home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Hacker 2
/
HACKER2.mdf
/
virus
/
virusl2
/
virusl2.234
< prev
next >
Wrap
Text File
|
1995-01-03
|
20KB
|
447 lines
VIRUS-L Digest Tuesday, 7 Nov 1989 Volume 2 : Issue 234
VIRUS-L is a moderated, digested mail forum for discussing computer
virus issues; comp.virus is a non-digested Usenet counterpart.
Discussions are not limited to any one hardware/software platform -
diversity is welcomed. Contributions should be relevant, concise,
polite, etc., and sent to VIRUS-L@IBM1.CC.LEHIGH.EDU (that's
LEHIIBM1.BITNET for BITNET folks). Information on accessing
anti-virus, document, and back-issue archives is distributed
periodically on the list. Administrative mail (comments, suggestions,
and so forth) should be sent to me at: krvw@SEI.CMU.EDU.
- Ken van Wyk
Today's Topics:
Datacrime report at ERIM followup (PC)
Re: Where are the Sophisticated Viruses?
Re: Imbeded virus detection
Re: 2608- possible virus? (AMIGA)
Re: Macintosh Virus List (Mac)
dBase and Typo-COM viruses (PC)
Re: CRC's
SCANV42 and ASHAR Virus (Mac)
---------------------------------------------------------------------------
Date: Mon, 06 Nov 89 13:46:07 -0500
From: Arthur Gutowski <AGUTOWS%WAYNEST1.BITNET@VMA.CC.CMU.EDU>
Subject: Datacrime report at ERIM followup (PC)
A couple of weeks back, I posted an article concerning a Datacrime hit
at the Environmental Research Institute of Michigan (ERIM). More
recent info precludes any correlation of the hit with the discovery of
the name Siegmar Schmidt in the partition table. I recieved a message
from Leo Stephens (also a subscriber to Virus-L), in which he said
that a friend of his had also discovered this name in the partition
table. He also had found the name David Litton on some of his
machines at work, and others had no name at all. A couple of people
who know more about partition tables and editors than I do suggested
that it was just the author of the editor taking credit for the
program by placing his name there (there is enough unused space in the
partition sector to do this harmlessly). All of the other occurences
of names have come without any disk problems associated with a virus
(McAfee's Scanv46 and IBM's Virscan was used on on the above disks).
I guess the moral of the story is to just make sure pertinent data
does not change. But, if anyone else can confirm that these names
aren't anything too out of the ordinary, it would set my mind (and
computer) at ease.
Again, my friend at ERIM did get hit by a Datacrime version either by
an bum copy of PKZ102.EXE or his FDISK program became
infected...Siegmar is innocent.
+--------------------------------------------------------------------+
| Arthur J. Gutowski |
| Antiviral Group / Tech Support / WSU University Computing Center |
| 5925 Woodward; Detroit MI 48202; PH#: (313) 577-0718 |
| Bitnet: AGUTOWS@WAYNEST1 Internet: AGUTOWS@WAYNEST1.BITNET |
+====================================================================+
| "To do is to be." -Socrates "To be is to do." -Plato |
| "Do-bee do-bee do." -Sinatra "Yabba dabba doo." -Fred Flintstone|
+--------------------------------------------------------------------+
------------------------------
Date: Mon, 06 Nov 89 20:54:24 +0000
From: madd@world.std.com (jim frost)
Subject: Re: Where are the Sophisticated Viruses?
CHESS@YKTVMV.BITNET (David.M..Chess) writes:
>You're forgetting one important kind of virus detector: a
>general modification-detector that does a check-code of some
>kind (CRC, MDC, or whatever), and alerts the user when
>a file's *contents* (not the date) change.
>I think even
>a virus that talked straight to the hardware to avoid
>"suspicious activity" detectors wouldn't get far before
>it was detected. DC
Sigh. We're lucky that no very competent programmer has tried to
write a virus, all right. Consider that there are three phases to any
virus, not including side-effects such as damaging data:
1) infection
2) propagation
3) survival
A sophisticated virus spends almost all of its time surviving, so it's
the most interesting stage. Survival traits include:
* limiting propagation rates
* limiting re-infections
* detecting and avoiding "virus-protected" hosts
* staying within normal system activity boundaries
* hiding from standard system utilities
* modifying hosts to make them more susceptible to
re-infection
There are a lot more things that a sophisticated virus can do, but
these are food for thought. Let's examine them in more detail.
Limiting Propagation Rates. Simple viruses, and often not-so-simple
ones, will proliferate without bounds. Rampant proliferation will
cause the virus to be noticed early in its lifetime and will probably
lead to its early demise. The internet worm did not do this.
Limiting Re-Infections. Most simple viruses don't detect systems
which have already been infected and will re-infect them. Such
viruses will incrementally eat system resources until they are
noticed. The internet worm did not do this.
Detecting and Avoiding "Virus-Protected" Hosts. I have yet to see a
virus which looked at the state of a system to detect virus detection
mechanisms to nullify them and/or avoid infecting them. There are a
variety of simple ways which a virus could do this, especially on
PC-based systems where hardware and software is extremely standard. A
virus which did this might go undetected forever. Of course it's
possible that such a beastie exists and is undetected. Even CRC
detectors will not detect a properly written virus which avoids
systems with CRC detection mechanisms!
Staying Within Normal System Activity Boundaries. Some viruses will
actively search devices which a user did not request activity from;
this activity will often be noticed. A good many Apple II viruses had
this trait, and so did the internet worm. It leads to early
detection.
Hiding From Standard System Utilities. A sophisticated virus would
avoid showing anomalies when the system is perused with standard
system utilities such as those which display currently active
processes, memory or disk usage, etc. Given the primitive state of
many PC operating systems, this capability is seldom needed, and it's
easy to remain unnoticed on larger systems without any effort at all.
The internet worm had some of these avoidance techniques which made it
much harder to track down.
Modifying Hosts To Make Them More Susceptible To Re-Infection. A very
sophisticated virus could make subtle changes to an operating system
or operating system environment to make it easier to re-infect. This
capability is generally useless amongst PCs but it's extremely easy to
make small modifications to many multiuser systems -- particularly
UNIX -- to make re-infection trivial. I believe a recent VMS virus
did this by adding a user, although I'm not certain of that.
[Ed. The DECnet WANK worm did indeed add (or alter an existing)
username, FIELD. It also modified .COM files (which are shell scripts
on VMS, similar to MS-DOS .BAT files) to do the same if run from a
privileged account. Making any such changes to MS-DOS PCs would seem
redundant, IMHO.]
By now you should get the idea that almost every virus we've seen is
primitive, although several showed some of the survival traits which I
outline above. Given the limited resources of PC environments, it's
unlikely that you'll get a very sophisticated virus. The internet worm
was itself only sophisticated at infection; propagation and survival
techniques were woefully inadequate, although they need not have been
because the infected hosts could have supported a much more
sophisticated virus.
This is food for thought, but should give you an idea of just how
tough a virus could actually be. Count our blessings now because you
won't believe how bad tomorrow's nightmares will be unless we start
teaching ethics to tomorrow's programmers!
jim frost
madd@std.com
------------------------------
Date: Sat, 03 Nov 89 14:47:35 +0000
From: rwallace@vax1.tcd.ie
Subject: Re: Imbeded virus detection
PSYMCCAB@UOGUELPH.BITNET (Bob McCabe) writes:
> As a consultant who writes software for the PC I am worried
> about the possibility of my programs getting infected and
> becoming vectors by which viri are spread.
> In particular I am developing an application that will be hand
> carried from site to site to gather data by a number of users. If
> this program were to get infected it could cause wide spread loss
> of data to an important research project, not to mention other
> programs and data on affected systems. I am looking at including
> a check to see if there has been any change in the EXE files.
> Failure on such a check would cause the program to disable it's
> self and report a possible infection.
Easy enough to do: just have something like this (in C):
main (argc,argv)
{
if (crc_check (argv[0])!=ORIGINAL_CRC_VALUE)
{
printf ("Virus infection - now committing suicide!\n");
unlink (argv[0]);
exit (20);
}
...
}
ok so you probably wouldn't want the program to actually commit
suicide but it looks good. Only problem is entering the original CRC
value as a constant because putting in the value into the program
would change the executable file and thereby the value ... maybe have
some unused static data you change the value of to compensate and make
the total CRC unchanged.
"To summarize the summary of the summary: people are a problem"
Russell Wallace, Trinity College, Dublin
rwallace@vax1.tcd.ie
------------------------------
Date: Mon, 06 Nov 89 12:05:32 +0000
From: rwallace@vax1.tcd.ie
Subject: Re: 2608- possible virus? (AMIGA)
n8735053@unicorn.wwu.edu (Iain Davidson) writes:
> Well, while up in Vancouver, BC at an Amiga Users Group meeting, a
> interesting thing was demostrated.....
>
> I call it the "2608" virus. (don't know the offical name).
>
> It worked like the IRQ virus attaching itself to the first executable in
> the startup-sequence. But with a slight twist. It would copy the
> found executable to devs:" " and copy itself into the old name in
> the "C" directory (size 2608 bytes).
Sounds like BGS-9. Make sure you don't leave any copies on any working
disks because the version of BGS-9 I found trashes sectors of your
floppies.
"To summarize the summary of the summary: people are a problem"
Russell Wallace, Trinity College, Dublin
rwallace@vax1.tcd.ie
------------------------------
Date: Sun, 06 Nov 89 04:28:04 +0000
From: <polari!robert@beaver.cs.washington.edu>,
robert@polari.UUCP (robert)
Subject: Re: Macintosh Virus List (Mac)
> Recently I have been writing an article on Macintosh infections. In
> writing the article I tried to compile an exhaustive list of Macintosh
> viruses. Below is the list. If anyone has anything to add to the list
> I would appreciate them notifying me so I can update the list. Thanks
> much!
Your list includes "SNEAK" and "San Jose Flu". I've never heard of the
"San Jose Flu". Could you furnish more information about this one?
The "SNEAK" is not a Macintosh virus. This is apparently a generic term
(like "Trojan Horse" or "Time Bomb") for a type of virus. All uses of
the term "SNEAK" that I have seen trace back to Robert Woodhead, the
author of the Macintosh anti-virus program Interferon, and I suspect
that Robert coined the term himself. The documentation for Interferon
defines a "SNEAK" as follows:
003 A SNEAK virus. This is a virus that adds it's code to a
common System folder file and changes it's type to INIT so
that it is run at boot time. Type 003 is a generic "Virus
sniffer" that detects if common System folder files have
been adulterated in this way. If you get a type 003 virus,
please get in contact, you may have discovered a new strain.
Interferon was one of the first Mac anti-virus programs and was, at the
time, an excellent (and free) virus detection program (though it should
NOT be used for virus removal!). The intent of the author was, apparently,
to provide checks for possible future viruses. Unfortunately, some software
that was released after Interferon tended to trigger this generic virus
check. The result was that Interferon would report a "SNEAK virus" in cases
where no virus actually existed. Early versions of Interferon found "SNEAK
virus" in the LaserWriter and LaserPrep files that were part of later system
software releases from Apple. Even Interferon 3.1, which is the latest
version of Interferon I have seen (dated May 16, 1988), reported the "SNEAK
virus" in TOPS version 2.1.
These early attempts by Interferon to detect unknown viruses with generic
checks bring out the dangers of such an approach. I get the impression
that the author of Disinfectant, John Norstad, has taken a more conservative
approach and checks only for KNOWN virus entities (resources and files).
I imagine that Robert Woodhead has taken a similar approach with Virex,
his newer commercial anti-virus program (replacing Interferon), though I
haven't had an opportunity to see Virex.
---------------------------------------
Robert Riebman
robert@polari
Northwest Information Technology
P.O. Box 3156
Redmond, WA 98073
========================================
------------------------------
Date: 06 Nov 89 20:45:07 +0000
From: frisk@rhi.hi.is (Fridrik Skulason)
Subject: dBase and Typo-COM viruses (PC)
Alan J Roberts writes:
>
> A number of folks have looked at the DBASE virus (Ross
>Greenberg's discovery), including Joe Hirst, Steffan Campbell and T.B.
>Allen, and the general consensus is that the virus is very similar in
>style to the TYPO virus (The COM version). If the author of these two
>viruses is one and the same person, then perhaps the DBASE author has
>not completely been "re-habilitated" as Ross Greenberg has suggested.
I must disagree. The dBase and Typo-COM viruses are similar in some ways,
but there are also quite a few differences.
Similarities:
1) Both viruses use an identical, but very unusual, method to transfer control
back to the original program:
MOV AX,100
JMP AX
2) Both viruses infect files with names ending in .COM, instead of checking
the first two bytes to determine the type of the file. They will not
infect .EXE files.
3) The viruses use similar methods to determine if the system is alredy
infected - defining new interrupt subfunctions.
dBase: Typo-COM:
MOV AX,FB0A XOR AL,AL
INT 21 MOV AH,DD
CMP AX,0AFB INT 16
JE infected CMP AL,AH
JE not_infected
Differences:
1) Typo-COM will search for programs to infect, looking for *.COM files
in the current directory. The dBase virus will infect a program when
it is executed.
2) Typo-COM will install itself in memory when the infected program
terminates, (by using DOS functions 0 or 4C, or by a INT 20 call).
dBase will install itself as soon as it has determined that it is not
already present in memory.
3) The code used to hook INT 21 is very dissimilar, the dBase virus using
DOS functions, but Typo-COM using direct manipulation.
dBase: Typo-COM:
MOV AX,3521 MOV AX,[84]
INT 21 :
: MOV [84],SI
: SUB [84],98
MOV DS,DX :
MOV DX,new_21 MOV AX,[86]
MOV AX,2521 :
INT 21 PUSH CS
POP [86]
4) dBase hooks INT 21 when it is first executed. Typo-COM hooks INT 21,
INT 20 and INT 16 at the same time, but when it installs itself in memory
it restores INT 21 and INT 20.
5) The "install in memory" procedure is VERY different. The dBase virus
manipulates the MCB directly, in a way similar to the method used
by the Icelandic virus. It will then transfer itself upwards in memory.
Typo-COM will transfer itself down, overwriting the original infected
program, as soon as the program exits (see [2] above.)
6) Finally: The Typo-COM is a "harmless" virus, meaning that it does no
direct, permanent damage, like destroying data or formatting the hard
disk. It contains a generation counter, but it does not seem to be used
(reserved for future expansion ?) All it does is to produce a "typing
error" every now and then. It is therefore in the "joke" category,
along with Cascade, Ping-Pong and a few other viruses.
The dBase virus is quite different. It will garble data when it is written
and restore it when it is read back. If the system is not infected at the
time, the data will be useless. This also applies if the virus is removed.
But, if the file has not been written to for three months when it is
read, the virus will do serious damage, erasing the first 100H sectors on
drive D: E: .... Z: - or at least it was designed to do so. The author
forgot one small detail, which will make the destruction rather
unpredictable.
This is a clear difference in attitude, which does not support the
theory that the viruses have the same author
Comments, anyone ?
- -frisk
Fridrik Skulason University of Iceland
frisk@rhi.hi.is Computing Sevices
Guvf yvar vagragvbanyyl yrsg oynax .................
------------------------------
Date: Mon, 06 Nov 89 22:48:39 +0000
From: kichler@harris.cis.ksu.edu (Charles Kichler)
Subject: Re: CRC's
> A CRC will work if you:
> (1) Keep the polynomial secret and personal.
> (2) Keep the comparison information secret and
> personal.
I don't think this is fool-proof. The problem is that the polynomial
and the comparison information must be known to the program. Therefore,
if you know where to look IN THE PROGRAM, then you could find the
information.
I believe the only iron-clad method might be a hardware device which
could verify a programs "health". I imagine it to be device akin to
those that attach to the serial port of a computer for copy protection.
The advantage is hardware is difficult to modify via software. As of yet,
I haven't seen a program that can beat a write protect tab.
Charles "chuck" E. Kichler, Intro. to PC Instructor/Co-ordinator
Computer & Info. Science Kansas State Univ. * Yesterday,
Internet: kichler@harris.cis.ksu.edu | I knew the answers.
BITNET: kichler@ksuvax1.bitnet * Today,
UUCP: {rutgers,texbell}!harris!kichler | they changed the questions.
------------------------------
Date: Mon, 06 Nov 89 16:33:01 -0800
From: portal!cup.portal.com!Alan_J_Roberts@Sun.COM
Subject: SCANV42 and ASHAR Virus (Mac)
Tom Sheriff noted in a recent Virus-L listing that SCANV42
displays an unusual virus number and appears to show both the ASHAR
and the BRAIN virus whenever the BRAIN virus is encountered. The
duplicate virus messages were caused by new strings added to version
42, fixed in V44. The "1d viruses found" message has also been fixed
in version 44. (The "d" was an extraneous character caused by the
duplicate strings).
Alan
------------------------------
End of VIRUS-L Digest
*********************
Downloaded From P-80 International Information Systems 304-744-2253