50 lines
2.2 KiB
Plaintext
50 lines
2.2 KiB
Plaintext
|
|
ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿
|
|
³ OFFSPRING v0.7 - BY Virogen - 05/26/93 ³
|
|
ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ
|
|
|
|
Welcome to my latest viral creation. Don't blame me if you are an
|
|
ignorant fool and infect yourself. Don't blame me if you "accidently"
|
|
infect somebody else. Don't blame me if you rape your little sister.
|
|
In other words, don't blame me for anything, and use this virus at
|
|
your own risk.
|
|
|
|
The source is compatible with A86. You'll have to add a few segment
|
|
overrides and such to make it compat. with TASM, MASM, and such. I
|
|
think I sufficiently commented the source code, it should be apparently
|
|
obvious what is going on.
|
|
|
|
|
|
Type : PSRhA - Parastic & Spawning Resident - Encrypting
|
|
Origin : Virogen's virus laboratory
|
|
|
|
Infection Method : Once memory resident, the virus infects up to five
|
|
files in the current directory everytime you change
|
|
directories or drives. So, the files in the directory
|
|
you are coming OUT of will be infected. I decided
|
|
this would be the best way, maybe it won't be quite
|
|
as noticable to the victim. Anyway, it will first
|
|
infect EXE files (spawning) in directory, once all
|
|
the EXE files have been infected, it moves to COM
|
|
files (parastic).
|
|
|
|
Encryption : The base of the encryption of this virus is a simple
|
|
XOR technique. However, the encryption code is switched
|
|
around, the ops are modified directly, a few variables
|
|
change sizes, and bytes between unmodified bytes are
|
|
changed to a chracter from a set of harmless ops. So,
|
|
the bytes that do remain constant are not adjacent (more
|
|
than 2 bytes) and change positions. Not anything overly
|
|
amazing, and the encryption routine always uses the same
|
|
technique. Maybe I'll improve this in later versions, but
|
|
I figured this'll do for now.
|
|
|
|
|
|
|
|
|
|
Your Faithful Comrad,
|
|
Virogen
|
|
|
|
|
|
|