home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!darwin.sura.net!jvnc.net!netnews.upenn.edu!netnews.cc.lehigh.edu!news
- From: rslade@sfu.ca (Robert Slade)
- Newsgroups: comp.virus
- Subject: Jerusalem virus part 1 (CVP)
- Message-ID: <0014.9207211508.AA11928@barnabas.cert.org>
- Date: 18 Jul 92 19:22:41 GMT
- Sender: virus-l@lehigh.edu
- Lines: 57
- Approved: news@netnews.cc.lehigh.edu
-
- HISVIR3.CVP 920714
-
- The "Jerusalem" virus - part 1
-
- In the MS-DOS world the Stoned virus is currently the most successful
- virus in terms of the number of infections (copies or reproductions)
- that the virus has produced. (Boot sector viral programs seem to
- have an advantage among microcomputer users.) Among file infecting
- viral programs, however, the Jerusalem virus is the clear winner. It
- has another claim to fame as well. It almost certainly has the
- largest number of variants of any virus program known to date.
-
- Initially known as the "Israeli" virus, the version reported by Y.
- Radai in early 1988 (also sometimes referred to as "1813" or
- Jerusalem-B) tends to be seen as the "central" virus in the family.
- Although it was the first to be very widely disseminated, and was the
- first to be "discovered" and publicized, internal examination
- suggests that it was, itself, the outcome of previous viral
- experiments. Although one of the oldest viral programs, the
- Jerusalem family still defies description, primarily because the
- number of variants makes it very difficult to say anything about the
- virus for sure. The "Jerusalem" that you have may not be the same as
- the "Jerusalem" of your neighbour.
-
- A few things are common to pretty much all of the Jerusalem family.
- They are file, or program, infecting viri, generally adding
- themselves to both COM and EXE files. When an infected file is
- executed, the virus "goes resident" in memory, so that it remains
- active even after the original infected program is terminated.
- Programs run after the program is resident in memory are infected by
- addition of the virus code to the end of the file, with a redirecting
- jump added to the beginning of the program. Most of the family carry
- some kind of "date" logic bomb payload, often triggered on Friday the
- 13th. Sometimes the logic bomb is simply a message, often it deletes
- programs as they are invoked.
-
- David Chess has noted that it is a minor wonder the program has
- spread as far as it has, given the number of bugs it contains.
- Although it tends to work well with COM files, the differing
- structure of EXE files has presented Jerusalem with a number of
- problems. The "original Jerusalem", not content with one infection,
- will "reinfect" EXE files again and again so that they continually
- grow in size. (This tends to nullify the advantage that the
- programmer built in when he ensured that the file creation date was
- "conserved" and unchanged in an infected file.) Also, EXE programs
- which use internal loaders or overlay files tend to be infected "in
- the wrong place", and have portions of the original program
- overwritten.
-
- copyright Robert M. Slade, 1992 HISVIR3.CVP 920714
-
- ==============
- Vancouver ROBERTS@decus.ca | "Don't buy a
- Institute for Robert_Slade@sfu.ca | computer."
- Research into rslade@cue.bc.ca | Jeff Richards'
- User p1@CyberStore.ca | First Law of
- Security Canada V7K 2G6 | Data Security
-