home *** CD-ROM | disk | FTP | other *** search
-
- *********************************************
- *** Reports collected and collated by ***
- *** PC-Virus Index ***
- *** with full acknowledgements ***
- *** to the authors ***
- *********************************************
-
-
- Report from Jim Bates - The Virus Information Service - March 1991
-
- === V2P6 Virus ===
-
- The whole business of taking MSDOS computer viruses apart so that
- they can be analysed and classified is done solely to provide
- information that will enable rapid identification and effective
- protection for the users who are likely to be at risk from the
- malicious targets of such code. Researchers worldwide are becoming
- far more accomplished in their dissections and analyses but all of
- them are still severely overworked trying to keep pace with new
- viruses as they are discovered. The whole research effort operates
- under the one over-riding premise that there is no such thing as a
- computer virus which cannot be taken apart. Since virus code (by
- definition) must be totally mobile, it must also be completely self-
- contained - including such tricks as self-modifying code, pre-fetch
- queue manipulation, anti-debugging code and direct hardware access.
- The particular collection of selected "tricks" used, together with
- their respective order and location within the program provides a
- recognisably unique "profile" by which a virus may be identified and
- dealt with. Virus writers recognised this fact some time ago and in
- some cases have gone to extreme lengths to hide the details of this
- "profile" from prying eyes by introducing various layers of
- encryption and randomisation of their code, even varying these from
- infection to infection. The fact that virus code MUST be
- self-contained and therefore MUST be capable of decrypting itself
- before execution, seems to have escaped the tiny minds involved in
- virus production. Nevertheless, some of them still persist in
- attempting the impossible - a truly anonymous virus which will
- escape detection by virtue of its anonymity. One of the most
- stubborn of these individuals is known to researchers since he
- operates under the guise of virus "research" and produces live virus
- code which contains his name and address! I refer of course to Mark
- Washburn, who has produced Casper, V2P2 (1260) and latterly the V2P6
- virus. That this man is allowed to write and distribute virus code
- with impunity is symptomatic of just how badly legislation against
- computer crime has fallen behind in various countries. By no
- stretch of the imagination can his "work" be classified as virus
- research since his code has produced nothing that responsible
- researchers were not already aware of. What he has achieved is to
- distribute virus code of a most dangerous kind, through channels
- which lack any sort of security and in such a way that there is no
- doubt that samples of his code are (or soon will be) in the hands of
- virus writers who will undoubtedly use his virus vehicles to deliver
- ever more vicious trigger effects.
-
- Reports of virus analyses produced for public information must
- necessarily be carefully examined before publication to ensure that
- they do not provide technical details which could be of use to virus
- writers. In the case of the V2P6 virus, the technical details are
- quite sparse and completely innocuous. In the original sample there
- is no trigger routine, the virus does NOT become memory resident and
- only COM files are effected. The infective length is between 1801
- and 2350 bytes and no attempt is made to hide the increase in length
- from normal DOS operations. A single COM file is infected each time
- the virus code is executed, first in the current directory, and then
- by searching along the designated PATH as specified within the
- machine environment area. Infected files are marked with the
- ubiquitous 62 second marker in the date/time field of the file's
- directory entry and this is used as a recognition flag by the virus
- itself. There are several bugs within the code, some of which
- affect how the virus selects files to infect. For example, it is
- obvious that file lengths of 10 and 63746 respectively were intended
- to be minimum and maximum limits but careless coding has resulted in
- the virus infecting all COM files EXCEPT those two sizes.
-
- So, the internal V2P6 code is unremarkable. From a researcher's
- point of view, this virus must be classified as "armoured" because
- as well as primary encryption (and randomisation), it contains a
- primitive routine which is supposedly designed to make disassembly
- difficult. This is a linked INT03/INT01 handler which decrypts and
- recrypts certain sections of the virus code "on the fly". Such
- routines have already been observed in other virus code and present
- only a minor irritation to experienced researchers. Washburn's main
- effort (as in his other viruses) has been directed at randomising
- the primary decryption routine in such a way as to nullify the
- normal pattern recognition techniques used in most virus scanners.
- More than half of the virus code is taken up with the convoluted
- calculations and bitmapping gymnastics needed to generate a
- randomised decryptor for each infection of the virus. This is
- certainly makes the virus capable of producing hundreds of millions
- of possible combinations for the decryption routine. All of the
- viruses that Washburn has produced seem designed to impress the
- researcher with just how "clever" he is at producing randomised
- encryption/decryption routines. Unfortunately for him, simple
- pattern recognition is only a small part of the armoury of good
- scanning software. His approach produces a different kind of profile
- which is paradoxically even easier to recognise than a
- straightforward hex pattern.
-
- It is therefore apparent that Washburn's efforts have added nothing
- to existing knowledge about MSDOS computer viruses other than to
- increase the already heavy workload of dedicated researchers around
- the world who must necessarily disassemble his nonsense. Continued
- production of such "research" viruses can only be detrimental to the
- research effort and his masquerade should be stopped forthwith. If
- he had not already demonstrated his irresponsible attitude to the
- virus problem, he might be better employed in helping the rest of us
- in a positive way by analysing existing virus programs for the
- general benefit of computer users everywhere. As it is, there is
- little doubt that eventually one of his programs (or a recognisable
- derivative) will appear as a vehicle for a malicious trigger
- routine. When that day dawns, Mark Washburn should be held
- personally (and criminally) responsible for the damage that results.
-
- Virus Attribute Summary
-
- Name V2P6
- Origin U.S.A. (Mark Washburn)
-
- Non-resident, one-shot COM infector (including COMMAND.COM) uses
- multiple encryption and randomisation. Has no trigger routine.
- Infects all COM files except those with lengths of 10 bytes and
- 63746 bytes. Marks infected files with 62 second marker in the
- directory entry Time field. It is not possible to extract a
- hexadecimal recognition string for this virus.
-
- VIS Classification: CcAK1801A
-
-
- The information contained in this report is the direct result of
- disassembling and analysing a specimen of the virus code. I take
- great pains to ensure the accuracy of these analyses but I cannot
- accept responsibility for any loss or damage suffered as a result of
- any errors or omissions. If any errors of fact are noted, please
- let me know at :-
-
- The Virus Information Service,
- Treble Clef House,
- 64, Welford Road,
- WIGSTON MAGNA,
- Leicester LE8 1SL
-
- or call +44 (0)533 883490
-
- Jim Bates
-
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
- ++++++++++++++++++++++++++ end of reports ++++++++++++++++++++++++
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++