home *** CD-ROM | disk | FTP | other *** search
- ┌─────────────────────────────┐
- │ VIRUS REPORT │
- │ Alabama Virus │
- └─────────────────────────────┘
-
- Date of Origin: October 13, 1989.
-
- Place of Origin: Israel.
-
- Host Machine: PC compatibles.
-
- Host Files: Remains resident. Infects EXE files.
-
- OnScreen Symptoms: One hour after activation, the virus displays this
- message in a flashing box:
-
- "SOFTWARE COPIES PROHIBITED BY INTERNATIONAL LAW
-
- Box 1055 Tuscambia ALABAMA USA."
-
- Increase in Size of Infected Files: 1560 bytes.
-
- Nature of Damage: Affects system run-time operation. Corrupts program or
- overlay files. Directly or indirectly corrupts file linkage.
-
- Detected by: Scanv43+, F-Prot, IBM Scan, Pro-Scan.
-
- Removed by: CleanUp, F-Prot, or delete infected files.
-
- This virus was isolated by Ysrael Radai at Hebrew University. It
- manipulates the file allocation table and swaps file names so that files
- are slowly lost.
-
- The Alabama virus will infect .EXE files, increasing their size by
- 1,560 bytes. It moves into memory when any EXE containing the virus is
- executied. Unlike most other memory-resident viruses, the Alabama does
- not use the normal TSR function, but rather hooks interrupt 9 as well as
- IN and OUT commands. Upon detecting a Control-Alt-Delete, the virus
- generates what appears to be a warm boot, but remains in memroy. The
- virus loads to the top 30K of memory, unlike other memory-resident
- programs, and does not reduce the available memory reported by DOS.
-
- The Alabama virus uses a complex procedure during infection. It will
- first infect an EXE in the current directory, providing there is one
- which is uninfected. If all EXEs in the current directory are infected,
- then the Alabama virus will infect the program being executed --
- provided the system date is not Friday. On Fridays, the Alabama virus
- will swap entries in the FAT so that when the user attempts to execute an
- uninfected file, an infected file executes instead. Over time, files
- will be lost through this process.
-
-
- ╔════════════════════════════════════════════════════════════════════╗
- ║ This document was adapted from the book "Computer Viruses", ║
- ║ which is copyright and distributed by the National Computer ║
- ║ Security Association. It contains information compiled from ║
- ║ many sources. To the best of our knowledge, all information ║
- ║ presented here is accurate. ║
- ║ ║
- ║ Please send any updates or corrections to the NCSA, Suite 309, ║
- ║ 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS ║
- ║ and upload the information: (202) 364-1304. Or call us voice at ║
- ║ (202) 364-8252. This version was produced May 22, 1990. ║
- ║ ║
- ║ The NCSA is a non-profit organization dedicated to improving ║
- ║ computer security. Membership in the association is just $45 per ║
- ║ year. Copies of the book "Computer Viruses", which provides ║
- ║ detailed information on over 145 viruses, can be obtained from ║
- ║ the NCSA. Member price: $44; non-member price: $55. ║
- ║ ║
- ║ The document is copyright (c) 1990 NCSA. ║
- ║ ║
- ║ This document may be distributed in any format, providing ║
- ║ this message is not removed or altered. ║
- ╚════════════════════════════════════════════════════════════════════╝
-
-