77 lines
3.7 KiB
Plaintext
77 lines
3.7 KiB
Plaintext
ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿
|
||
³ VIRUS REPORT ³
|
||
³ Cascade-B ³
|
||
ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ
|
||
|
||
Synonyms: 1704-B, 1701-B, Blackjack virus
|
||
|
||
Host Machine: PC compatibles.
|
||
|
||
Host Files: Remains resident. Infects COM files.
|
||
|
||
OnScreen Symptoms: There is no cascade display on the screen for this
|
||
version. The system will reboot at random intervals after activation.
|
||
|
||
Increase in Size of Infected Files: 1701 bytes (will infect both PCs and
|
||
compatibles) or 1704 bytes (will infect only PC compatibles).
|
||
|
||
Nature of Damage: Affects system run-time operation. Corrupts program or
|
||
overlay files.
|
||
|
||
Detected by: Scanv56+, F-Prot, IBM Scan, Pro-Scan.
|
||
|
||
Removed by: M-1704, M-1704C, CleanUp, or F-Prot. You may also follow the
|
||
instructions for removing the Jerusalem virus.
|
||
|
||
Derived from: Cascade.
|
||
|
||
Scan Code: Uses self-encryption. FA 8B EC E8 00 00 5B 81 EB 31 01 2E F6
|
||
87 2A 01 01 74 0F 8D B7 4D 01 BC 85 06 31 34 31 24 46 4C 75 F8. You can
|
||
also search at offset 01BH for 31 34 31 24 46 4C 77 F8.
|
||
|
||
This virus is identical to the Cascade except for these two changes:
|
||
|
||
* it activates in the fall of any year;
|
||
|
||
* the cascading display has been replaced with a system re-boot when
|
||
the virus activates.
|
||
|
||
The activation uses the same interrupt 8 randomization algorithm, so
|
||
the reboot will occur at a random time interval after executing an
|
||
infected program on or after the activation date.
|
||
|
||
This virus has the ability to infect a file more than once. Cleanup
|
||
works well at removing the virus, even from files infected multiple
|
||
times (Cleanup will have to be run the same number of times that the file
|
||
is infected). Be warned though, if you find a file has been infected more
|
||
than once, remove the virus and delete the file, as files infected more
|
||
than once will hang your computer. Files infected only once by this virus
|
||
seem to run OK after removing the virus.
|
||
|
||
|
||
ÉÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ»
|
||
º This document was adapted from the book "Computer Viruses", º
|
||
º which is copyright and distributed by the National Computer º
|
||
º Security Association. It contains information compiled from º
|
||
º many sources. To the best of our knowledge, all information º
|
||
º presented here is accurate. º
|
||
º º
|
||
º Please send any updates or corrections to the NCSA, Suite 309, º
|
||
º 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS º
|
||
º and upload the information: (202) 364-1304. Or call us voice at º
|
||
º (202) 364-8252. This version was produced May 22, 1990. º
|
||
º º
|
||
º The NCSA is a non-profit organization dedicated to improving º
|
||
º computer security. Membership in the association is just $45 per º
|
||
º year. Copies of the book "Computer Viruses", which provides º
|
||
º detailed information on over 145 viruses, can be obtained from º
|
||
º the NCSA. Member price: $44; non-member price: $55. º
|
||
º º
|
||
º The document is copyright (c) 1990 NCSA. º
|
||
º º
|
||
º This document may be distributed in any format, providing º
|
||
º this message is not removed or altered. º
|
||
ÈÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍͼ
|
||
|
||
Downloaded From P-80 International Information Systems 304-744-2253
|