89 lines
3.8 KiB
Plaintext
89 lines
3.8 KiB
Plaintext
![]() |
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
|||
|
<20> VIRUS REPORT <20>
|
|||
|
<20> Yankee Doodle <20>
|
|||
|
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
|||
|
|
|||
|
Date of Origin: September 30, 1989.
|
|||
|
|
|||
|
Place of Origin: Sofia, Bulgaria.
|
|||
|
|
|||
|
Host Machine: PC compatibles.
|
|||
|
|
|||
|
Host Files: Remains resident. Infects COM, EXE files.
|
|||
|
|
|||
|
OnScreen Symptoms: Plays "Yankee Doodle" on the system speaker some time
|
|||
|
after loading.
|
|||
|
|
|||
|
Increase in Size of Infected Files: 2885 or 2899 bytes.
|
|||
|
|
|||
|
Nature of Damage: Affects system run-time operation. Corrupts COM and
|
|||
|
EXE files.
|
|||
|
|
|||
|
Detected by: Scanv42+, F-Prot.
|
|||
|
|
|||
|
Removed by: CleanUp, Scan/D, VirClean, F-Prot, or delete infected files.
|
|||
|
|
|||
|
This virus was written by Wladimir Bochev from Sofia, Bulgaria, as an
|
|||
|
intellectual exercise. It was discovered in Vienna by Alexander Holy at
|
|||
|
the United Nation's North Atlantic Project office on Sept 30th, 1989.
|
|||
|
The virus has reportedly been transmitted to the U.S. through U.N.
|
|||
|
employees via the game "Outrun".
|
|||
|
|
|||
|
The virus plays the tune "Yankee Doodle Dandy" on the system's
|
|||
|
speaker either when the program is loaded, or 17 hours after an infected
|
|||
|
program is loaded, depending on the version of Yankee Doodle. Both COM
|
|||
|
and EXE files of any size can be infected, and the virus willingly
|
|||
|
infects every such file.
|
|||
|
|
|||
|
Infected files grow in size by 2899 bytes. Infected files can be
|
|||
|
recognized by the string "motherfucker" at their ends. In the early
|
|||
|
versions, there was no damage caused by the virus. In fact, the virus was
|
|||
|
apparently designed as a virus fighter. It will seek out and modify Ping
|
|||
|
Pong viruses, changing them so that they self-destruct after 100
|
|||
|
infections. Subsequent strains may format the hard disk. Several
|
|||
|
variations on the Yankee Doodle virus have been identified. See entries
|
|||
|
for:<Note: Information provided by Daniel Kalchev, Studentska str.
|
|||
|
"Neofit Bozveli" str. 6 VMEI-Varna, ULMPT Varna 9000-Varna 9010
|
|||
|
Bulgaria. Bulgaria (+52) 23-58-66 (+52) 88-57-03.>
|
|||
|
|
|||
|
* TP25VIR
|
|||
|
|
|||
|
* TP33VIR
|
|||
|
|
|||
|
* TP34VIR
|
|||
|
|
|||
|
* TP38VIR
|
|||
|
|
|||
|
* TP42VIR
|
|||
|
|
|||
|
* TP44VIR
|
|||
|
|
|||
|
* TP46VIR
|
|||
|
|
|||
|
|
|||
|
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
|||
|
<EFBFBD> This document was adapted from the book "Computer Viruses", <20>
|
|||
|
<EFBFBD> which is copyright and distributed by the National Computer <20>
|
|||
|
<EFBFBD> Security Association. It contains information compiled from <20>
|
|||
|
<EFBFBD> many sources. To the best of our knowledge, all information <20>
|
|||
|
<EFBFBD> presented here is accurate. <20>
|
|||
|
<EFBFBD> <20>
|
|||
|
<EFBFBD> Please send any updates or corrections to the NCSA, Suite 309, <20>
|
|||
|
<EFBFBD> 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS <20>
|
|||
|
<EFBFBD> and upload the information: (202) 364-1304. Or call us voice at <20>
|
|||
|
<EFBFBD> (202) 364-8252. This version was produced May 22, 1990. <20>
|
|||
|
<EFBFBD> <20>
|
|||
|
<EFBFBD> The NCSA is a non-profit organization dedicated to improving <20>
|
|||
|
<EFBFBD> computer security. Membership in the association is just $45 per <20>
|
|||
|
<EFBFBD> year. Copies of the book "Computer Viruses", which provides <20>
|
|||
|
<EFBFBD> detailed information on over 145 viruses, can be obtained from <20>
|
|||
|
<EFBFBD> the NCSA. Member price: $44; non-member price: $55. <20>
|
|||
|
<EFBFBD> <20>
|
|||
|
<EFBFBD> The document is copyright (c) 1990 NCSA. <20>
|
|||
|
<EFBFBD> <20>
|
|||
|
<EFBFBD> This document may be distributed in any format, providing <20>
|
|||
|
<EFBFBD> this message is not removed or altered. <20>
|
|||
|
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
|||
|
|
|||
|
Downloaded From P-80 International Information Systems 304-744-2253
|