746 lines
32 KiB
Plaintext
746 lines
32 KiB
Plaintext
![]() |
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
<20><><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><> <20><> <20><><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD>
|
|||
|
۱<><DBB1> ۱<><DBB1><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> ۱<><DBB1> ۱<><DBB1><EFBFBD><EFBFBD><EFBFBD> ۱<><DBB1> ۱<><DBB1> ۱<><DBB1> ۱<><DBB1><EFBFBD><EFBFBD> ۱<><DBB1><EFBFBD><EFBFBD><EFBFBD><EFBFBD> ۱<><DBB1><EFBFBD><EFBFBD>
|
|||
|
۱<><DBB1> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> ۱<><DBB1> <20><><EFBFBD><EFBFBD>۱<EFBFBD><DBB1> ۱<><DBB1> ۱<><DBB1> ۱<><DBB1> <20><><EFBFBD>۱<EFBFBD><DBB1> <20><><EFBFBD>۱<EFBFBD><DBB1> <20><><EFBFBD><EFBFBD><EFBFBD>
|
|||
|
۱<><DBB1> ۱<><DBB1> <20><><EFBFBD><EFBFBD>۱<EFBFBD><DBB1> ۱<><DBB1> ۱<><DBB1> ۱<><DBB1> <20><><EFBFBD>۱<EFBFBD><DBB1> ۱<><DBB1>
|
|||
|
۱<><DBB1> ۱<><DBB1> ۱<><DBB1><EFBFBD><EFBFBD><EFBFBD> <20><> ۱<><DBB1> ۱<><DBB1> ۱<><DBB1><EFBFBD><EFBFBD> ۱<><DBB1>
|
|||
|
۱<><DBB1> ۱<><DBB1> <20><><EFBFBD><EFBFBD>۱<EFBFBD><DBB1> ۱<><DBB1> ۱<><DBB1> <20><><EFBFBD><EFBFBD><EFBFBD> ۱<><DBB1>
|
|||
|
۱<><DBB1> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> ۱<><DBB1> ۱<><DBB1> ۱<><DBB1> ۱<><DBB1> ۱<><DBB1>
|
|||
|
۱<><DBB1> ۱<><DBB1><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> ۱<><DBB1> ۱<><DBB1> ۱<><DBB1> ۱<><DBB1> ۱<><DBB1>
|
|||
|
<20><><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD> <20><> <20><> <20><><EFBFBD> <20><>
|
|||
|
|
|||
|
NEWSLETTER NUMBER 9
|
|||
|
**********************************************************************
|
|||
|
Another festive, info-glutted, tongue-in-cheek training manual
|
|||
|
provided solely for the entertainment of the virus programmer,
|
|||
|
casual bystander or PC hobbyist interested in the particulars
|
|||
|
of cybernetic data replication and/or destruction.
|
|||
|
EDITED BY URNST KOUCH, November 1992
|
|||
|
**********************************************************************
|
|||
|
|
|||
|
TOP QUOTE: "Concrete shoes! Neckties! Cyanide! Done dirt cheap!!"
|
|||
|
--AC/DC from "Dirty Deeds Done Dirt Cheap" on
|
|||
|
"Live 1992" late October, 1992
|
|||
|
|
|||
|
IN THIS ISSUE: News-news-news . . . Solomon's Anti-virus Toolkit
|
|||
|
scrutinized for user happiness quotient . . . ACME virus and URNST's
|
|||
|
continuing fetish with companion infections . . . RAUBKOPY virus:
|
|||
|
a German anti-piracy product . . . intro to the first annual Crypt
|
|||
|
letter virus\antivirus\virus software awards . . . In the READING
|
|||
|
ROOM . . . stupid humor & lots more . . .
|
|||
|
|
|||
|
-*-
|
|||
|
|
|||
|
TOP O' THE NEWS: WEENIES STRIKE AGAIN - the PROTO-T hoax. Once
|
|||
|
again, the chief dupes were FidoNet and WWIVnet users. The story
|
|||
|
goes like this: anonymous electronic stooge posts e-mail message
|
|||
|
from noble 'underground elite' sysops in the S.F. Bay Area who
|
|||
|
see their systems decimated by a magical, virulent program
|
|||
|
which 'hides' in COM port 1, etc., etc. Noble sysops band together
|
|||
|
to spread word to "straight" world, with the exception of the
|
|||
|
Software Publishers Association. Eegah!
|
|||
|
|
|||
|
Contagion spreads like wild fire. Call US NEWS & WORLD REPORT! We
|
|||
|
reprint the original PROTO-T warning (spelling errors and all) for
|
|||
|
your enjoyment and add that one of the viruses included in this
|
|||
|
issue has been named PROTO-T, in honor of the quacks who started the
|
|||
|
rumor.
|
|||
|
|
|||
|
Transcript:
|
|||
|
*********************************************************************
|
|||
|
This is an exact copy of a "Broadcast" letter sent to all members and
|
|||
|
affiliates of THIEVCO INC; a group located somewhere in the San
|
|||
|
Francisco Bay Area. While I do not support the general theology of
|
|||
|
Thievco Inc, I must applaud thier actions. Thier warnings about a new
|
|||
|
|
|||
|
Page 1
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
virus called PROTO-T, will potentially save us computer users possibly
|
|||
|
thousands of dollars - and hundreds of man hours.
|
|||
|
|
|||
|
Here is a copy of the broadcast letter, as received from a friend
|
|||
|
at Thievco ...
|
|||
|
|
|||
|
<<*>> <<*>> <<*>> <<*>> <<*>> <<*>>
|
|||
|
|
|||
|
Retrieved BLUWAV 6921 / THIEV 00621*420 - Node 1:8 Sent T-Tymnet
|
|||
|
|
|||
|
Date : 9/24/92 11:14pm
|
|||
|
To : All Thievco Members, and affil.
|
|||
|
Re : PROTO - T
|
|||
|
Class : Confidential (go public 9-26)
|
|||
|
|
|||
|
|
|||
|
Dear Members,
|
|||
|
|
|||
|
At 7:34PM (pst) our attempt to isolate and contain the PROTO - T
|
|||
|
virus failed. As we have discovered, PROTO - T has a *VERY* unique
|
|||
|
feature, to hide in the RAM of VGA cards, hard disks, and possibly,
|
|||
|
in modem buffers. Unfortunaly, we found out the hard way - after it
|
|||
|
struck.
|
|||
|
|
|||
|
At this time, there is no known defence against this virus, save
|
|||
|
formatting your hard/floppy disks - there isn't even a method of
|
|||
|
detecting it yet...untill its too late. [ PROTO - T specs listed
|
|||
|
later ].
|
|||
|
|
|||
|
Unearthly Vision ( Portland, Oregon ), and Chron ( Alameda, Calif )
|
|||
|
were working on isolating the virus when it struck. Over 900 megabytes
|
|||
|
of information was lost, of that about 214 megabytes is probably
|
|||
|
recoverable.
|
|||
|
|
|||
|
Action :
|
|||
|
|
|||
|
Please assist us in implementing this plan, to warn the general public.
|
|||
|
Our first priority is our fellow THIEVCO members. Please distribute this
|
|||
|
letter to all contacts inside the U.S., upon recipt of this letter.
|
|||
|
Please inform the public on 9-26-92. Start warning the elite boards
|
|||
|
first, followed by the P.D. boards. Dont bother telling known SPA
|
|||
|
locals, they aren't worth our time.
|
|||
|
|
|||
|
Blue Boar - Distribute the warning in Southern California, start
|
|||
|
with L.A. first.
|
|||
|
|
|||
|
Chron - Distribute to San Francisco, Sacramento, and south east
|
|||
|
coast.
|
|||
|
|
|||
|
Garfield - Distribute to Fido-Net, Vet-Net, Compuserve, and America
|
|||
|
Online.
|
|||
|
|
|||
|
Unearthly Vision - Distribute to Oregon, and Washington.
|
|||
|
|
|||
|
Executioner - Distribute to San Jose, Monterey.
|
|||
|
|
|||
|
|
|||
|
Page 2
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=
|
|||
|
|
|||
|
What is known:
|
|||
|
|
|||
|
Proto - T was just a rumor, untill it was confirmed a few weeks ago.
|
|||
|
Chron, being the most incredible skip-tracer, traced its origins to a
|
|||
|
college campus in California. There, it was placed into two files.
|
|||
|
The first, is a file called "TEMPLE" - which to our knowledge, has no
|
|||
|
legitimate use; it seems to be a dummy file. The other file, was
|
|||
|
placed in an unathorized version of PKZip by PKWare ( versions 3.0,
|
|||
|
and 3.1 - these are not legitimate versions of PKZip! Quite possibly,
|
|||
|
these versions of PKZip were created, for the reason of distributing
|
|||
|
PROTO - T ).
|
|||
|
|
|||
|
Proto - T is very elusive. There is no program known to detect it.
|
|||
|
From what we understand, it will only infect your system if certian
|
|||
|
conditions are met. From what we know, it will infect your system only if
|
|||
|
you run TEMPLE, or PKZip 3.x after 6:00pm. Even doing that wont nessaraly
|
|||
|
cause infection - it took 6 days for Chron and Unearthly Vision to
|
|||
|
become infected. Obviously some other criteria must be met.
|
|||
|
|
|||
|
Upon infection, the virus is written (as un-attached file chains), On
|
|||
|
two parts of a hard disk - each capable of running independently without
|
|||
|
the other half.
|
|||
|
|
|||
|
After infection, the virus seems to be written into the memory or memory
|
|||
|
routines of a VGA or EGA monitor; or is written into the memory of the
|
|||
|
hard drive, or quite possibly, into a modem - or COM port. Thus excaping
|
|||
|
most or any known detection methods.
|
|||
|
|
|||
|
PROTO - T :
|
|||
|
|
|||
|
Proto - T when activated, corrupts data on a disk, stops VGA or EGA
|
|||
|
from being used ( Thus either defaulting to CGA, or locking up ), and
|
|||
|
prohibits memory from being used over 512K.
|
|||
|
|
|||
|
Known to be put into two files : TEMPLE.EXE ( 14,771 Bytes ) and PKZip
|
|||
|
3.x (Varries always over 100,000 bytes when zipped). If you see these
|
|||
|
files - do not get or use them.
|
|||
|
|
|||
|
Give this letter to all Thievco members and thier contacts, followed by
|
|||
|
other boards.
|
|||
|
|
|||
|
With luck, we can stop the damage before it *REALLY* starts.
|
|||
|
|
|||
|
THIEVCO INC, San Francisco Bay
|
|||
|
Area.
|
|||
|
|
|||
|
|
|||
|
Special Thanks for Chron, Unearthly Vision, and Blue Boar for all thier
|
|||
|
help with this "Early warning" and tech help.
|
|||
|
|
|||
|
|
|||
|
Bill [A NOBLE CYBER-CITIZEN. -URNST]
|
|||
|
*******************************************************************
|
|||
|
|
|||
|
Page 3
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Crypt newsletter recommendations: Send a copy of the transcript and
|
|||
|
PROTO-T to Pam Kane of Panda Systems. According to a recent COMPUSERVE
|
|||
|
magazine story on viruses, Kane is working on a hi-tech novel with
|
|||
|
a virus villain. PROTO-T could be ripe for even more embellishment
|
|||
|
in a good novella. And there's no worry about royalties, either!
|
|||
|
|
|||
|
Boy, I love reading this stuff! It's cut from the same bolt of cloth
|
|||
|
that supplies the endless numbers of computer chowderheads ready
|
|||
|
willing and able to argue that a trojan or virus can blow up your
|
|||
|
monitor. And here's more:
|
|||
|
|
|||
|
*******************************************************************
|
|||
|
Proto-T is NOT a hoax... and from what I've heard through the grape
|
|||
|
vien [VIEN? Is that in Austria?] is just about as nasty as they get.
|
|||
|
|
|||
|
The problem with detecting it is that no one's really sure where it
|
|||
|
goes...com ports, video memory, you name it, and it might have
|
|||
|
accessed it...
|
|||
|
|
|||
|
From all the information I've seen off internet proto-t ussually
|
|||
|
strikes after 6:00pm, but is not totally dependant upon the time alone.
|
|||
|
I believe it was a lab in Austin Texas that was doing the most
|
|||
|
heaviest work on it, although I can't be 100(null)ure that it was Austin..
|
|||
|
but at any rate Proto-T is legit, and from all I've been reading
|
|||
|
probably one of the most intense virii written to date.. no one seems
|
|||
|
to be able to lock it down as from all obersvation it writes to two
|
|||
|
seperate sections of the hard disk and neither rely on one or the other
|
|||
|
to activate.. and it *might* have reproductive
|
|||
|
powers to boot (ie you destroy one of the writes, the other kicks
|
|||
|
in and rebuilds it..).
|
|||
|
|
|||
|
I don't like the looks of this one, not at all..
|
|||
|
|
|||
|
Devin Davidson [ANOTHER NOBLE CYBER-CITIZEN. -URNST]
|
|||
|
|
|||
|
**********************************************************************
|
|||
|
PATRICIA HOFFMAN, VSUM AUTHOR, QUITS AT 4:00pm
|
|||
|
**********************************************************************
|
|||
|
|
|||
|
I snagged the next entry describing the MtE Spawn (real name: INSUFF3)
|
|||
|
off the FidoNet. Someone had posted it from Patricia Hoffman's
|
|||
|
VSUM in response to a question on Mutation Engine viruses. The
|
|||
|
Crypt reader will recognize MtE Spawn as one of the INSUFF viruses
|
|||
|
from a previous newsletter.
|
|||
|
|
|||
|
MTE Spawn: Received in September, 1992, MTE Spawn is a non-
|
|||
|
resident spawning or companion virus which uses the Dark
|
|||
|
Avenger Mutating Engine for its encryption. When an infected
|
|||
|
program is executed, this virus will infect one .EXE file
|
|||
|
in the current directory, creating a 6,666 to 6,746 byte
|
|||
|
.COM file with the same base file name. This companion file
|
|||
|
will have the read-only, system, and hidden attributes set,
|
|||
|
and its date and time will be the system date and time when
|
|||
|
infection occurred. The original .EXE file will not be
|
|||
|
altered. Execution of an MTE Spawn virus infected program
|
|||
|
will result in a system hang after five .EXE files in the
|
|||
|
|
|||
|
Page 4
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
current directory have become infected. Additionally,
|
|||
|
the companion files will not be executed under some versions
|
|||
|
of DOS due to a minor bug in this virus. To disinfect an
|
|||
|
infection of MTE Spawn, simply delete the hidden companion
|
|||
|
files.
|
|||
|
Origin: Unknown September, 1992. [Crypt newsletter 6, actually.]
|
|||
|
|
|||
|
|
|||
|
Note the size reported by Hoffman: 6,666 bytes. Pretty big for a
|
|||
|
non-resident companion virus! Must be written in PASCAL, or
|
|||
|
somethin'. Nope. Actually, the reader may remember this
|
|||
|
particular virus carries a 4,000 byte payload: the NOIZ
|
|||
|
trojan. The NOIZ program is dropped onto .EXE's in the current
|
|||
|
directory anytime MtE Spawn is executed after 4:00 in the
|
|||
|
afternoon. NOIZ is a joke program which installs itself in memory
|
|||
|
and, obviously, makes noise. And it irreversibly soils any program
|
|||
|
it lands on. This makes NOIZ difficult to ignore. So, Patricia
|
|||
|
Hoffman either worked on MtE Spawn in the morning or went home
|
|||
|
by 4:00 pm the day she examined it. Oh wow.
|
|||
|
|
|||
|
******************************************************************
|
|||
|
CENTRAL POINT SOFTWARE VOWS "ALL PC's VIRUS FREE BY '93!" IN
|
|||
|
MARKETING NEW CP ANTIVIRUS FREEWARE SCANNER. OH WOW.
|
|||
|
******************************************************************
|
|||
|
|
|||
|
Central Point Software follows SYMANTEC into the retail program
|
|||
|
offered as bait freeware by making the scanner engine in its
|
|||
|
latest edition available as a no-strings downloadable file on
|
|||
|
COMPUSERVE and AMERICA-ON-LINE.
|
|||
|
|
|||
|
The scanner, packaged as the archive CPAVSO.ZIP, SO standing for
|
|||
|
"scanner only," is cosmetically very similar to SYMANTEC's
|
|||
|
freeware NAVSCAN issued a month ago.
|
|||
|
|
|||
|
The SO version of CPAV's scanner engine claims to detect all
|
|||
|
Mutation Engine viruses and Virus Creation Laboratory variants.
|
|||
|
At the Crypt editorial offices it failed to detect the MtE-
|
|||
|
equipped INSUFF viruses, noted in the latest edition of Patricia
|
|||
|
Hoffman's VSUM as MtE Spawn. It also hiccuped when running against
|
|||
|
any but the most basic Virus Creation Laboratory code samples.
|
|||
|
|
|||
|
CPAVSO continues the weird Central Point Software method of
|
|||
|
counting a virus which infects both .COMfiles and .EXEfiles
|
|||
|
as two strains, thereby inflating its detection claims.
|
|||
|
|
|||
|
However, as a brute force scanner, the SO edition is worth precisely
|
|||
|
what you pay for it.
|
|||
|
|
|||
|
*****************************************************************
|
|||
|
URNST TAKES THE PRODIGY CHALLENGE AND ORDER's DR. SOLOMON's
|
|||
|
ANTIVIRUS TOOLKIT THROUGH ONTRACK SYSTEMS: A QUALITY REPORT
|
|||
|
*****************************************************************
|
|||
|
|
|||
|
The Sears Roebuck administered "personal information service"
|
|||
|
for yuppies, Prodigy, recently hyped an antivirus software offer
|
|||
|
which, on the surface, appeared quite attractive. It offered
|
|||
|
|
|||
|
Page 5
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
a special data integrity package armed with the Solomon Toolkit's
|
|||
|
FindVirus utility, an "unerase" program designed to allow
|
|||
|
buyers to easily recover recently scotched files and a rudimentary
|
|||
|
set of hard disk maintenance utilities. Not a bad deal for
|
|||
|
$34 cash money until you consider that anyone running DOS 5.0,
|
|||
|
NORTON UTILITIES or any equivalent already has the hard file
|
|||
|
maintenance programs, reducing the Prodigy package to a $34
|
|||
|
brute-force scanner. Nah, pass.
|
|||
|
|
|||
|
However, Prodigy did offer the complete Solomon Toolkit for
|
|||
|
$39. The catch was it came sans manual. Of course, you could
|
|||
|
also buy the manual, thereby bringing the total price up to
|
|||
|
$99, just about what you would pay for the Toolkit anywhere.
|
|||
|
|
|||
|
Hah! But Prodigy hadn't counted on a Crypt newsletter editor
|
|||
|
as a buyer. We don't need no stinking manuals!
|
|||
|
|
|||
|
And so we evaluated the Toolkit just for you, the Crypt reader!
|
|||
|
|
|||
|
The Toolkit is easy to install. You can either use the dumb
|
|||
|
install program or copy the files manually into a TOOLKIT
|
|||
|
directory on the hard file of choice. All Toolkit programs are
|
|||
|
command line driven, but most will want to use the Toolkit
|
|||
|
menu. The menu is perfunctory but clear.
|
|||
|
|
|||
|
The Toolkit sans manual offers little advice, although there
|
|||
|
is plenty of embedded help to aid in understanding possible
|
|||
|
functions.
|
|||
|
|
|||
|
The heart of the Toolkit is its two integrity checkers: Quick
|
|||
|
Check Virus and CheckVirus. CheckVirus provides more complete
|
|||
|
integrity data on executables and, therefore, according to
|
|||
|
Solomon, is more sensitive than Quick Check Virus. It is
|
|||
|
supposedly armored against advanced stealth viruses although
|
|||
|
we didn't bother to test this. CheckVirus WAS slapped around
|
|||
|
by the Crypt companion viruses VOTE and ACME (included in this
|
|||
|
issue.) Like most current products, it failed to note the
|
|||
|
significance of added files duplicates. Nay, it completely
|
|||
|
missed them. This was startling, since the Toolkit virus list
|
|||
|
claims it recognizes companion infections as special cases.
|
|||
|
Presumably, we take this to mean only SCANNED companion infections
|
|||
|
can be detected by the Toolkit's FindVirus program.
|
|||
|
|
|||
|
The Toolkit also sports a memory integrity utility called CheckMem.
|
|||
|
It failed to notice VOTE - a resident comapnion virus - in memory
|
|||
|
although it complained incessantly about only 639k of apparent RAM
|
|||
|
on the test machine even when no viruses were being tested.
|
|||
|
|
|||
|
However, this is unlikely to matter to the average user. The
|
|||
|
CheckMem utility does not present its information in any way that
|
|||
|
the average Prodigy subscriber would understand. Don't believe
|
|||
|
me? Start checking the Prodigy Computer Club help forums and you'll
|
|||
|
see what I mean.
|
|||
|
|
|||
|
The Toolkit's Quick Check Virus and CheckVirus programs easily
|
|||
|
detected changes made to files by the PROTO-T virus (in this
|
|||
|
|
|||
|
Page 6
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
newsletter). Since PROTO-T has no stealth properties and changes
|
|||
|
in infected file size are fairly obvious, this was an easy hit for
|
|||
|
the Toolkit.
|
|||
|
|
|||
|
However, the alarm message "*.COM has changed!!!" is not particularly
|
|||
|
useful. When contrasted with Leprechaun Software's Virus-Buster
|
|||
|
advisories/warnings and the redoubtable Integrity Master, by
|
|||
|
Stiller Research, both of which attempt to explain the possible
|
|||
|
reasons for change and a range of appropriate actions, the Toolkit's
|
|||
|
response is laughable. In addition, the Toolkit makes the user
|
|||
|
manually edit the files that contain its integrity data as programs
|
|||
|
are removed or renamed. This is a fairly rudimentary task, but still
|
|||
|
beyond the scope of the average Prodigy subscriber.
|
|||
|
|
|||
|
Included with the Toolkit are some special programs. BROWSE
|
|||
|
lets the user look at a suspicious file for "gotcha" messages.
|
|||
|
This is a nice touch and one all anti-virus programs should
|
|||
|
include. NOHARD and NOFLOPPY write protect respective disks.
|
|||
|
This is, IMHO, a useless and intrusive feature in everyday
|
|||
|
computing, but handy if you're going in harm's way.
|
|||
|
|
|||
|
The Toolkit also offers a standard array of repair functions
|
|||
|
for recognized viral infections. It rightly backs off on making
|
|||
|
any grand claims about the efficacy of these measures and sure
|
|||
|
enough, the program took a hands-off approach to some minor variants
|
|||
|
of recognized infections by merely renaming the file. When
|
|||
|
repairing file virus infections, the Toolkit will rescan
|
|||
|
a program after removal - a good feature which uncovers
|
|||
|
multiple infections.
|
|||
|
|
|||
|
The Toolkit also has an interesting embedded virus database.
|
|||
|
In it, viruses are described with regards to incidence, type of
|
|||
|
infection, damage, encryption, and stealth properties. I had to
|
|||
|
laugh at the frequent incidence description: "Not in the wild, but
|
|||
|
could be." This is the best example of a waffle I've seen in
|
|||
|
a long time, and it's been an election year.
|
|||
|
|
|||
|
On a positive note, the Toolkit's FindVirus ably detected all
|
|||
|
the Mutation Engine variants I was able to generate.
|
|||
|
|
|||
|
In conclusion, without the manual Solomon's Toolkit would seem like
|
|||
|
impenetrable murk to most users. Indeed, it's not entirely
|
|||
|
fair to judge the Toolkit - which despite some glaring faults
|
|||
|
is serviceable software - without this component. But I ask you,
|
|||
|
will the average Prodigy user read, use and understand a
|
|||
|
$40 manual? Hahaha. Bet against.
|
|||
|
|
|||
|
*******************************************************************
|
|||
|
|
|||
|
RAUBKOPY: AN ANTI-PIRACY VIRUS FROM GERMANY. FOR YOUR PLEASURE
|
|||
|
|
|||
|
*******************************************************************
|
|||
|
|
|||
|
You're going to like RAUBKOPY. Supplied as a DEBUG script in
|
|||
|
this issue, RAUBKOPY - which translates literally as "theft
|
|||
|
copy" or pirate, I presume - is a direct-action infector of
|
|||
|
|
|||
|
Page 7
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
.COM and .EXE files. Infected .COMfiles have the virus
|
|||
|
body added to their beginning; with .EXE's the virus is
|
|||
|
appended to the end. RAUBKOPY restricts itself to a single
|
|||
|
directory on call and attempts to infect as many as 5
|
|||
|
executables in a single go. RAUBKOPY is encrypted and resists
|
|||
|
simple methods of breaking 8 and 16-bit encryption schemes.
|
|||
|
|
|||
|
The interesting feature of RAUBKOPY is its anti-piracy message,
|
|||
|
displayed often and in German. Run RAUBKOPY a few times -
|
|||
|
you'll be sure to see it.
|
|||
|
|
|||
|
It is:
|
|||
|
-----------------------
|
|||
|
A C H T U N G !
|
|||
|
_______________________
|
|||
|
|
|||
|
"The Benutzung einer Raubkopi ist strassbar.
|
|||
|
Nur wer Original-Disketten, Handbucher,
|
|||
|
oder PD-Lizenzen besitzt dank
|
|||
|
Kopien verwenden.
|
|||
|
|
|||
|
Programmeirung ist muhevolle Detailarbeit.
|
|||
|
Wer Raubkopien verwendet, betrugt
|
|||
|
Programmierer und der Lohn ihrer Arbeit."
|
|||
|
|
|||
|
The machine waits a moment and then prompts the user again,
|
|||
|
|
|||
|
"Bist Du sauber" (Are you honest?) (J/N)
|
|||
|
|
|||
|
Hit J for "Ja!" and the infected program will function.
|
|||
|
|
|||
|
An on-the-fly (so don't sue if it's imprecise) translation is:
|
|||
|
|
|||
|
"Attention!
|
|||
|
The use of "Raubkopi" is restricted.
|
|||
|
Only those with the original diskettes, manuals
|
|||
|
or PD licenses may distribute copies.
|
|||
|
|
|||
|
"Programming is strenuous, exacting work.
|
|||
|
Those who distribute pirated files, betray
|
|||
|
programmers and the integrity of their work."
|
|||
|
|
|||
|
RAUBKOPY will also try to meddle with the fixed disk very late in
|
|||
|
the afternoon or after the 12th of any month. VSUM reports this
|
|||
|
as a buggy routine which fails; on my machine RAUBKOPY hung
|
|||
|
the processor after making the disk spin. Although
|
|||
|
RAUBKOPY appears to be harmless, it would be wise to be a little
|
|||
|
cautious when tinkering with it.
|
|||
|
|
|||
|
*****************************************************************
|
|||
|
ACME VIRUS - ANOTHER COMPANION INFECTOR
|
|||
|
*****************************************************************
|
|||
|
|
|||
|
Also in this issue: ACME. ACME is another nuisance companion
|
|||
|
virus - simple but easy to drive through the holes of most
|
|||
|
anti-virus file integrity schemes. ACME will try to create
|
|||
|
|
|||
|
Page 8
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
companion files for every .EXE in the current directory in
|
|||
|
one pass. Those new to the Crypt newsletter will want to
|
|||
|
know that these files are 912-byte hidden, read-only images
|
|||
|
of the ACME virus renamed as a COMfile equivalent of the
|
|||
|
"infected" target. When the "infected" target is executed,
|
|||
|
ACME will gain control of the computer, a consequence
|
|||
|
of the fact the DOS will choose .COM programs before .EXE
|
|||
|
programs of the same name to execute first.
|
|||
|
|
|||
|
ACME will lock up the PC with some insane music at 4 in
|
|||
|
the afternoon and release its grip right after midnight.
|
|||
|
ACME won't pollute your data - remove the virus by
|
|||
|
erasing all the hidden, read-only images it produces.
|
|||
|
Try it against Solomon's Toolkit, CPAV or your favorite
|
|||
|
installed software. You will be surprised how quickly
|
|||
|
ACME crawls all over it. Since ACME is restricted to
|
|||
|
a single directory, it is hard for me to imagine it getting
|
|||
|
very far. However, since it is very infectious, an ill-informed
|
|||
|
clumsy reader could have it get away from them. Fortunately,
|
|||
|
ACME is not nasty at all.
|
|||
|
|
|||
|
***************************************************************
|
|||
|
PROTO-T: A RESIDENT .COM infector NAMED AFTER ANOMYMOUS
|
|||
|
ELECTRONIC QUACKS
|
|||
|
***************************************************************
|
|||
|
|
|||
|
|
|||
|
And here it is! The dangerous, baffling PROTO-T! PROTO-T is
|
|||
|
a memory resident infector of .COMfiles. PROTO-T WILL also
|
|||
|
successfully infect COMMAND.COM if given the opportunity while
|
|||
|
in memory.
|
|||
|
|
|||
|
PROTO-T diminishes the amount of memory by around 1k and a
|
|||
|
simple MEM /c command will reveal it, IF the user has enough
|
|||
|
brains to remember what the free memory of his machine was
|
|||
|
BEFORE PROTO-T was installed.
|
|||
|
|
|||
|
Files infected by PROTO-T gain the ASCII string, "This program
|
|||
|
is sick. [PROTO-T by Dumbco, INC.]" In addition, after 4 in
|
|||
|
the afternoon PROTO-T infected programs will issue two
|
|||
|
ugly squawks from the speaker and then begin to read the
|
|||
|
hard file very quickly, mimicking a massive disk trashing.
|
|||
|
The programs won't function, of course, but the disk will
|
|||
|
be unscathed. It's a good demonstrator and convincingly
|
|||
|
unsettling.
|
|||
|
|
|||
|
Enjoy PROTO-T!
|
|||
|
|
|||
|
And remember, in the words of Devin What'shisname, "I don't
|
|||
|
like the looks of this one, not at all..."
|
|||
|
|
|||
|
***************************************************************
|
|||
|
|
|||
|
LATE STUFF FYI: Here's a list of virus exchange BBS's pulled
|
|||
|
off the FidoNet.
|
|||
|
|
|||
|
|
|||
|
Page 9
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
1) U.S.S.R System PHALCON/SKISM (091) 514-975-9362 DS
|
|||
|
Apply with John Johnson at Landfill BBS 914-hak-vmbs
|
|||
|
|
|||
|
2) Darkcoffin/Crypt HQ (091) 215-966-3576 V32bis
|
|||
|
Sysop : Tim Caton
|
|||
|
|
|||
|
3) The VIRUS (091) 804-599-4152 2400
|
|||
|
Fidonet 1:271/297, Sysop : Aristotle, John A.Buchanan
|
|||
|
|
|||
|
4) The VIRUS EXCHANGE (091) 602-569-2420 14.4
|
|||
|
Sysop : Michael Coughlin
|
|||
|
|
|||
|
5) HSRC BBS, David Butler (012) 28-3124 2400
|
|||
|
Location : Pretoria, South Africa
|
|||
|
Time 24Hrs
|
|||
|
To phone from outside South Africa: 27-12-283124
|
|||
|
*Appears to be the Human Science Resource Center.
|
|||
|
|
|||
|
6) Nemesis Eye, BBS, Darth Vader (021) 405-3543 2400
|
|||
|
Location : Cape Town, South Africa
|
|||
|
Time 16Hrs to 07Hrs GMT
|
|||
|
To phone from outside South Africa 27-21-4053543
|
|||
|
|
|||
|
Ionic Destruction 215-722-4524
|
|||
|
Nun Beaters Anonymous 708-251-5094
|
|||
|
The Hell Pit BBS 708-459-7267
|
|||
|
|
|||
|
|
|||
|
Incidentally, you may also find new copies of the Crypt letter at
|
|||
|
these points.
|
|||
|
|
|||
|
------------------------------------------------------------------
|
|||
|
|
|||
|
Nowhere Man reports that he is feverishly working on completion of
|
|||
|
Virus Creation Laboratory 2.0 for a near holiday release. And look
|
|||
|
for N.E.D. polymorphic viruses to start popping up in early
|
|||
|
January.
|
|||
|
|
|||
|
******************************************************************
|
|||
|
|
|||
|
ATTENTION READERS! TIME TO GET YOUR DIGS IN FOR THE FIRST ANNUAL
|
|||
|
CRYPT VIRUS/ANTI-VIRUS/VIRUS AWARDS!
|
|||
|
|
|||
|
******************************************************************
|
|||
|
|
|||
|
In December, we'll release our picks in a variety of topics for
|
|||
|
best and worse in the virus/anti-virus community. A few of
|
|||
|
the categories:
|
|||
|
|
|||
|
Most interesting virus:
|
|||
|
Most valuable player, virus programmer or other:
|
|||
|
Best virus exchange:
|
|||
|
National Dummkopf:
|
|||
|
Best a-v scanner:
|
|||
|
Best a-v software, overall:
|
|||
|
Best publication (we humbly disqualify ourselves):
|
|||
|
|
|||
|
Page 10
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Biggest flaming idiot:
|
|||
|
|
|||
|
Since they're gonna be editor's choices, they'll be purely subjective.
|
|||
|
Nyah! But you, the Crypt reader, can get into the action, too!
|
|||
|
Post your picks and pans on the VxNet with your own trenchant wit
|
|||
|
and I'll be looking for 'em to include in the article. Or, ensure
|
|||
|
your place in the Crypt letter by e-mailing them to me, URNST
|
|||
|
KOUCH, at the BBS's listed at the end of this Crypt letter.
|
|||
|
|
|||
|
|
|||
|
********************************************************************
|
|||
|
IN THE READING ROOM: A HUMDINGER, PHILIP ZIMMERMAN'S 'PRETTY GOOD
|
|||
|
PRIVACY' DOCUMENTATION
|
|||
|
********************************************************************
|
|||
|
|
|||
|
"Forbidden freeware" is how Philip Zimmerman describes his Pretty
|
|||
|
Good Privacy 2.0 encryption programs. Hah? Yup, I'm reading the
|
|||
|
docs to a freeware program! Docs you might like to browse
|
|||
|
yourself.
|
|||
|
|
|||
|
In a testament to the evil of lawyers and government secrecy,
|
|||
|
Zimmerman explains why he can't distribute Pretty Good Privacy
|
|||
|
and why it's contraband, of sorts. The tangled story, according
|
|||
|
to Zimmerman, revolves around a litigation firm known as Public
|
|||
|
Key Partners who own the patent to the RSA encryption used in
|
|||
|
his program. They don't own it in any other country, only the
|
|||
|
U.S. and, apparently, PKP isn't interested in licensing it or
|
|||
|
providing software which uses it. But the Pretty Good Privacy
|
|||
|
methods are in the open literature, the source code is published
|
|||
|
and anyone can see it. But no one is supposed to use it.
|
|||
|
In the U.S.A. Wow.
|
|||
|
|
|||
|
Nevertheless, Pretty Good Privacy and its source code can be found
|
|||
|
on thousands of BBS's across the country.
|
|||
|
|
|||
|
It's an absurd situation and answers this question: "What do
|
|||
|
you do if you're trapped in a room with Adolf Hitler, Saddam
|
|||
|
Hussein and a lawyer and your gun has two bullets?"
|
|||
|
Answer: "Shoot the lawyer twice."
|
|||
|
|
|||
|
The Crypt newsletter recommends you find Pretty Good Privacy
|
|||
|
and read the docs. Heh. They're free.
|
|||
|
|
|||
|
********************************************************************
|
|||
|
THE FINAL CREDITS ROLL!
|
|||
|
********************************************************************
|
|||
|
|
|||
|
Software included with this issue of the Crypt newsletter can be
|
|||
|
assembled by ensuring the MS-DOS program, DEBUG.EXE, is in
|
|||
|
the path and typing: DEBUG <*.scr, where *.scr is the scriptfile
|
|||
|
of interest. Even simpler, throw DEBUG.EXE into your current
|
|||
|
directory with all the files from this newsletter and type
|
|||
|
MAKE. The enclosed MAKE.BAT file will do the rest, prompting your
|
|||
|
machine to produce working copies of the ACME, RAUBKOPY and
|
|||
|
PROTO-T viruses in the current directory.
|
|||
|
|
|||
|
|
|||
|
Page 11
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Keep in mind that in the hands of incompetents, the ill-informed
|
|||
|
and/or lazy, viruses assembled from code in the newsletter can
|
|||
|
mess up data on your machine, sometimes irretrievably. If this
|
|||
|
happens, your day will seem overlong and you may want to kick
|
|||
|
something. Don't curse the newsletter, puh-leez. We're telling
|
|||
|
you viruses WILL mangle your programs, it's what they DO.
|
|||
|
|
|||
|
This issue of the newsletter should contain the following files:
|
|||
|
|
|||
|
CRPTLET.TR9 - this electronic document
|
|||
|
ACME.SCR - DEBUG scriptfile for the ACME companion virus
|
|||
|
ACME.ASM - A86 listing for the ACME virus
|
|||
|
RAUBKOPY.SCR - DEBUG scriptfile for the RAUBKOPY virus
|
|||
|
PROTO-T.SCR - DEBUG scriptfile for the PROTO-T virus, by Dumbco
|
|||
|
PROTO-T.ASM - TASM/MASM listing for PROTO-T virus
|
|||
|
MAKE.BAT - handy, dandy makefile for Crypt software. Add
|
|||
|
DEBUG and stir.
|
|||
|
|
|||
|
If any of these files are missing, ensure completeness by grabbing a
|
|||
|
copy of the Crypt newsletter from the following BBS's:
|
|||
|
|
|||
|
|
|||
|
CryPt HQ <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> Dark Coffin VX <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> 215.966.3576
|
|||
|
|
|||
|
Member Support <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> VIRUS_MAN BBS <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> ITS.PRI.VATE
|
|||
|
Southwest Distribution <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD> Virus Exchange/CC <20><><EFBFBD><EFBFBD><EFBFBD> 602.569.2420
|
|||
|
|
|||
|
|
|||
|
And one last request: Don't upload copies of the Newsletter to the
|
|||
|
Dark Coffin. It makes you seem stupid and waists your valuable long-
|
|||
|
distance on-line time. Thankee for your support.
|
|||
|
|
|||
|
-*-
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Page 12
|