home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Amiga Plus Special 26
/
AMIGAplus Sonderheft 26 (2000)(Falke)(DE)(Track 1 of 2)[!].iso
/
Updates
/
Virus
/
Safe13.6
/
AntiMotaba
/
Motaba-3.analyze
< prev
Wrap
Text File
|
2000-07-18
|
2KB
|
68 lines
¬Motaba-3 linkvirus analyzes
-------------------------------------------------------------------
Analyzer: Zbigniew Trzcionkowski
Date: 19.6.2000
Comment: After quick analyzes I`ve prepared xfd slave with
recog routine for this virus. It only detects Motaba-3
in files, but can`t remove it.
More info in doc for this slave.
-------------------------------------------------------------------
There appeared new link virus. In decoded virus You can read:
"MOTABA-3"
and
"Ask for more: motaba@xxxxxxx.pl"
This e-mail is just joke. The xxxxxxx is a polish portal and the
person behind it can`t be seen as an author of this virus.
Just the name is wellknown so such e-mail really exists...
(As some of You know Motaba is a human virus
that appeared in a wellknown movie).
In memory the virus patches LoadSeg vector and confuses VirusZ
that this is Crm.library patch.
Whole virus code is comparable to IOZ512/HNY99 virus.
The changes since it are simply so this could mean
that Motaba-3 is quite old I think.
The virus replaces in first code hunk all:
jsr -552(a6) ;i.e. OpenLibrary
to
bsr.w BeginOfVirus
Additionally one other jsr will be replaced and hidden inside
virus probably to prevent disabling this virus in easy way
like Fungus or Vaginitis viruses.
This kind of infecting is very agressive - gives more
successfully infected files than last RTS replacing viruses.
The another thing is that virus uses normal dos commands for infection
(no packets), but the Open vector must be while
infection in area: $fxxxxx.
This is to be sure that nothing is watching the virus.
No built-in file detection, because double infections are impossible
(all jsr -552(a6) instructions of hunk are replaced while first infecting).
No built-in memory detection, because of $fxxxxx test for LoadSeg.
MinimalFileSize - 2048
MaximalFileSize - 1024*100
The virus code is crypted in file just with EOR loop.
The only interesting thing is the length polymorph :-)
Just at the end of added code appears more or less garbage.
When filename contains the `l` letter the length of block linked to next
files is changing (virus len = ca. 880 bytes).
This virus don`t have any mission - no destroy code,
file copiers, TCP shells or e-mail senders were found inside!
This looks strange in year 2000 :-)