. Infects whenever it notices
a RUN or LOAD action on a module. As a result, THIS VIRUS IS EXTREMELY
CONTAGIOUS.]
The message that it isn't active anymore is not true! It ALWAYS (even
after 06-Sep-1992) attaches itself to the OS_File (FileV) vector.
The virus first calls the previous owner of the OS_File vector (FileSwitch?).
This means that the module will be loaded and initialised. If the
length of the module minus the initialise word of the module is equal
to 956 (i.e. the length of the virus), then the module is already
infected and the virus deactivates itself (the newly loaded module
has already attached itself to the OS_File vector). If the module
isn't infected, the virus attaches itself at the end of the module,
overwriting the init/final/service words in the module header, preserving
the original 3 words.
(Source: Alan Glover, Michel Fasen)
###########################################################################
MyMod
===========================================================================
Last Updated: 21st April 1992
Aliases: Silicon Herpes
Origin: United Kingdom
Isolation Date: June-August 1991
Effective Length: 2948 bytes
Virus Type: Resident
Symptoms: Additional files "SSLM" (filetype Module) and
"SSLF" in application directories. Message on
every Friday the 13th. Module "MyMod" in module
list.
---------------------------------------------------------------------------
Detection Media: Killer 1.17+ Memory: Interferon 2.00+
Scanner 1.15+ Killer 1.17+
VProtect 1.10+ Scanner 1.20+
Hunter 1.16+ Hunter 1.16+
Removal Media: Killer 1.17+ Memory: Killer 1.17+
Scanner 1.16+ Hunter 1.16+
Interferon 2.10+
Scanner 1.20+
delete "SSLM", rename "SSLF" to !Boot.
---------------------------------------------------------------------------
General Comments:
This works by redirecting the Alias$@RunType for Obey files, so spreads
very fast.
Once on each Friday 13th you'll get this message:
Hi there. It's me, with my latest addition to the ARCHIMEDIES range
of computer programs. This one's called silicon herpes. It's annoying
but DOES NO REAL DAMAGE!!!
Anyway, it's Friday the 13th, and what can you expect. Acorn state
that RISC OS has high protection against programs of this nature.
I can't call it a virus, as a virus does damage
With Acorn making these bold statements about RISC OS I decided to
write a demonstration to disprove their theories. I must admit
though, it was quite difficult.
Anyway, I don't want to keep you so I'd like to say, have a very
happy Christmas, Easter, Summer or what ever, and hang kickin
There's a likelihood of various spurious errors from one of the variants
(both are the same length) since it addresses application memory
directly!
(Source: Alan Glover)
###########################################################################
NetManager
===========================================================================
Last Updated: 11th September 1992
Aliases:
Origin: United Kingdom
Isolation Date: June-August 1991
Effective Length: 900 bytes
Virus Type: Resident !Boot file infector
Symptoms: Module 'NetManager' in module list.
---------------------------------------------------------------------------
Detection Media: Killer 1.17+ Memory: Interferon 2.00+
VProtect 1.10+ Killer 1.17+
Scanner 1.40+ Scanner 1.20+
Removal Media: Killer 1.17+ Memory: Killer 1.17
Scanner 1.40+ Scanner 1.20+
Interferon 2.10+
delete !Boot. RMKill NetManager
---------------------------------------------------------------------------
General Comments:
I believe this to be the prototype for, or maybe the inspiration
for, the TrapHandler virus. Although the coding is quite different
in places, there's quite a similarity in the design.
There are a number of coding errors in the virus, most notably around
the time bomb area, making it harmless in this form. The intention
of the code is to check for Friday 13th, and display a message, however
it will never detonate (... unless there's a fixed version in circulation
... though that's what I believe TrapHandler is). It's fortunate
that it never displays the message, because there's another coding
error and the message isn't actually there!
(Source: Alan Glover)
###########################################################################
NetStatus
===========================================================================
Last Updated: 21st April 1992
Aliases: Boot
Origin: Norway or Belgium
Isolation Date: October 1991
Effective Length: 2048 or 2072 bytes
Virus Type: Resident !Boot file infector
Symptoms: !Boot filelength increase.
---------------------------------------------------------------------------
Detection Media: Killer 1.27+ Memory: Interferon 1.10+
Scanner 1.02+ Killer 1.27+
VProtect 1.10+ Scanner 1.20+
Hunter 1.16+ Hunter 1.16+
VirusKill 1.00+
Removal Media: Killer 1.27+ Memory: Killer 1.27+
Scanner 1.17+ Hunter 1.16+
Hunter 1.16+ Interferon 1.10+
Scanner 1.20+
RMKill NetStatus
---------------------------------------------------------------------------
General Comments:
NetStatus is written as a module, and in many ways it functions exactly
the same way as the TrapHandler virus, as it saves all of its code
in an application's !Boot file. It differs strongly from from this
one, however, as NetStatus does not overwrite the !Boot file. The
original !Boot instructions are executed after the virus has been
loaded, making it more difficult to spot than TrapHandler.
Some times a message will appear (after a mode change):
Hello, there.
Just a little message.
The infection count is: <infection count>
This program is harmless
10 Jun 1991
[This message is encrypted, and will neither show up in memory nor
in the infected !Boot file.]
One might think that NetStatus should be placed as a 'variant' of
TrapHandler, as the way the two viruses work are so similar (both
viruses work by loading the !Boot file into memory below &8000 and
then jumping to the code). However, seeing that the code itself was
so different, I chose to let it have it's own entry. Also, NetStatus
infects the !Boot file instead of overwriting it! If you think you
might have been infected by this virus, do *Help NetStatus to see
if it is version 2.00, and if it is, do a *Modules to check where
it resides. If the address is 018xxxxx then you are infected, if
not, the address should be 038xxxxx. [This virus has the potential
to cause chaos on Econet networks, where it will replace the real
NetStatus module - causing anything that relies on it to fail.]
Known variant(s) of the NetStatus virus are:
NetStatus-2048
This appears to be an earlier version of NetStatus. Some code is
missing in this version, but they appear identical in operation.
Please note that not many virus killers are aware of both versions.
If it understands only one strain, the !Boot file will become corrupt.
###########################################################################
Parasite
===========================================================================
Last Updated: 21st April 1992
Aliases:
Origin: UK, Cheshire?
Isolation Date: January 1992 by S. Haeck
Effective Length: 6K & 7K
Virus Type: Resident application infector, stores code as
separate file.
Symptoms: Additional modules appearing within applications
---------------------------------------------------------------------------
Detection Media: Killer 1.27+ Memory: Killer 1.27+
Scanner 1.23+ Scanner 1.20+
VProtect 1.12+
Removal Media: Killer 1.27+ Memory: Killer 1.27+
---------------------------------------------------------------------------
General Comments:
This is a **very** nasty virus. Handle any infections with care!
The parasite virus was first discovered by S. Haeck in January 1992.
The two strains are identical, except that the first always uses
the same name for it's module, and the second has a random choice
of 20 (twenty) filenames. It will only activate on machines whose
network station number is <80 - which will include non-networked
machines, which typically have 0 or 1 in the CMOS. Do NOT try to
RMKill the module - a delayed action machine crash will result. It
will *wipe any of the following file/directory names - !vkiller,
vir, shield, prot and !guardian - this points at a UK origin since
it is not aware of Scanner.
It has a whole repertoire of dirty tricks, which are time triggered:
- Corruption of the net printer name (it uses this as workspace)
- Midnight, and xx:13: crash the computer
- Before 07:00: crash the computer 300-900 seconds later
- 00:00 to 00:59 on 1st Jan: crash the computer
- 1st of any month: claim 16K of RMA (not used)
- 21st June: set MouseStep to 1
- 21st December: set MouseStep to 127 (fast!)
- 29th February: Set MouseStep to -5 (fast, and reversed)
- If there is a 0 in the time, and the virus loaded from SCSI:*unplug
the Podule Manager (disabling the SCSI disc) - At 0x and x0 seconds,
if the module came from IDEFS: alias the IconSprites command so that
no further sprites are cached
Furthermore, there are some which can be fired at any time:
1 in 50: Change sound settings
1 in 25: Redefine character set to all spaces after 60-240 seconds
1 in 60: Corrupt the disc in drive 0
Lastly, there are a group of serious actions (which are limited so
only a certain number occur within a given period):
- Before 08:00 (14:00 Sundays): configure number of hard and floppy
drives to zero.
- Mondays: Configure Fontsize 0K, SpriteSize 512K, which will cripple
a 1Mb machine!
- 25th December: Configure MonitorType 3, Sync 0
- A 7 in the time: Configure Country to Greece
- 1 in 4: Configure ADFS, Harddiscs 2, Drive 5 (very tricky if you
don't happen to have two ST506 drives)
The module names which it can use are:
FontLibrary, CodeLibrary, ScreenObjct, PromptsPick, HPIBIntMngr,
PRomModules, BasicCryptr, ChrSelecter, WimpModMake, PaletteUtl2,
ModeUtility, FontUtility, TempManager, ColourConvt, IndexReader,
ArthurImage, SyncUtility, VIDCManager, FontPalette, HugoFiennes.
The first (6435 byte) strain always uses the name FontLibrary.
Note that Hugo Fiennes, whose name appears at several points in the
code, as well as being one of the module filenames, has much better
things to do than write viruses, and has no known connection with
this virus!
(Source: Alan Glover, with thanks to Geoff Riley for much of the
decoding)
###########################################################################
Runopt
===========================================================================
Last Updated: 25th October 1992
Aliases:
Origin: UK
Isolation Date: October 1992
Effective Length: 1684 bytes
Virus Type: Resident application infector
Symptoms: Desktop APPLICATION Task called 'Task Manager'.
---------------------------------------------------------------------------
Detection Media: Killer 1.381+ Memory: Killer 1.381+
VProtect 1.24+
Removal Media: Killer 1.381+ Memory: Killer 1.381+
---------------------------------------------------------------------------
General Comments:
In a similar manner to Icon, this virus uses a !Boot file to load
a BASIC program. The program is called RunOpt!, and is filetyped
as data.
Note that the real 'Task Manager' shows up as a module task NOT an
application task.
(Source: Paul Frohock)
###########################################################################
Sprite
===========================================================================
Last Updated: 21st April 1992
Aliases: 'Really Annoying Sprite Virus'
Origin: Germany ? Ireland ?
Isolation Date: February 1992 by Svlad Cjelli
Effective Length: 720 bytes
Virus Type: Resident application infector, stores code as
separate file.
Symptoms: File "Sprite" and maybe !Str in applications
---------------------------------------------------------------------------
Detection Media: Killer 1.27+ Memory: Killer 1.27+
Scanner 1.23+
Removal Media: Killer 1.27+ Memory: Killer 1.27+
delete Sprite, delete !Boot OR delete !Run and
rename !Str to !Run (depending whether !Str is
present or not).
---------------------------------------------------------------------------
General Comments:
This has got some similarities with Image, but until I've (Alan)
had a chance to do a code comparison, I'm not going to class them
as members of the same virus family.
In months which begin with an F it will change the pointer settings.
As far as I can tell, the parameter block is junk, and it's hard
to tell whether the call will return! If it does, a delayed routine
is programmed, which when entered will do FX200,3, zero all the CMOS
RAM, and display a message.
The message is:
Piracy IS theft - Your SYSTEM is DOOMED - Deutschland Uber Alles!
For people like me who don't know any German, a liberal translation
is 'Germany is best'. This is encrypted, so is not usually visible.
Important note: Initial reports about this virus suggested that it
could cause disc corruption. Aside from possible errors during attempted
infections, it does not have any maliciously targetted code for filing
systems.
Infection is by saving the virus code as 'Sprite' (filetyped as such),
and either creating a !Boot, or renaming !Run to !Str and saving
a new !Run which runs !Str.
(Source: Alan Glover, with thanks to Svlad Cjelli)
###########################################################################
SpriteUtils
===========================================================================
Last Updated: 11th September 1992
Aliases:
Origin: UK
Isolation Date: June 1992
Effective Length: 3028 bytes
Virus Type: Resident application infector, stores code as
separate file.
Symptoms: File "Sprutils" appears in applications
---------------------------------------------------------------------------
Detection Media: Killer 1.360+ Memory: Killer 1.360+
VProtect 1.17+
Scanner 1.42+
Removal Media: Killer 1.360+ Memory: Killer 1.360+
Scanner 1.42+
---------------------------------------------------------------------------
General Comments:
This virus spreads by inserting a line in !run files, loading a trojan
SpriteUtils module.
It is my opinion that this virus is designed as an enabling tool
for further unpleasant activities triggered remotely over a network.
My reason for concluding this is that in addition to normal spreading
and replication it goes to great pains to alter the Econet Protection
setting to enable User Remote Procedure Calls.
It intercepts the SWI vectors to process Econet_SetProtection and
Econet_ReadProtection to return, and allow modification of, the value
which was present when the virus started.
It then supports two RPCs, one to turn off all protection, and the
other to restore the setting with just RPCs enabled.
It also attempts to disable VProtect, and will succeed with earlier
versions. However, a new version of VProtect will have no problem
in preventing the virus from being loaded in to a clean machine.
It has no timed or other malicious contents, however as usual there
are some consequences of the way it is written.
In particular, it will claim 2K of RMA workspace, and never release
it, nor does it restore the Econet protection setting it first found.
(Source: Alan Glover)
###########################################################################
T2
===========================================================================
Last Updated: 11th September 1992
Aliases:
Origin: United Kingdom
Isolation Date: July 1992
Effective Length: 4304 bytes
Virus Type: Merges with absolute !RunImage files.
Symptoms: Messages from "T2" and spurious errors.
---------------------------------------------------------------------------
Detection Media: Killer 1.370+ Memory: Killer 1.370+
VProtect 1.20+ Scanner 1.43+
Scanner 1.43+
Removal Media: Killer 1.370+ Memory: Killer 1.370+
---------------------------------------------------------------------------
General Comments:
This is a very dangerous virus, which can cause severe data loss
if not treated rapidly.
On 1st Jan, 14th Feb, 1st May, 4th July, 31st October, 25th December
and Friday 13th a message from T2 will be displayed and it will write
invalid data to the first 32K of ADFS drives 0-7. On D or E format
floppies this will destroy the FS Map and Root Directory, on D format
hard discs it will destroy the boot block, FS Map and Root Directory.
On E format hard discs, it will destroy the boot block only, since
the Free Space map and Root directory are elsewhere on the disc surface.
It will also attempt to do the same to Nexus drives 4-7.
The messages are:
December 25th
Yuletide Jollities from T2
A special christmas present: New blank disks all round.
1st January
New Year's Resolution from T2
New Year's Resolution: I will keep my disks write protected.
14th February
St. Valentine's Day
Roses are red, Violets are blue, I've wiped your hard disk, Because
I hate you.
1st May
Mayday from T2
Mayday, mayday, mayday: your data's sinking.
31st October
Spookiness from T2
You've got a vicious virus AND blanked disks - spooky huh?
July 4th
Independence Day celebrations from T2
You are now fully independent of your saved data.
Friday 13th
Comiserations from T2
Bad luck, me ol' China. Your disks have kinda left you in the lurch,
as it were. Unfortunate, huh?
And the random choice ones:
Greetings from T2
I hate you. F*ck off and die. Painfully.
Comment from T2
You stink of sh*t.
Observation from T2
You're a f*cking c*nt.
Hi there, from your friendly virus
Hi there. You may (or may not) know me. I'm a virus. User meet
T2. T2 meet user. Good ... See ya around.
It also has a random chance routine, based on a 0.1 second timer,
which has various possible effects, including:
- A rude message (see above)
- Scrambled CMOS memory
- Crashing the machine
- Destroying disc data (as above)
There is not an easy quick check for this virus, since it will not
show up as a module or desktop task. The easiest way I can come up
with to do the following from BASIC (ensure that VProtect 1.20 or
above is NOT loaded to avoid a false alarm).
SYS "XOS_ServiceCall",,&C0FFEE TO ,A%:PRINT A%
If the number printed is zero, and VProtect 1.20+ is not loaded (or
any other anti-virus program aware of this virus) then it is loaded
and active.
(Source: Alan Glover)
###########################################################################
Terminator
===========================================================================
Last Updated: 11th September 1992
Aliases:
Origin: United Kingdom
Isolation Date: July 1992
Effective Length: 3648 bytes
Virus Type: Task. Stores code as separate file.
Symptoms: Additional files appear in applications (see
below)
---------------------------------------------------------------------------
Detection Media: Killer 1.372+ Memory: Killer 1.372+
Scanner 1.47+
Removal Media: Killer 1.372+ Memory: Killer 1.372+
delete named file, remove last line from !Boot.
---------------------------------------------------------------------------
General Comments:
Strictly speaking - this is an Icon variant. However it has been
changed sufficiently that it merits its own entry.
It can choose one of eight task names, and one of eight different
filenames/filetypes to save itself.
In other respects it acts and spreads like Icon, though there is
1 in 10 chance of drive zero being wiped on each infection.
The task names are : ADFS Filer, RMA Manager, Filer Extension, File
Compactor, ADFS Filer (again), MemAlloc, " " and "F*ck off!" (except
with no asterisk - you know what I mean...).
The filenames and filetypes are: Icon (Sprite), MemAlloc (Module),
RunCode (Absolute), ABCLib (Module), CLib (Module), Colours (Modules),
FPEmulator (Module) and !DeskBoot (Utility).
!Killer patches the virus before removing it to ensure that ADFSFiler
is not rmkilled by the virus.
(Source: Alan Glover)
###########################################################################
Thanatos
===========================================================================
Last Updated: 21st April 1992
Aliases: RISCOSext, RISCOS Extensions
Origin: United Kingdom
Isolation Date: May 1991
Effective Length: 11756 or 11764 bytes
Virus Type: Task. Stores code as separate file.
Symptoms: Files "RISCOSext" and "TaskAlloc" in application
directories. Wimp task "Thanatos" visible in
the Task Manager.
---------------------------------------------------------------------------
Detection Media: Killer 1.17+ Memory: Killer 1.17+
Scanner 1.23+
VProtect 1.10+
Removal Media: Killer 1.17+ Memory: Killer 1.17+
delete named files
---------------------------------------------------------------------------
General Comments:
This is an encrypted (simple EOR with &7A, lower-case "z") BASIC
program (crypted = 11756 bytes long, TOP-PAGE of BASIC program =
7660 bytes) called "RISCOSext" with a filetype of Absolute (yes,
a very poor piece of ARM code decrypts and runs it and wastes nearly
4K of space between &8100 and &9000 !). Associated with it is a Sprite
file (actually of filetype Module) called "TaskAlloc", which is 344
bytes long containing a rude sprite to replace the mouse pointer.
When run, it installs itself as a Wimp task named "Thanatos" and
then looks for double-clicks to infect application directories (copies
the RISCOSext and TaskAlloc files into there and then appends the
'usual' string to the !Boot file (to run RISCOSext).
The nasty section of the Thanatos Virus REALLY IS nasty, so I urge
you to study this carefully.
Rough once every 100000 times around the Wimp_Poll loop, Thanatos
can:
* 2 out of 13 chancesShut down icon bar application at random (whilst
displaying its own icon bar icon during the shutdown).
* 1 out of 13 chancesCause a Desktop Quit.
* 3 out of 13 chancesReverse the mouse pointer step (sets it -2).
* 1 out of 13 chancesCrash the machine by poking a duff instruction
at the start of memory.
* 1 out of 13 chancesRandomise the 240 bytes of CMOS. [If this happens,
you may have to either short or remove the battery from your machine,
as it might refuse to boot.]
* 4 out of 13 chancesRandomly display one of 8 very rude messages
- one of which also changes the mouse pointer shape to a rude graphic
and another will also shutdown an icon bar application (the same
routine as above).
* 1 out of 13 chancesWipe the contents of <Obey$Dir>.
It also has a "special date" section as follows:
Any Friday 13th: Advertises its own "virus killer" (from Armen Software).
April 1st10 Address exception errors, followed by coloured rectangles
and a 'stuck' mouse pointer for 10 seconds. An "April Fool" message
is then displayed.
December 25th: Destroys the disk map of ADFS drives 0, 4 and 5 followed
by a "Merry Crimble" message.
October 31st:Formats the floppy in drive 0, followed by a "Spooky"
message.
January 1st: As December 25th, but followed by a New Year's Resolution
message (to keep your disks write-protected...).
[ The 11764 byte variant is functionally identical, but a slightly
earlier version ]
(Source: Richard K. Lloyd)
[Attempting to kill Thanatos by clicking 'Quit' in the Task Manager
will not work. However, Killer and VKiller will patch the missing
closedown code into the virus before removing it from memory.]
###########################################################################
TrapHandler
===========================================================================
Last Updated: 21st April 1992
Aliases:
Origin: United Kingdom
Isolation Date: September 1991
Effective Length: 924 bytes
Virus Type: Resident !Boot file infector. Overwrites original
!Boot file completely (or creates a new one if
it doesn't find one) and stores own code here.
Symptoms: Applications which depend on a !Boot file fail
to run (i.e. if the !System !Boot file was overwritten,
!Edit would fail to run due to the fact that
the !System folder hasn't been seen. The same
applies if the !Boot file in the Fonts directory
is overwritten. The module 'TrapHandler'is present
in the module list.
---------------------------------------------------------------------------
Detection Media: Killer 1.17+ Memory: Interferon 2.00+
Scanner 1.03+ Killer 1.17+
VProtect 1.10+ Scanner 1.23+
Removal Media: Killer 1.17+ Memory: Killer 1.17+
Scanner 1.03+ Interferon 2.10+
delete !boot file Scanner 1.20+
RMKill TrapHandler
---------------------------------------------------------------------------
General Comments:
The TrapHandler virus is written as a module which infects application
directories by overwriting the !Boot file with its own code. By hooking
onto the FSControl vector, it looks for a *Run action, and on finding
one (eg. the user opens a directory with applications, and if any
of these contain a !Boot file (which RISC OS automatically executes)),
TrapHandler overwrites the application's !Boot file with its own
code.
This code is loaded into memory by using a simple
*LOAD <Obey$Dir>.!Boot <address>
and then executing the code at <address>.
On any Friday after the 20th of any month it will open a regular
message box (i.e. using Wimp_ReportError) with the number of infections
in the header, and an 'Ignorance will be your undoing.' This message
is rather misleading, as the only destructive thing it does is overwrite
your !Boot files (although it could - as all viruses can - be modified
to do much nastier things). I might sound a bit trivial here - if
your $.!Boot on the harddisc was overwritten, you might get a bit
more than annoyed(!). However, as this !Boot file only gets run when
you reset your machine, it is not very likely to get infected by
this virus (unless you accidentally double-click on it or run it).
###########################################################################
Valid
===========================================================================
Last Updated: 21st April 1992
Aliases:
Origin: Unknown
Isolation Date: March 4, 1992 by Atle M. Bårdholt
Effective Length: 1389 bytes
Virus Type: Non-resident application infector, stores code
as separate file.
Symptoms: Files "Valid" and "Source" in application directories.
---------------------------------------------------------------------------
Detection Media: Killer 1.30+ Memory: n/a
Scanner 1.23+
VProtect 1.13+
Removal Media: Killer 1.30+ Memory: n/a
Scanner 1.23+
delete !Run and "Source". Rename "Valid" to
!Run.
---------------------------------------------------------------------------
General Comments:
Valid is a non-resident virus written in BASIC which works by renaming
the !Run file of the application to "Valid", then saving itself as
a file called "Source" and creating a new !Run file which points
to the virus code. Both have correct filetypes (e.g. Obey and BASIC).
In its current form it can hardly spread far. It surprises me that
it was even released at all. Due to a major flaw in the code, Valid
creates faulty !Run files every time it infects - effectively rendering
the application non-executable - making it easy to detect that something
is wrong. It is assumed, however, that this is fixed in other or
newer versions (the incore filename of the BASIC file is "Source2"),
as it is a very simple thing to do something about it. (This version
keeps the first 21 chars of the orginal !Run file instead of making
a new one.)
On floppy based systems this virus causes a noticeable slowdown when
it infects an application, as it uses the OSCLI command EnumDir to
create a list of applications to infect. This list is saved as a
file (as a result of EnumDir), and then loaded into some reserved
memory. When the processing of this data is finished, the file is
deleted.
Valid never infects an application twice, as it checks to see if
there's an "our" in the first line (part of RUN <Obey$Dir>.Source)
of the !Run file. Also, it is not certain it will infect a given
application - there's Ŵonly a 30% chance (determined by RND(10)>7)
of this happening. Valid does little besides replicate (if it had
worked properly), but does create a 0 byte file called "Infected!"Ŵ
in the application directory after any 22nd in any month.
###########################################################################
Vigay
===========================================================================
Last Updated: 21st April 1992
Aliases: DataDQM, Shakes
Origin: United Kingdom
Isolation Date: Probably April 1991
Effective Length: 2311 or 2432 bytes
Virus Type: Task. Stores code as separate file.
Symptoms: File "DataDQM" in application directories. The
Task "TaskManager" in the Task Manager window.
---------------------------------------------------------------------------
Detection Media: Killer 1.17+ Memory: Killer 1.17+
Scanner 1.23+
VProtect 1.10+
Removal Media: Killer 1.17+ Memory: Killer 1.17+
delete !Boot and file.
---------------------------------------------------------------------------
General Comments:
This is a BASIC program called "datadqm" with an associated 97-byte
!Boot file. The REMs at the start of the program are as follows:
REM (C)1989 PAUL VIGAY
REM
REM A nasty little Archie Virus !!
REM ... or is something up with your monitor ???
REM
REM version 1.1a (24th October 1989)
Hence you now know why it's called the "Vigay Virus" - the author's
name appears as a comment at the start! When first run, it initialises
as a Wimp task called "TaskManager" and then waits for either:
1) a chance of (500 * hours left of a Thursday) to 1 to crop up to
spark off a silly "wobble" demo (wobbles the screen and mouse pointer).
Yes, this demo only appears on a Thursday and more frequently as
the day wears on.
or,
2) a file/directory double-click, in which case it attempts to replicate
itself to the first application directory at that level that doesn't
already have either an "!Boot" or a DataDQM" file.
(Source: Richard K. Lloyd)
[Apparently there are several versions existing (but apparently not
circlulating), some activating on Fridays, others on Friday the 13th.
It is not known whether these Friday versions broke loose, and later
variants were also compiled using the Archimedes BASIC Compiler by
DABS Press. We are still speculating if any of these are available
to the general public. Also, it is worth clarifying that the 'TaskManager'
will appear as an application task, unlike the real Task Manager
which is a module task.]
###########################################################################
Virus Detection Utilities
---------------------------------------------------------------------------
(Note: only this programs which are still believed to be regularly
updated are included here)
Guardian: © Paul Vigay. Latest version known is !Guardian3 3.09
(14th Oct-1992). Multitasking application which keeps
an eye on tasks and also has virus scanner/removal capabilities.
IMPORTANT NOTE: At various places in the application it
claims to remove all known viruses, and to be "equal,
if not better, in spec than !Killer". Both these claims
are clearly false (the current version of !Guardian only
deals with five viruses - including his own (Vigay)).
Handle the software, and the author's claims, with care.
Hunter: © Michel Fasen. Latest version known is 1.16/9 (17-Feb-1992).
Multitasking application. Nice touch by using the Interface
manager. Not RISC OS 3 compatible. Public Domain.
Interferon: © Tor O. Houghton. Latest known version is 2.12 (13-Mar-1992).
Resident program which looks for transfer of data to
disc from areas below &8000, and from the RMA (e.g. most
viruses which are written as modules, for example). Public
Domain.
Killer: © Pineapple Software Ltd. Written by Alan Glover of Acorn
Computers Ltd. Latest version known is 1.381 (25-Oct-1992).
Multi-tasking scanner/disinfectant. Currently, this application
is the one which detects and removes all known viruses
on the Archimedes. Very user friendly interface, lots
of useful options, includes a nice window with look-up
virus information. Commercial product.
Scanner: © Tor O. Houghton. Latest version known is 1.51 (Oct-1992).
A non-WIMP application which detects and removes the most
common viruses. Commercial software, available direct
from the author.
VProtect: © Pineapple Software Ltd. Written by Alan Glover of Acorn
Computers Ltd. Latest version known is 1.24 (25-Oct-1992).
Resident program which, amongst other things, checks !Run
and !Boot and module files for infection before running
them. Supplied with !Killer.
As you can see, there are several virus utilities mentioned in section
3.0. For all of you who have written a virus utility and want it
to appear with correct information concerning version numbers, and
what it can detect and remove etc., could you please send your latest
version to one of the previously mentioned addresses.
This document exists in three parallel forms. Versions suffixed 'p'
are the Impression version (primarily maintained by Tor Houghton),
and those suffixed 'h' use the Binary Star !Clearview PD reader application
to present a hypertext document. Updates to the document may be sent
to either author, and both versions will get updated. The text version
(suffixed 't') is derived from the Cleariew version. There is also
an experimental vb version.
Also, could you please include a note on what the program/virus does?
Some help files we have seen have been very vague. All this information
is based on our own reactions, and may well be incorrect in some
parts. If you don't like it, send us some information (not too verbose).
###########################################################################
Acknowledgements & Credits
---------------------------------------------------------------------------
This list contains some of the many people who have helped in the
preparation and updating of this document. Despite their best efforts,
there are undoubtably some errors - which are wholly our own work
:-).
Simon Burrows: Additional virus documentation.
Svlad Cjelli: Additional virus documentation.
Michel Fasen: Additional virus documentation.
Eivind Hagen: For letting me borrow Impression of him!
Bjørn Hotvedt: For keeping up with the never-ending postings to and
from Alan (and other people!).
Richard K. Lloyd: For documentation on the older viruses.
Terje Slettebø: For help with the disassembly of the NetStatus virus.
Paul Frohock: For help and information long before !Killer saw light
of day (and still going strong :-) )!
The following pieces of software are amongst those I (Alan) use for
virus analysis - my thanks to those in the list below who have added
changes etc at my request or helped in other ways (you know who you
are...).
!QZap - Kevin Quinn (PD Desktop Disassembler)
!Dissi - John Tytgat (Registered version - Desktop Disassembler/Source
generator)
!DeskEdit - RISC Developments (!Edit, with many useful additions)
!Snoop - DT Software (Desktop examination tool)
!QDBug - Vertical Twist/QDE (Powerful Debugger/Monitor)
!Detour - Electronic Solutions (Path control utility)
###########################################################################
Contacting the authors
---------------------------------------------------------------------------
POST:
Tor Houghton Alan Glover
17K Park Village PO Box 459
University of Sussex Cambridge
Falmer CB1 4QB
Brighton UK
BN1 9RD
UK
EMAIL:
Tor O. Houghton: torh@cogs.susx.ac.uk
Alan Glover: aglover@acorn.co.uk
BBS:
The World of Cryton(+44) (0)749 670030 or (+44) (0)749 679794
Tor O. Houghton: #121
Alan Glover: #6
Arcade (+44) (0)81 654 2212
Alan Glover: #244
Excelsior! (M)BBS (+47) (0)2 84 63 79
Tor O. Houghton: Tor Houghton
(Note: Tor is presently unable to call BBSs, and I do not call very
often at the moment - use another means to contact either of us).
FAX:
Alan Glover (+44) (0)223 415222
Acorn Computers Ltd. (+44) (0)223 254264
Pineapple Software (+44) (0)81 598 2343
TELEPHONE:
Pineapple Software (+44) (0)81 599 1476
Acorn Computers Ltd. (+44) (0)223 254254
###########################################################################
Checklist
---------------------------------------------------------------------------
(last change 25/10/92)
Click on the name of the virus to read more about it.
Media Memory
Virus Utility D R D R
Archie Guardian Y N ? ?
Killer Y Y Y Y
Scanner Y N N N
Arcuebus Killer Y Y Y Y
BBCEconet Killer Y Y Y Y
Scanner Y N Y Y
Interferon N N Y N
Bigfoot Killer Y Y Y Y
Scanner Y N N N
CeBIT Hunter Y Y Y Y
Interferon N N Y Y
Killer Y Y Y Y
Scanner Y N Y N
Code Killer Y Y Y Y
Scanner Y Y N N
Extend Guardian Y ? Y ?
Hunter Y Y N N
Interferon N N Y N
Killer Y Y Y Y
Scanner Y N Y N
Funky Killer Y Y Y Y
Garfield_I Killer Y Y Y Y
Scanner Y Y Y Y
Interferon N N Y N
Garfield_W Killer Y Y Y Y
Scanner Y Y Y Y
Interferon N N Y N
Handler Killer Y Y Y Y
Icon Hunter ! ! N N
IVSearch ! ! ? ?
Killer Y Y Y Y
Scanner Y Y N N
Image Killer Y Y Y Y
Scanner Y N Y Y
Increment Killer Y Y Y Y
Scanner Y N Y N
IRQFix Killer Y Y Y Y
Scanner Y Y N N
Link Hunter Y Y Y Y
Interferon N N Y Y
Killer Y Y Y Y
Scanner Y Y Y Y
Mode87 Killer Y Y Y Y
Scanner Y Y N N
Interferon N N Y N
Module Guardian Y Y ? ?
Hunter Y Y Y Y
Interferon N N Y N
Killer Y Y Y Y
Scanner Y Y N N
MyMod Hunter Y Y Y Y
Interferon N N Y Y
Killer Y Y Y Y
Scanner Y Y Y Y
NetManager Guardian ? ? ? ?
Interferon N N Y Y
Killer Y Y Y Y
Scanner Y Y Y Y
NetStatus Hunter ! ! Y Y
Interferon N N Y Y
Killer Y Y Y Y
Scanner Y Y Y Y
VirusKill Y Y ? ?
Parasite* Killer Y Y Y Y
Scanner Y N Y N
Runopt Killer Y Y Y Y
Sprite* Killer Y Y Y Y
Scanner Y N N N
SpriteUtils Killer Y Y Y Y
Scanner Y Y N N
T2 Killer Y Y Y Y
Scanner Y N N Y
Terminator* Killer Y Y Y Y
Scanner Y N N N
Thanatos* Hunter Y Y N N
Killer Y Y Y Y
Scanner Y N N N
Traphandler Hunter Y Y Y Y
Interferon N N Y Y
Killer Y Y Y Y
Scanner Y Y Y Y
Valid Killer Y Y na na
Scanner Y Y na na
Vigay Guardian Y Y ? ?
Killer Y Y Y Y
Scanner Y N N N
? Refers to cases where the documentation fails to explain exactly
what it does with the virus.
! Special cases (e.g. some killers might not detect all variants
of a
virus), refer to the separate virus entries in this document for
details.
na Not applicable, typically a virus which does not reside in memory.
###########################################################################
Quick Checks
---------------------------------------------------------------------------
(last change 25/10/92)
Click on the virus name to read more about it.
Archie - Attacks absolute (filetype &FF8) files.
Arcuebus - Installs a false NetStatus module (3.07).
BBCEconet - Attacks absolute files, encrypting part of them. Loads
trojan BBCEconet module.
Bigfoot - Desktop task called 'bigfoot', file with randomly chosen
name in capitals (BASIC file).
CeBIT - Attacks applications. File "TlodMod" in app. directory. Module
"TlodMod" in module list.
Code - Desktop task called 'Window Manager'. Applications may 'lose'
their sprites.
Extend - Attacks applications. Files "MonitorRM", "CheckMod", "ExtendRM",
"OSextend", ColourRM", "Fastmod", "CodeRM" or "MemRM" in app.
directory . Module "Extend" in module list.
Funky - Desktop task called 'Window Dude'.
Garfield_I - Creates application called !Pic, loads a module called
IconManager.
Garfield_W - Creates application called !Obey, loads a module called
WimpAIDS.
Handler - Creates an application task called 'Task Handler'.
Icon - Attacks applications. Files "Icon", "Poison" or "NewVirus"
in app. directories. Nameless WIMP task in the Task Manager.
Image - Attacks applications. Files "Image" and "!Spr" in app. directory.
Increment - Attacks applications. Appends to !Boot - look for 'load
<obey$dir>.!boot 8000' towards the end of the !Boot.
Irqfix - Attacks applications. Files "RiscExtRM", "WimpPoll", "OSSsystem",
"MiscUtil", "FastRom", "IRQFix" or "AppRM in app. directory. Module
"Irqfix" in module list.
Link - Attacks absolute (filetype &FF8) files. Module "BSToDel" in
module list. Infected files are re-stamped.
Mode87 - Loads a module called BBCEconet (replacing the real one).
Overwrites !Boot files.
Module - Attacks modules. Infected modules are re-stamped.
MyMod - Attacks applications. Files "SSLM" and "SSLF" in app. directories.
Module "MyMod" in module list.
NetManager - Attacks !Boot files. Module "NetManager" in module list.
NetStatus - Attacks !Boot files. Module "NetStatus" in module list
(at offset &018xxxxx). Ensure the program you use understands both
strains of this virus! Killer and Scanner do. See also Arcuebus.
Parasite - Attacks applications. Random of 20 filename choices for
the code carrier.
RunOpt - Starts an APPLICATION task called 'Task Manager'
Sprite - Attacks applications. Files "Sprite" and "!Str" in app.
directories.
SpriteUtils - Attacks applications. File SprUtils saved in applications.
Loads from !run.
T2 - Attacks !RunImage files of type &FF8. Files grow by about 4K.
See entry for details.
Terminator - An Icon variant which uses varied file/task names. Extra
files appear in directories.
Thanatos - Attacks applications. Files "RISCOSext" and "TaskAlloc"
in app. directory. "Thanatos" visible in the Task Manager.
TrapHandler - Attacks !Boot files. Module "TrapHandler" in module
list.
Valid - Attacks applications. Files "Valid" and "Source" in app.
directory.
Vigay - Attacks applications. File "DataDQM" in app. directories.
WIMP task named "TaskManager" in the Task Manager.
###########################################################################
Calendar
---------------------------------------------------------------------------
A number of viruses have messages which are programmed to be displayed
on a given day or dates. Some are specific dates (eg 4th July) others
are less specific such as the first monday of the month, or Friday
13th.
This section is subdivided into months, for the viruses with specific
dates and messages which could occur in any suitable month.
To read more about a particular virus mentioned in this section click
on the virus name (which will be underlined).
January
February
March
April
May
June
July
August
September
October
November
December
Any
###########################################################################
January
---------------------------------------------------------------------------
Date Virus Message/Action
1st Parasite Crashes computer before 01:00
1st T2 New Year's Resolution from T2...
1st Thanatos Suggested new-year's resolution...
###########################################################################
February
---------------------------------------------------------------------------
Date Virus Message/Action
14th T2 St. Valentine's Day Roses are red, Violets
are blue...
29th Parasite Set Mouse step rate to -5 (fast & reversed)
###########################################################################
March
---------------------------------------------------------------------------
Date Virus Message/Action
15th Bigfoot This is a HOLD UP! Give me all the PD software...
###########################################################################
April
---------------------------------------------------------------------------
Date Virus Message/Action
1st BBCEconet E.T. phones home!
1st Thanatos Address Exception at &0863FB3C
###########################################################################
May
---------------------------------------------------------------------------
Date Virus Message/Action
1st T2 Mayday from T2...
###########################################################################
June
---------------------------------------------------------------------------
Date Virus Message/Action
21st Parasite Set Mouse step rate to 1 (slow)
25th BBCEconet Ph'nglui mglw'nafh Chtulhu...
###########################################################################
July
---------------------------------------------------------------------------
Date Virus Message/Action
4th T2 Independence Day celebrations from T2...
4th Bigfoot Hay there its the 4th of July...
###########################################################################
August
---------------------------------------------------------------------------
Date Virus Message/Action
No viruses are known which display messages specifically during this
month.
###########################################################################
September
---------------------------------------------------------------------------
Date Virus Message/Action
6th (1992) Module Your computer has been virus infected...
###########################################################################
October
---------------------------------------------------------------------------
Date Virus Message/Action
31st T2 Spookiness from T2...
31st Thanatos Your disk's been formatted without you asking...
###########################################################################
November
---------------------------------------------------------------------------
Date Virus Message/Action
5th Bigfoot Wizz Bang! Its Guyfalks night...
###########################################################################
December
---------------------------------------------------------------------------
Date Virus Message/Action
21st Parasite Set Mouse step rate to 127 (very fast)
21st Parasite Change MonitorType and Sync settings
25th BBCEconet Merry Christmas!
25th Bigfoot Happy Christmas from BigFoot ... The VIRUS
25th T2 Yuletide Jollities from T2...
25th Thanatos Merry Chrimble! Hope you liked your pressy...
###########################################################################
Any Month
---------------------------------------------------------------------------
Date Virus Message/Action
13th Archie Hehe ArchieVirus strikes again
Friday 13th Link Message from LINK: Active since 30-Nov-91
Friday 13th BBCEconet It's Friday! Why are you working....
Friday 13th MyMod Hi there. It's me, with my latest addition...
Friday 13th T2 Comiserations from T2...
Friday >20thTraphandler Ignorance will be your undoing
First MondayGarfield_I The Garfield Virus is here to stay
First MondayGarfield_I Don't you just hate Mondays?
First MondayGarfield_W The Garfield Virus is here to stay
First MondayGarfield_W Don't you just hate Mondays?
Any ThursdayVigay Screen wobbles up/down
###########################################################################
Index
---------------------------------------------------------------------------
Introduction Introduction
Abstract
Virus Index Index to known viruses
Virus Detection Utilities
Acknowledgements & Credits
Contacting the authors
Checklist
Quick Checks
Calendar
Index of virus names and aliases:
Archie
Arcuebus
BBCEconet
Bigfoot
Boot
CeBIT
Code
DataDQM
Extend
Filer
FF8
Funky
Garfield_I
Garfield_W
Handler
Icon
Icon-A
Illegal
Image
Increment
IRQFix
Link
Mode87
Module
ModVir
MyMod
NetManager
NetStatus
Newvirus
Parasite
Poison
RISCOSExt
Runopt
Shakes
Sicarius
Silicon Herpes
Sprite
SpriteUtils
T2
Terminator
Thanatos
Traphandler
Valid
Vigay