78 lines
3.8 KiB
Plaintext
78 lines
3.8 KiB
Plaintext
ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿
|
||
³ VIRUS REPORT ³
|
||
³ Alabama Virus ³
|
||
ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ
|
||
|
||
Date of Origin: October 13, 1989.
|
||
|
||
Place of Origin: Israel.
|
||
|
||
Host Machine: PC compatibles.
|
||
|
||
Host Files: Remains resident. Infects EXE files.
|
||
|
||
OnScreen Symptoms: One hour after activation, the virus displays this
|
||
message in a flashing box:
|
||
|
||
"SOFTWARE COPIES PROHIBITED BY INTERNATIONAL LAW
|
||
|
||
Box 1055 Tuscambia ALABAMA USA."
|
||
|
||
Increase in Size of Infected Files: 1560 bytes.
|
||
|
||
Nature of Damage: Affects system run-time operation. Corrupts program or
|
||
overlay files. Directly or indirectly corrupts file linkage.
|
||
|
||
Detected by: Scanv43+, F-Prot, IBM Scan, Pro-Scan.
|
||
|
||
Removed by: CleanUp, F-Prot, or delete infected files.
|
||
|
||
This virus was isolated by Ysrael Radai at Hebrew University. It
|
||
manipulates the file allocation table and swaps file names so that files
|
||
are slowly lost.
|
||
|
||
The Alabama virus will infect .EXE files, increasing their size by
|
||
1,560 bytes. It moves into memory when any EXE containing the virus is
|
||
executied. Unlike most other memory-resident viruses, the Alabama does
|
||
not use the normal TSR function, but rather hooks interrupt 9 as well as
|
||
IN and OUT commands. Upon detecting a Control-Alt-Delete, the virus
|
||
generates what appears to be a warm boot, but remains in memroy. The
|
||
virus loads to the top 30K of memory, unlike other memory-resident
|
||
programs, and does not reduce the available memory reported by DOS.
|
||
|
||
The Alabama virus uses a complex procedure during infection. It will
|
||
first infect an EXE in the current directory, providing there is one
|
||
which is uninfected. If all EXEs in the current directory are infected,
|
||
then the Alabama virus will infect the program being executed --
|
||
provided the system date is not Friday. On Fridays, the Alabama virus
|
||
will swap entries in the FAT so that when the user attempts to execute an
|
||
uninfected file, an infected file executes instead. Over time, files
|
||
will be lost through this process.
|
||
|
||
|
||
ÉÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ»
|
||
º This document was adapted from the book "Computer Viruses", º
|
||
º which is copyright and distributed by the National Computer º
|
||
º Security Association. It contains information compiled from º
|
||
º many sources. To the best of our knowledge, all information º
|
||
º presented here is accurate. º
|
||
º º
|
||
º Please send any updates or corrections to the NCSA, Suite 309, º
|
||
º 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS º
|
||
º and upload the information: (202) 364-1304. Or call us voice at º
|
||
º (202) 364-8252. This version was produced May 22, 1990. º
|
||
º º
|
||
º The NCSA is a non-profit organization dedicated to improving º
|
||
º computer security. Membership in the association is just $45 per º
|
||
º year. Copies of the book "Computer Viruses", which provides º
|
||
º detailed information on over 145 viruses, can be obtained from º
|
||
º the NCSA. Member price: $44; non-member price: $55. º
|
||
º º
|
||
º The document is copyright (c) 1990 NCSA. º
|
||
º º
|
||
º This document may be distributed in any format, providing º
|
||
º this message is not removed or altered. º
|
||
ÈÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍͼ
|
||
|
||
Downloaded From P-80 International Information Systems 304-744-2253
|