home *** CD-ROM | disk | FTP | other *** search
-
- *********************************************
- *** Reports collected and collated by ***
- *** PC-Virus Index ***
- *** with full acknowledgements ***
- *** to the authors ***
- *********************************************
-
- Report from Jim Bates - The Virus Information Service - November
- 1990
-
- === Attention Virus ===
-
- Examples of virus code continue to come in to UK researchers in
- ever-increasing numbers. Fortunately however, the number of new
- techniques used by the virus writers is diminishing and the task of
- detecting generic virus activity is thereby becoming somewhat
- easier. Most of the simpler parasitic virus types can be fairly
- easily classified and their capabilities are already well-known and
- adequately catered for within existing detection software.
- Occasionally we see something new or unusual which may require some
- minor modification to existing detection/prevention techniques and
- this is where detailed disassembling of the particular virus
- involved becomes so valuable.
-
- An example of this was found recently in a virus known to be at
- large in Russia. It was sent to us under the name of "ATTENTION"
- although disassembly of the sample revealed that the name was
- actually a part of the infected host program. However, we'll
- continue to refer to it by this name to avoid more confusion over
- virus aliases. The virus is a small one (infective length is 377
- bytes) and the major part of the code is unremarkable. There is no
- trigger routine (although there may be some additional strain placed
- on the floppy drive motor), the code simply replicates amongst files
- with an extension ending in "OM" (this obviously includes all COM
- files) where the length is between 786 and 64921 bytes inclusive.
- Infection is invoked during the DOS LOAD/EXECUTE function (4BH),
- appending the virus code to the file and modifying the original host
- jump (having first saved the original values). During infection,
- file attributes are modified and then reset so that READ ONLY and
- HIDDEN files are equally vulnerable. The original file date is not
- maintained and infected files will show the date of infection when a
- DIR listing is done to the screen.
-
- The interesting section of the code occurs within a Critical Error
- handling routine which the virus installs to the INT 24H vector. No
- attempt is made to check or link to the existing handler, and the
- new handler address is re-installed during each LOAD/EXECUTE
- request. Within this handler routine, after the flags and major
- registers have been saved on the stack, a retry count of three is
- set up and the code then goes into a timing delay loop before
- addressing the floppy disk controller directly through its port.
- The data mask is set to No Reset, Enable INT and DMA access and turn
- the drive motor off. Then there is another timing delay loop before
- the port is accessed again but this time with the Motor On bit set
- in the data mask. This sequence is executed three times (via the
- retry count) and the routine finally restores the registers and
- returns with a value of three in the AL register. No immediate
- damage or corruption is caused by this routine, although it is
- possible that continued ON/OFF switching in this way might cause
- excessive stress to the drive motor.
-
- One of the areas which are awkward to monitor within an ordinary PC
- environment is that associated with direct port access and this
- virus is the first we have seen which uses it (albeit for unclear
- reasons). Further developments along these lines are expected but
- fortunately, the knowledgable section of the anti-virus fraternity
- is already forewarned and such techniques have been well
- anticipated.
-
- VIS Classification - CcAR377A
-
- The information contained in this report is the direct result of
- disassembling and analysing a specimen of the virus code. I take
- great pains to ensure the accuracy of these analyses but I cannot
- accept responsibility for any loss or damage suffered as a result of
- any errors or omissions. If any errors of fact are noted, please
- let me know at :-
-
- The Virus Information Service,
- Treble Clef House,
- 64, Welford Road,
- WIGSTON MAGNA,
- Leicester LE8 1SL
-
- or call +44 (0)533 883490
-
- Jim Bates
-
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
- ++++++++++++++++++++++++++ end of reports ++++++++++++++++++++++++
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++