home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Simtel MSDOS 1992 December
/
simtel1292_SIMTEL_1292_Walnut_Creek.iso
/
msdos
/
trojnpro
/
find1701.arc
/
1701-VIR
next >
Wrap
Text File
|
1989-05-20
|
12KB
|
209 lines
=============================================================================
THE "1701 VIRUS" IS *VERY* REAL
=============================================================================
May 16, 1989
One of my callers sent me a real live virus (I knew about it ahead of
time) and it is a doozie. It's called WOW, WOWTITLE, and apparantly
some other names. It is nothing but an ANSI screen that jiggles a bit,
and does some other nonsense stuff, but while it is doing this, it is
attaching itself to COMMAND.COM or the next .COM file that you run. It
appears to be a TSR that remains in memory after it is first run. After
it has run once, every single .COM program you run after that will become
infected, by the virus inserting itself in the .COM program and it makes
it *exactly* 1,701 bytes larger. For those of you that know your hardware
errors, you know that a 1701 error means "hard disk failure" and that is
what I expect this to do at some point in time. I think that this is more
than coincidence so that's what I'll refer to it from now on.
Since I knew all of this before I ran it, I decided to do a little bit of
tinkering. Changed the Boot Record on the hard disk to look for something
other than IBMBIOS.COM & IBMDOS.COM. Changed the system files so they
wouldn't look for COMMAND.COM, but some another name. Marked all of the
.COM and .EXE files read only, and fired it up. Sure enough it found
ALSCOMM.COM (as I renamed it) infected it, and when I ran any .COM program
they also got infected. It appears that it looks for some sort of pattern
contained in COMMAND.COM and then goes for that file, no matter what the
name is. I even set the COMSPEC variable to point to COMMAND.COM and
while other programs that read this variable, couldn't shell out to DOS
because it wasn't there, this little critter found it, no problem. It
appears that COMMAND.COM (or whatever you try to rename it to) does the
damage, because I copied a good copy of COMMAND.COM over the infected
one, and then ran the infected programs, along with some that hadn't
become infected, and no problems appeared. But after running WOW again
it infected COMMAND.COM once more, and after that every .COM program I
ran got infected. If you run accross this virus, I'd suggest that you
erase your copy of COMMAND.COM, do a cold re-boot, and then re-copy a
good copy of COMMAND.COM back to your hard disk. I would suggest that
you run a group of programs, Edlin, etc. and note the sizes before you
run them, and after. If you've run some programs after you run this
little critter, they are all probably infected. I wanted to capture a
screen image but it is all graphics, so I couldn't do it with any of
the programs that I had.
The image is just one screenful, and it kinda looks like this:
"The Wizards of Warez"
in assocoation with
the copycats
the Pirates Unlimited
OUTRUN
some other messages on who hacked this etc.
WOW (in the lower left hand corner) (lower right hand corner)---1989
Since this is a TSR, and since it has already found and gotten through
my security measures, I see no reason that it couldn't get into DSZ,
which it has, and be transmitted from one BBS to another. I haven't tried
this yet, but will in the near future. All of the infected programs run
just fine, and show no changes whatever, except getting 1,701 bytes larger,
from before they were infected. As far as to just what this virus does,
from a damage standpoint, I have to say, nothing so far, but I'm going to
let it run for a bit to see what it does when some more of the files on my
other computer get infected. All it does so far it to just alter file sizes,
but it doesn't change the time or date. It doesn't matter whether the file
is marked read only either. Other than changing file sizes, is all that it
does so far....But any program that can do that to "read only" files, and
does it exactly 1,701 bytes, is up to something. Just what that something
is, is not known at this time.
Once discovered it is simple, if not time consuming, to get rid of. All
you have to do is to isolate all of the .COM files you have and replace
them with ones from your backups. Once you do this, it is gone, but if
you forget just one of them, and then you run that program, it will start
all over again.
It seems to only affect .COM files, not .EXE files, or any other that I
could discover. It doesn't seem to alter the system files, but it wouldn't
hurt to replace them as well. But BE SURE that you aren't replacing them
with infected files. I missed one file, and in 20 minutes I had re-infected
25 files all over again. It only takes one.
For you Doubting Thomas' out there, here is a list of just some of the
files that were infected on my other computer (not the BBS!)
COMMAND COM 25332 12-31-87 12:00p
COMMAND VIR 27033 12-31-87 12:00p
COMMO VIR 19761 5-08-89 7:13p
COMMO COM 18060 5-08-89 7:13p
HGCIBM VIR 8386 1-01-01 1:01a
HGCIBM COM 6685 1-01-01 1:01a
EDLIN VIR 9196 12-31-87 12:00p
EDLIN COM 7495 12-31-87 12:00p
DSZ VIR 53863 5-07-89 5:09p
DSZ COM 52162 5-07-89 5:09p
CLOCK VIR 2725 1-01-01 1:01a
CLOCK COM 1024 1-01-01 1:01a
CAPSRLSE COM 1327 4-16-89 12:00p
CAPSRLSE VIR 3028 4-16-89 12:00p
HUSH VIR 1707 1-01-01 1:01a
HUSH COM 6 1-01-01 1:01a
HOTKEY VIR 2182 1-22-87 11:10a
HOTKEY COM 481 1-22-87 11:10a
CED VIR 8857 12-06-85 1:18p
CED COM 7156 12-06-85 1:18p
SKN VIR 35710 11-26-88 10:25a
SKN COM 34009 11-26-88 10:25a
I've renamed the infected .COM programs to .VIR and they were all taken
from my hard disk after I ran the program. As you can see this is a wide
variety of programs from Sidekick to Edlin. All of them worked perfectly
after the infection, so there is really no way to tell if something is
wrong or not.
What's the bottom line of all of this?? Well, to be honest, I just don't
really know. But one thing that I *do* know is, that something is going
on that shouldn't be going on. On top of that, there is no way I can see
to stop it from doing its thing, once it has started, *unless* you know
what the symptoms are.
Maybe all this thing does is change the file size in the directory, by
1,701 bytes, and that's all. But I kinda think that my other computer
is about to have something go very wrong at some point in time, and since
the programs all run just fine, I could have copied them and given them
to others not knowing the problem even existed. If you have seen this
program, or know sombody that has, just pass on this message to them,
and hope that all the program does, is to change the file size and that's
all.
==============
May 17, 1989
==============
I've been doing some more experimenting and have discovered that the virus
not only attaches itself to .COM files, in some cases it will actually
alter the files themselves. I have a file HUSH.COM that quiets down the
floppy drives, and it is only a 7 byte file, but ends up a 1,708 byte file
after infection. As you can imagine it is pretty easy to compare the
original file with the infected one. To my surprise the original code of
the program had been altered, but it still worked !
I started to take a closer look at the files with LIST, (yes it got 1,701
bytes larger) and discovered what might be considered a "signature" of
this particular virus. There is a string 141$FLu that seems to be
a good way to know if you have been infected. None of the original files
had it, and all of the larger ones did. I checked my BBS working C: and
that particular string wasn't found anywhere, so it might be a good way
to identify it. There are many utilties that will search the disk for
strings. I'd suggest that you get one of them and run it on your entrie
disk. If you get a "hit", you should erase the offending file, and replace
it with one that you know to be OK. Just compare the file sizes. If the one
on your hard disk is 1,701 bytes larger than the one on your backup, then
you are in for some fun.
Some other observations. When you first run the virus, it appears that it
looks for COMMAND.COM, but it may not effect it at all. I have a mono system
and I ran HCGIBM to emulate CGA to see what was happening. HCGIBM got zapped
and not COMMAND.COM, and once it was installed in memory, all subsequent
.COM files became infected. The second time around, at least, COMMAND.COM
hasn't become infected like it did the first time around. So it appears that
the only sure way to find the infected files is to search for the tell tale
string that the virus imbeds in the .COM file.
I put an uninfected version of LIST on a floppy along with some text files,
and then put a write protect tab on the floppy. Ran a program that I knew
had the virus in it, and then another one that didn't. Sure enough, it was
loaded into memory, and when I went to drive a: and tried to List the text
file I got a "write error" before List loaded the text file. After the
normal Abort, retry, ignore, fail (I choose Fail) List loaded the text file
and remained unchanged, so if you have you floppies write protected, it
can't do it's thing. There are many programs that "write protect" your hard
disk, so this might be one way to protect against infection. Only problem
is that lots of normal programs write files to the disk, so this isn't a
very good solution.
Tonight we're going to unassemble the code to see what makes it tick.
==============
May 19, 1989
==============
With the help of one of my programming friends, we have dissambled the
program and indeed it alters the original file, re-writes the first part
of the program with a "jump" instruction as the first thing the infected
program does. It goes to where it wants to find a copy of itself, and if
the file isn't infected, it then will insert the code into the un-infected
program, write the altered program to disk, and *then* runs the program as
if nothing has happened. Next time that infected program is run, it will
attach itself to COMMAND.COM if it isn't already infected, and if both
the memory portion of COMMAND.COM is infected, and the file that is loaded
is infected, no disk writes occur, the progarm loads normally. We have
also confirmed that the signature 141$FLu is in the original program and
is also in all of the infected copies. For all we know WOW might be nothing
more than an infected program, not the original virus.
Enclosed in this ARC is a program that will search out this unique signature
and identify all files that are infected. It is a quick way to spot this
virus and get rid if it.
Pass this file along to a friend, and maybe save them some grief.
Al Kalian
Palladin BBS
415-332-1655