93 lines
4.3 KiB
Plaintext
93 lines
4.3 KiB
Plaintext
![]() |
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
|||
|
<20> VIRUS REPORT <20>
|
|||
|
<20> Fu Manchu <20>
|
|||
|
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
|||
|
|
|||
|
Synonyms: 2080, 2086
|
|||
|
|
|||
|
Date of Origin: March 10, 1988.
|
|||
|
|
|||
|
Place of Origin: written by Sax Rohmer.
|
|||
|
|
|||
|
Host Machine: PC compatibles.
|
|||
|
|
|||
|
Host Files: Remains resident. Infects COM, EXE, overlay files.
|
|||
|
|
|||
|
OnScreen Symptoms: You may see the message "You will hear from me again!"
|
|||
|
|
|||
|
Increase in Size of Infected Files: 2086 bytes for COM files, 2080 bytes
|
|||
|
for EXE files.
|
|||
|
|
|||
|
Nature of Damage: Affects system run-time operation. Corrupts COM and
|
|||
|
EXE files. Some versions corrupt overlay, SYS, and BIN files.
|
|||
|
|
|||
|
Detected by: Scanv56+, F-Prot, IBM Scan, Pro-Scan.
|
|||
|
|
|||
|
Removed by: CleanUp, Scan/D, or F-Prot.
|
|||
|
|
|||
|
Derived from: Jerusalem.
|
|||
|
|
|||
|
Scan Code: encrypted. You may be able to find the marker "sAXrEMHOr" in
|
|||
|
infected files. You can also search at offset 1EEH for FC B4 E1 CD 21 80
|
|||
|
FC E1 73 16.
|
|||
|
|
|||
|
The virus occurs attached to the beginning of a COM file, or the end
|
|||
|
of an EXE file. It is a rewritten ("improved") version of the Jerusalem
|
|||
|
virus, and most of what is said for that virus applies here with the
|
|||
|
following changes:
|
|||
|
|
|||
|
* The code to delete programs, slow down the machine, and display the
|
|||
|
black window has been removed, as has the dead area at the end of the
|
|||
|
virus and some sections of unused code.
|
|||
|
|
|||
|
* The marker is now 'rEMHOr' (six bytes), and the preceeding 'sU' is
|
|||
|
now 'sAX' (Sax Rohmer - creator of Fu Manchu).
|
|||
|
|
|||
|
* COM files now increase in length by 2086 bytes & EXE files 2080
|
|||
|
bytes. EXE files are now only infected once.
|
|||
|
|
|||
|
* One in sixteen times on infection a timer is installed which runs for
|
|||
|
a random number of half-hours (maximum 7.5 hours). At the end of this
|
|||
|
time the message "The world will hear from me again!" is displayed in
|
|||
|
the center of the screen and the machine reboots. This message is
|
|||
|
also displayed every time Ctrl-Alt-Del is pressed on an infected
|
|||
|
machine, but the virus does not survive the reboot.
|
|||
|
|
|||
|
* There is further code which activates on or after the first of August
|
|||
|
1989. This monitors the keyboard buffer, and makes derogatory
|
|||
|
additions to the names of politicians (Thatcher, Reagan, Botha &
|
|||
|
Waldheim), censors out two four-letter words, and to "Fu Manchu" adds
|
|||
|
"virus 3/10/88 - latest in the new fun line!" All these additions go
|
|||
|
into the keyboard buffer, so their effect is not restricted to the
|
|||
|
monitor. All messages are encrypted.
|
|||
|
|
|||
|
Some versions of this virus can infect overlay, SYS, and BIN files.
|
|||
|
It is still rare in the U.S.
|
|||
|
|
|||
|
|
|||
|
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
|||
|
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
|||
|
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
|||
|
<EFBFBD> Security Association. It contains information compiled from <20>
|
|||
|
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
|||
|
<EFBFBD> presented here is accurate. <20>
|
|||
|
<EFBFBD> <20>
|
|||
|
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
|||
|
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
|||
|
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
|||
|
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
|||
|
<EFBFBD> <20>
|
|||
|
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
|||
|
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
|||
|
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
|||
|
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
|||
|
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
|||
|
<EFBFBD> <20>
|
|||
|
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
|||
|
<EFBFBD> <20>
|
|||
|
<EFBFBD> This document may be distributed in any format, providing <20>
|
|||
|
<EFBFBD> this message is not removed or altered. <20>
|
|||
|
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
|||
|
|
|||
|
Downloaded From P-80 International Information Systems 304-744-2253
|