home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Crawly Crypt Collection 1
/
crawlyvol1.bin
/
utility
/
virus
/
atarivir
/
atarivir.a89
< prev
Wrap
Text File
|
1992-03-10
|
21KB
|
378 lines
========================================================================
== Computer Virus Catalog (Version 1.2) ==
========================================================================
== Status: October 31, 1989 ==
== Classified: 15 MSDOS-Viruses (MSDOSVIR.A89) ==
== 24 AMIGA-Viruses (AMIGAVIR.A89) ==
== 6 Atari-Viruses (ATARIVIR.A89: this document) ==
========================================================================
= This document contains the classifications of the following viruses: =
== 1) Anthrax = Milzbrand Virus =+=
== 2) c't Virus ==
== 3) Emil 1A Virus = "Virus 1A" ==
== 4) Emil 2A Virus = "Virus 2A" = mad Virus ==
== 5) Mouse (Inverter) Virus =U=
== 6) Zimmermann-Virus ==
========================================================================
== Remark: updates or additions sind last edition (July 31st, 1989) ==
== are marked =U= or =+= in column 72. We have problems to get ==
== viruses, since many users wish to exchange their viruses (like ==
== stamps) against our's, which we principally refuse: the Virus Test ==
== Center's ethical standard is, that we do not spread viruses! ==
========================================================================
========================================================================
== The Computer Virus Catalog may be copied free of charges provided ==
== that the source is properly mentioned at any time and location ==
== of reference. ==
== ==
== Editor: Virus Test Center, Faculty for Informatics ==
== University of Hamburg ==
== Schlueterstr. 70, D2000 Hamburg 13, FR Germany ==
== Prof. Dr. Klaus Brunnstein, Simone Fischer-Huebner ==
== Tel: (040) 4123-4158 (KB), -4715 (SFH), -4162(Secr.) ==
== Email (EAN/BITNET): Brunnstein@RZ.Informatik.Uni-Hamburg.dbp.de ==
========================================================================
== Critical and constructive comments as well as additions are ==
== appreciated. Especially, descriptions of recently detected viruses =
== will be of general interest. To receive the Virus Catalog Format, ==
== please contact the above address. ==
========================================================================
== Computer Virus Catalog 1.2: Milzbrand=Anthrax Virus (Nov.9, 1989) ===
Entry...............: Milzbrand Virus
Alias(es)...........: Anthrax
Virus Strain........: ---
Virus detected when.: April 1987
where.: C'T (a german computermagazin)
Classification......: Program Virus (Extending V.)
Length of Virus.....: 1222 Bytes
--------------------- Preconditions -----------------------------------
Operating System(s).: ATARI-TOS
Version/Release.....: All Versions of ATARI TOS
Computer model(s)...: All Atari ST models
--------------------- Attributes -------------------------------------
Wasy Identification.: if killing the FAT it shows six 'Viruses' on screen
the Virus body (readable with HexDump-facilities)
include the text : 'DIES IST EIN VIRUS'
(=`This is a Virus')
Type of infection...: Executable File infection(.PRG) extending
Infection Trigger...: all programs>1000 Bytes
Storage media affected: Infects programs on disks and hard disks
(in the actuell path)
Interrupts hooked...: ---
Damage..............: overwriting bootblock and FAT on disks A and B
Damage Trigger......: year=1987
Particularities.....: shows six 'Viruses' on screen
Similarities........: ---
--------------------- Agents ------------------------------------------
Countermeasures.....: Category 1.1 Monitoring Files: program which
monitors (attempted) changes of
files
Category 2: Alteration Detection: a program which
detects changes of given files
Category 3: Eradication: a program which erases
specific virus code from files
Countermeasures successful: ---
Standard means......: Write protect the disk
--------------------- Acknowledgement ---------------------------------
Location............: Virus Test Center, University Hamburg, FRG
Classification by...: ---
Documentation by....: Ralf Stegen
Date................: Nov.9 1989
Information Source..: C'T April 1987
===================== End of MILZBRAND Virus ==========================
===== Computer Virus Catalog 1.2: c't-Virus (July 30, 1989) ============
Entry...............: c't Virus
Alias(es)...........: ---
Virus Strain........: ---
Virus detected when.: ---
where.: ---
Classification......: System (=BootSector) Virus, Reset-resident.
Length of Virus.....: 512 Byte
--------------------- Preconditions ------------------------------------
Operating System(s).: ATARI-TOS
Version/Release.....: 1.0 (06.02.86), 1.2 (TOS 1.4 not tested)
Computer model(s)...: All types of the Atari ST Series
--------------------- Attributes ---------------------------------------
Identification......: ---
Type of infection...: The virus tests two longwords near the top of the
available memory at locations (memtop)-$200 and
(memtop)-$200+$A.
The first longword is checked for $12123456, the
second one for $07A31CDF. If one of these doesnot
match, the virus is installed.
The virus is reset-resident.
1st: Virus is copied to a new location in memory;
2nd: Virus's age is increased by 1.
Infection Trigger...: Each time a diskette is changed, the new one
will be infected.
Storage media affected: Infects only diskettes. Damages Hard disks.
Interrupts hooked...: No interupts used.hdv_bpb and hdv_mediach vectors
are changed for installation in the system.
Damage..............: Transient/Permanent damage:
A damage can occur only if a harddisk is connected
to the system. Because of an error in the virus,
the partition information will be destroyed, if
the virus tries to write to the harddisk.
Otherwise, the following message is displayed on
the screen after every 20th infection:
"ARRRGGGHHH Diskvirus hat wieder zugeschlagen"
Damage Trigger......: Value of infection counter: every 20th infection.
Particularities.....: ---
Similarities........: ---
--------------------- Agents -------------------------------------------
Countermeasures.....: Programs that calculate the checksum and change
it, if it is $1234; the sector is then regarded as
not executable. (Category 1.3)
Countermeasures successful: ---
Standard means......: Write-protect the disk. Write a well-known program
to the boot sector; 'manually' change the check-
sum to a value other than $1234 .
--------------------- Acknowledgement ----------------------------------
Location............: Virus Test Center, University Hamburg, FRG
Classification by...:
Documentation by....: Michael Gaudlitz
Translated by.......: Bert K④hler
Date................: July 30, 1989
Information Source..: c't (Computer Magazine)
===================== End of c't Virus =================================
===== Computer Virus Catalog 1.2: Emil 1A Virus (July 30, 1989) ========
Entry...............: Emil 1A Virus
Alias(es)...........: "Virus 1A"
Virus Strain........: ---
Virus detected when.: 1987?
where.: FR Germany
Classification......: System (Boot Sector) Virus
Length of Virus.....: 512 Byte
--------------------- Preconditions ------------------------------------
Operating System(s).: Atari-TOS
Version/Release.....: 1.0, 1.2 (1.4 not tested)
Computer model(s)...: All types of the Atari ST Series
--------------------- Attributes ---------------------------------------
Easy Identification.: Boot sector will not be infected, if first word
is $6038.
Type of infection...: Infects the boot sector of the disk, if it is
regarded as not infected.
Infection Trigger...: Each time a floppy disk is changed, the new
disk will be infected.
Storage media affected: Floppy disks.
Interrupts hooked...: No interrupts used; diskvector hdv_bpb changed.
Damage..............: Infects the boot sector of the disk, if it is
regarded to be non-infected.
If the memory resident virus finds a fitting
key on a boot sector (first longword = $60381092),
then that sector is loaded and executed, regard-
less of the checksum. (Normally, the checksum
should be $1234 to indicate that this boot sector
is executable).
Damage Trigger......: Keyword ($60381092) in other Boot sectors.
Particularities.....: ---
Similarities........: See Emil 2A Virus.
--------------------- Agents -------------------------------------------
Countermeasures.....: Programs that calculate the checksum and
change it, if it is $1234; then, the sector
is regarded as not executable. The suspicious
(dangerous) second part of the virus might
not be recognized because it does not need
to have the proper checksum (see: Damage).
Countermeasures successful: ---
Standard means......: Write protect the disk.
Write a well-known program to the boot sector;
'manually' change the checksum to a value other
than $1234 .
--------------------- Acknowledgement ----------------------------------
Location............: Virus Test Center, University Hamburg, FRG
Classification by...: Thomas Piehl/ Michael Nagel
Documentation by....: Bert K④hler
Translated by.......: Bert K④hler/Paul Drake (Racal-Milgo/TEMEX)/
Date................: July 30, 1989
Information Source..: ---
===================== End of Emil 1A Virus =============================
===== Computer Virus Catalog 1.2: Emil 2A Virus (July 30, 1989) ========
Entry...............: Emil 2A Virus
Alias(es)...........: "Virus 2A" = mad Virus
Virus Strain........: ---
Virus detected when.: 1987?
where.: FR Germany
Classification......: System (Boot Sector) Virus
Length of Virus.....: 512 Byte
--------------------- Preconditions ------------------------------------
Operating System(s).: ATARI-TOS
Version/Release.....: 1.0, 1.2 (TOS 1.4 not tested)
Computer model(s)...: All ATARI ST Computer models
--------------------- Attributes ---------------------------------------
Easy Identification.. First byte in infected boot sector is $60.
Type of infection.... Infects the boot sector of a disk, if it is
regarded as not yet infected (value other than
$60 in first byte) and increments a variable.
Infection Trigger...: Every access to non-infected floppy disk.
Storage media affected: Floppy disks.
Interrupts hooked...: No Interrupts used;
hdv_rw vector changed to infect new disks.
Damage............... Permanent Damage: overwrites Boot sectors.
Transient damage: After each 5th infection, the
screen is randomly shifted (upside down) or
inverted, together with a beep.
Damage Trigger......: Random.
Particularities.....: Evidently, this is a "Demo Virus"; but it may
easily be changed to a dangerous one with only
moderate programming experiences.
Similarities........: See Emil 1A Virus.
--------------------- Agents -------------------------------------------
Countermeasures.....: Programs that calculate the checksum and change
it, if it is $1234; then, the sector is regarded
as not executable.
Countermeasures successful: ---
Standard means......: Write protect the disk.
Write a well-known program to the boot sector;
'manually' change the checksum to a value other
than $1234.
Reboot the system with a 'clean' disk.
--------------------- Acknowledgement ----------------------------------
Location............: Virus Test Center, University Hamburg, FRG
Classification by...: Ralf Stegen
Documentation by....: Ralf Stegen
Translation by......: Bert K④hler
Date................: July 30, 1989
Information Source..: ---
===================== End of Emil 2A Virus =============================
== Computer Virus Catalog 1.2: Mouse (Inverter) Virus (Nov.11 1989) ==
Entry...............: Mouse (Inverter) Virus
Alias(es)...........: Ghost
Virus Strain........: ---
Virus detected when.: ---
where.: ---
Classification......: System (BootSector) Virus, Reset-resident,
Overwriting
Length of Virus.....: 512 Byte
--------------------- Preconditions -----------------------------------
Operating System(s).: ATARI-TOS
Version/Release.....: All Version of TOS
Computer model(s)...: All types of the Atari ST Series
--------------------- Attributes -------------------------------------
Easy Identification.: ---
Type of infection...: Self-Identification: The Virus tests adresse $140
for the first Virus instruction; virus installs
itself reset- and RAMresident if virus code does
not match.
Infection Trigger...: Each time a new diskette is inserted, the virus
will infect the new diskette.
Storage media affected: The virus infect drive A,B!
Interrupts hooked...: No Interrupts used.
Resetvector for installation changed.
hdv_bpb changed to infect Bootsector of new Disk.
Damage..............: Permanent Damage: Overwriting Bootsectors.
Transient Damage: Inverting Mouse Up-Down Moving-
direction.
Damage Trigger......: Damage Action after 10 infections. Always after
5 new infections,the Mouse Movingdirection is
again inverted.
Particularities.....: ---
Similarities........: ---
--------------------- Agents ------------------------------------------
Countermeasures.....: Programm that checks hdv_bpb-, Reset-vector if
adresse is not lower $400(Exception vectors)
(Category 1.2).
Programs that calculate the checksum and change
it, if it is $1234; the sector is then regarded
as not executable. Reboot the system with a
'clean' disk! ( Category 1.3 ).
Countermeasures successful: Poke instruction 'move.l #$D6,d3' to
adresse $140 (this excludes Virus' installation).
Standard means......: Write-protect the disk.
Write a well-known program to the boot sector;
'manually' change the checksum to a value other
than $1234.
--------------------- Acknowledgement ---------------------------------
Location............: Virus Test Center, University Hamburg, FRG
Classification by...: Thomas Piehl
Documentation by....: Thomas Piehl
Date................: Nov. 11,1989
Information Source..: ---
===================== End of Mouse (Inverter) Virus ====================
===== Computer Virus Catalog 1.2: Zimmermann-Virus (July 30, 1989) =====
Entry...............: Zimmermann-Virus
Alias(es)...........: ---
Virus Strain........: ---
Virus detected when.: 1988?
where.: FR Germany
Classification......: Program Virus (Extending V.)
Length of Virus.....: 1414 Byte
--------------------- Preconditions ------------------------------------
Operating System(s).: ATARI-TOS
Version/Release.....: All versions
Computer model(s)...: All types of the Atari ST Series
--------------------- Attributes ---------------------------------------
Easy Identification.: Infected System: The virus checks if the Trap 1-
vector points to a certain byte-sequence. Infected
programs are recognized by enlargement of the file
length and by typical virus specific code.
Type of infection...: Program virus: the virus code is appended at the
end of the program; the loader table is adjusted.
Infection Trigger...: Every time when a program is executed.
Storage media affected: Floppy disks only.
Interupts hooked....: VBL-Interupt for time control.
Trap #1 to control program start.
Damage..............: Permanent Damage: the virus only infects files
with extensions PRG, TTP and TOS in the current
directory on drives A and B. The program's
startup-time is considerably increased.
Damage Trigger......: ---
Particularities.....: After installation in the system, the virus is
distributed every time a program is started from
disk A or B. Approximately 30 minutes after the
installation, the virus generates a file, 50 bytes
long, with an unusual name consisting of special
characters: "@^#%& .(-: ". The file is read-
only and contains the following text:
";-) As MAD Zimmermann will be watching you )-;"
The characters at the ends of the line can be
regarded as a happy face on the left and a sad
face on the right side; probably kind of ASCII-
comic with political background: F.Zimmermann is
a well-known conservative politician in FRG, and
a strong opponent of privacy and data protection;
as former minister of Interior, he was responsible
for several intelligence agencies, though not for
the German military intelligence service "MAD".
Similarities........: ---
--------------------- Agents -------------------------------------------
Countermeasures.....: The virus can be detected in and removed from
infected files by 'Zimmermann Virusfilter
Program', written by Thomas Piehl (see below).
Countermeasures successful: 4DETECT detects the Zimmermann-Virus, if you
set 'System Supervision' to 'On'; 4DETECT then
tells when the trap #1 vector is changed.
4DETECT also supervises suspicious write accesses
to boot sectors and program files.
Standard means......: Write-protect the disk.
--------------------- Acknowledgement ----------------------------------
Location............: Virus Test Center, University Hamburg, FRG
Classification by...: Thomas Piehl
Documentation by....: Thomas Piehl
Translated by.......: Bert K④hler
Date................: July 30, 1989
Information Source..: ---
===================== End of Zimmermann-Virus ==========================
========================================================================
== End of ATARIVIR.789 document ==
== (375 Lines, 2.045 Words, 21k Bytes) ==
========================================================================