home *** CD-ROM | disk | FTP | other *** search
- =============================================================================
- THE "1701 VIRUS" IS *VERY* REAL
- =============================================================================
-
- May 16, 1989
-
- One of my callers sent me a real live virus (I knew about it ahead of
- time) and it is a doozie. It's called WOW, WOWTITLE, and apparantly
- some other names. It is nothing but an ANSI screen that jiggles a bit,
- and does some other nonsense stuff, but while it is doing this, it is
- attaching itself to COMMAND.COM or the next .COM file that you run. It
- appears to be a TSR that remains in memory after it is first run. After
- it has run once, every single .COM program you run after that will become
- infected, by the virus inserting itself in the .COM program and it makes
- it *exactly* 1,701 bytes larger. For those of you that know your hardware
- errors, you know that a 1701 error means "hard disk failure" and that is
- what I expect this to do at some point in time. I think that this is more
- than coincidence so that's what I'll refer to it from now on.
-
- Since I knew all of this before I ran it, I decided to do a little bit of
- tinkering. Changed the Boot Record on the hard disk to look for something
- other than IBMBIOS.COM & IBMDOS.COM. Changed the system files so they
- wouldn't look for COMMAND.COM, but some another name. Marked all of the
- .COM and .EXE files read only, and fired it up. Sure enough it found
- ALSCOMM.COM (as I renamed it) infected it, and when I ran any .COM program
- they also got infected. It appears that it looks for some sort of pattern
- contained in COMMAND.COM and then goes for that file, no matter what the
- name is. I even set the COMSPEC variable to point to COMMAND.COM and
- while other programs that read this variable, couldn't shell out to DOS
- because it wasn't there, this little critter found it, no problem. It
- appears that COMMAND.COM (or whatever you try to rename it to) does the
- damage, because I copied a good copy of COMMAND.COM over the infected
- one, and then ran the infected programs, along with some that hadn't
- become infected, and no problems appeared. But after running WOW again
- it infected COMMAND.COM once more, and after that every .COM program I
- ran got infected. If you run accross this virus, I'd suggest that you
- erase your copy of COMMAND.COM, do a cold re-boot, and then re-copy a
- good copy of COMMAND.COM back to your hard disk. I would suggest that
- you run a group of programs, Edlin, etc. and note the sizes before you
- run them, and after. If you've run some programs after you run this
- little critter, they are all probably infected. I wanted to capture a
- screen image but it is all graphics, so I couldn't do it with any of
- the programs that I had.
-
- The image is just one screenful, and it kinda looks like this:
-
- "The Wizards of Warez"
- in assocoation with
- the copycats
- the Pirates Unlimited
- OUTRUN
-
- some other messages on who hacked this etc.
-
- WOW (in the lower left hand corner) (lower right hand corner)---1989
-
- Since this is a TSR, and since it has already found and gotten through
- my security measures, I see no reason that it couldn't get into DSZ,
- which it has, and be transmitted from one BBS to another. I haven't tried
- this yet, but will in the near future. All of the infected programs run
- just fine, and show no changes whatever, except getting 1,701 bytes larger,
- from before they were infected. As far as to just what this virus does,
- from a damage standpoint, I have to say, nothing so far, but I'm going to
- let it run for a bit to see what it does when some more of the files on my
- other computer get infected. All it does so far it to just alter file sizes,
- but it doesn't change the time or date. It doesn't matter whether the file
- is marked read only either. Other than changing file sizes, is all that it
- does so far....But any program that can do that to "read only" files, and
- does it exactly 1,701 bytes, is up to something. Just what that something
- is, is not known at this time.
-
- Once discovered it is simple, if not time consuming, to get rid of. All
- you have to do is to isolate all of the .COM files you have and replace
- them with ones from your backups. Once you do this, it is gone, but if
- you forget just one of them, and then you run that program, it will start
- all over again.
-
- It seems to only affect .COM files, not .EXE files, or any other that I
- could discover. It doesn't seem to alter the system files, but it wouldn't
- hurt to replace them as well. But BE SURE that you aren't replacing them
- with infected files. I missed one file, and in 20 minutes I had re-infected
- 25 files all over again. It only takes one.
-
- For you Doubting Thomas' out there, here is a list of just some of the
- files that were infected on my other computer (not the BBS!)
-
- COMMAND COM 25332 12-31-87 12:00p
- COMMAND VIR 27033 12-31-87 12:00p
- COMMO VIR 19761 5-08-89 7:13p
- COMMO COM 18060 5-08-89 7:13p
- HGCIBM VIR 8386 1-01-01 1:01a
- HGCIBM COM 6685 1-01-01 1:01a
- EDLIN VIR 9196 12-31-87 12:00p
- EDLIN COM 7495 12-31-87 12:00p
- DSZ VIR 53863 5-07-89 5:09p
- DSZ COM 52162 5-07-89 5:09p
- CLOCK VIR 2725 1-01-01 1:01a
- CLOCK COM 1024 1-01-01 1:01a
- CAPSRLSE COM 1327 4-16-89 12:00p
- CAPSRLSE VIR 3028 4-16-89 12:00p
- HUSH VIR 1707 1-01-01 1:01a
- HUSH COM 6 1-01-01 1:01a
- HOTKEY VIR 2182 1-22-87 11:10a
- HOTKEY COM 481 1-22-87 11:10a
- CED VIR 8857 12-06-85 1:18p
- CED COM 7156 12-06-85 1:18p
- SKN VIR 35710 11-26-88 10:25a
- SKN COM 34009 11-26-88 10:25a
-
- I've renamed the infected .COM programs to .VIR and they were all taken
- from my hard disk after I ran the program. As you can see this is a wide
- variety of programs from Sidekick to Edlin. All of them worked perfectly
- after the infection, so there is really no way to tell if something is
- wrong or not.
-
- What's the bottom line of all of this?? Well, to be honest, I just don't
- really know. But one thing that I *do* know is, that something is going
- on that shouldn't be going on. On top of that, there is no way I can see
- to stop it from doing its thing, once it has started, *unless* you know
- what the symptoms are.
-
- Maybe all this thing does is change the file size in the directory, by
- 1,701 bytes, and that's all. But I kinda think that my other computer
- is about to have something go very wrong at some point in time, and since
- the programs all run just fine, I could have copied them and given them
- to others not knowing the problem even existed. If you have seen this
- program, or know sombody that has, just pass on this message to them,
- and hope that all the program does, is to change the file size and that's
- all.
-
-
- ==============
- May 17, 1989
- ==============
-
- I've been doing some more experimenting and have discovered that the virus
- not only attaches itself to .COM files, in some cases it will actually
- alter the files themselves. I have a file HUSH.COM that quiets down the
- floppy drives, and it is only a 7 byte file, but ends up a 1,708 byte file
- after infection. As you can imagine it is pretty easy to compare the
- original file with the infected one. To my surprise the original code of
- the program had been altered, but it still worked !
-
- I started to take a closer look at the files with LIST, (yes it got 1,701
- bytes larger) and discovered what might be considered a "signature" of
- this particular virus. There is a string 141$FLu that seems to be
- a good way to know if you have been infected. None of the original files
- had it, and all of the larger ones did. I checked my BBS working C: and
- that particular string wasn't found anywhere, so it might be a good way
- to identify it. There are many utilties that will search the disk for
- strings. I'd suggest that you get one of them and run it on your entrie
- disk. If you get a "hit", you should erase the offending file, and replace
- it with one that you know to be OK. Just compare the file sizes. If the one
- on your hard disk is 1,701 bytes larger than the one on your backup, then
- you are in for some fun.
-
- Some other observations. When you first run the virus, it appears that it
- looks for COMMAND.COM, but it may not effect it at all. I have a mono system
- and I ran HCGIBM to emulate CGA to see what was happening. HCGIBM got zapped
- and not COMMAND.COM, and once it was installed in memory, all subsequent
- .COM files became infected. The second time around, at least, COMMAND.COM
- hasn't become infected like it did the first time around. So it appears that
- the only sure way to find the infected files is to search for the tell tale
- string that the virus imbeds in the .COM file.
-
- I put an uninfected version of LIST on a floppy along with some text files,
- and then put a write protect tab on the floppy. Ran a program that I knew
- had the virus in it, and then another one that didn't. Sure enough, it was
- loaded into memory, and when I went to drive a: and tried to List the text
- file I got a "write error" before List loaded the text file. After the
- normal Abort, retry, ignore, fail (I choose Fail) List loaded the text file
- and remained unchanged, so if you have you floppies write protected, it
- can't do it's thing. There are many programs that "write protect" your hard
- disk, so this might be one way to protect against infection. Only problem
- is that lots of normal programs write files to the disk, so this isn't a
- very good solution.
-
- Tonight we're going to unassemble the code to see what makes it tick.
-
-
- ==============
- May 19, 1989
- ==============
-
- With the help of one of my programming friends, we have dissambled the
- program and indeed it alters the original file, re-writes the first part
- of the program with a "jump" instruction as the first thing the infected
- program does. It goes to where it wants to find a copy of itself, and if
- the file isn't infected, it then will insert the code into the un-infected
- program, write the altered program to disk, and *then* runs the program as
- if nothing has happened. Next time that infected program is run, it will
- attach itself to COMMAND.COM if it isn't already infected, and if both
- the memory portion of COMMAND.COM is infected, and the file that is loaded
- is infected, no disk writes occur, the progarm loads normally. We have
- also confirmed that the signature 141$FLu is in the original program and
- is also in all of the infected copies. For all we know WOW might be nothing
- more than an infected program, not the original virus.
-
- Enclosed in this ARC is a program that will search out this unique signature
- and identify all files that are infected. It is a quick way to spot this
- virus and get rid if it.
-
- Pass this file along to a friend, and maybe save them some grief.
-
- Al Kalian
- Palladin BBS
- 415-332-1655
-