About
Community
Bad Ideas
Drugs
Ego
Erotica
Fringe
Society
Technology
Hack
Hacker Zines
CERT
CHAL
CHAOS
CIAC
CPD
CPSR
CRH
CWD
CuD
CuD/A
EFF
LOL
MOD
Miscellaneous Phreak and Hacker Zines
NIA
RISKS
UXU
register | bbs | search | rss | faq | about
meet up | add to del.icio.us | digg it

Corrupted Programmers Issue #3


NOTICE: TO ALL CONCERNED Certain text files and messages contained on this site deal with activities and devices which would be in violation of various Federal, State, and local laws if actually carried out or constructed. The webmasters of this site do not advocate the breaking of any law. Our text files and message bases are for informational purposes only. We recommend that you contact your local law enforcement officials before undertaking any project based upon any information obtained from this or any other web site. We do not guarantee that any of the information contained on this system is correct, workable, or factual. We are not responsible for, nor do we assume any liability for, damages resulting from the use of any information on this site.
----------------------------------------------------------------------

[1.3] Aspects Of Some Known Viruses

Many viruses have been written before and probably after you
read this article. A few names include the Israeli, Lehigh, Pakistani
Brain, Alameda, dBase, and Screen. Keep in mind that most viruses
ONLY infect COM and EXE files, and use the Operating System to spread
their disease. Also, many viruses execute their own code before the
host file begins execution, so after the virus completes passive
execution (without "going off") the program will load and execute
normally.

Israeli - This one is a TSR virus that, once executed, stayed in
memory and infected both COM and EXE files, affecting both HARD and
FLOPPY disks. Once executed, the virus finds a place to stay in the
system's memory and upon each execution of a COM or EXE file, copies
itself onto the host phile. This one is very clever, before infecting
the file, it preserves the attributes and date/time stamp on the
file, modifies the files attributes (removes READ only status so it
can write on it), and then restores all previous values to the file.
This virus takes very little space, and increases the host file size
by approximately 1800 bytes. The trigger of this virus is the date
Friday the 13th. This trigger will cause the virus to either trash
the disk/s or delete the files as you execute them, depending on the
version. Whoever wrote this sure did a nice job....

Lehigh - This one infects the COMMAND.COM file, which is always
run before bootup, so the system is ready for attack at EVERY bootup.
It hides itself via TSR type and when any disk access is made, the
TSR checks the COMMAND.COM to see if it is infected. Then if it
isn't, it infects it, and adds a point to its counter. When the
counter reaches 4, the virus causes the disk to crash. This one,
however, can be stopped by making your COMMAND.COM Read-Only, and the
date/time stamp is not preserved, so if the date/time stamp is
recent, one could be infected with this virus. This virus is
transferred via infected floppy disks as well as a clean disk in an
infected system. It can not infect other hosts via modem, unless the
COMMAND.COM is the file being transferred.

Pakistani Brain - This one infects the boot sector of a floppy
disk. When booting off of the disk, the virus becomes a TSR program,
and then marks an unused portion of the disk as "bad sectors." The
bad sectors, cannot be accessed by DOS. However, a disk directory of
an infected disk will show the volume label to be @ BRAIN. A CHKDSK
will find a few bad sectors. When you do a directory of a clean disk
on an infected system, the disk will become infected. The virus has
no trigger and immediately begins to mark sectors bad even though
they are good. Eventually, you will have nothing left except a bunch
of bad sectors and no disk space. The virus itself has the ASCII
written into it with the words "Welcome the the Dungeon" as well the
names of the supposed authors of the virus, and address, telephone
number, and a few other lame messages. To inoculate your system
against this virus, just type 1234 at byte offset location 4 on the
boot track (floppy disks).

Alameda - This virus also infects the boot sector of the host
system. It is very small and inhabits ONE sector. This one only
damages floppy disks. If you boot from a diseased disk, the virus
loads itself into HIGH memory and during a warm boot, it remains in
memory and infects any other clean disks being booted from on the
infected system. It then replaces the boot track with the virus track
and replaces the boot track on the last track of the disk, so any
data located on the last track is corrupted. All floppy disks
inserted during reboot can catch this virus. This virus only infects
IBM PC's and XT's, however, it does not infect 286's or 386's.

dBase - This one is a TSR virus that works in a manner similar
to the Israeli virus. It looks for files with a DBF extension, then
it replicates itself in all DBF files, preserving file size, and all
attributes. After the first 90 days, the virus destroys your file
allocation table and corrupts all data in the DBF files. This virus
creates a hidden file, BUG.DAT that indicates the bytes transposed
(in order to preserve file specifications). Run a CHKDSK to make sure
you don't have any extra hidden files or a BUG.DAT in your dBase
directory. If you create a BUG.DAT file manually in your directory,
making it read-only, you will be safe from this virus.

Screen - This one is another TSR virus that comes on and off
periodically. When it is on, it examines the screen memory and looks
for any 4 digits starting at a random place on the screen. Then it
transposes two of them, this is not a good thing. It infects every
COM file in your directory, HARD and FLOPPY disks can be infected.
You can use a ASCII searcher to check if you are infected by
searching for "InFeCt" in your COM files. If you have this written,
read the 4 bytes immediately preceding it and overwrite the first 4
bytes of the program with their value. Then, truncate the program at
their stored address. You will rid yourself of this virus. Make sure
you use a clean copy of you editor for this.

Other viruses include MAC, AMIGA, and many other environments.
By the way, other computer systems other than IBM/DOS may become part
of CPI if you qualify.

Anyway, these are a few viruses I have read on and thus passed
the information to you, I hope you can learn from them and get some
ideas for some.
 
To the best of our knowledge, the text on this page may be freely reproduced and distributed.
If you have any questions about this, please check out our Copyright Policy.

 

totse.com certificate signatures
 
 
About | Advertise | Bad Ideas | Community | Contact Us | Copyright Policy | Drugs | Ego | Erotica
FAQ | Fringe | Link to totse.com | Search | Society | Submissions | Technology
Hot Topics
R. A. Salvatore
Reading childrens books weird?
What are you currently reading?
How often do you read?
Would you let your novel become a movie?
Penguin and Barnes and Noble, fleecing customer?
Chuck Palahniuk
What does reading mean for you?
 
Sponsored Links
 
Ads presented by the
AdBrite Ad Network

 

TSHIRT HELL T-SHIRTS