saponara@batcomputer.tn.cornell.edu (John Saponara) (05/02/88)
Here's an article I just saw in comp.risks I thought people might be interested
in. Hopefully everyone else won't cross-post this info - if you see multiple
copies, you know where that `n' key is...
Eric (not John Saponara) Haines
Newsgroups: comp.risks
Subject: RISKS DIGEST 6.71
Message-ID: <12394193661.12.NEUMANN@KL.SRI.COM>
Date: Tue, 26 Apr 88 15:00 EST
>From: <PGOETZ%LOYVAX.BITNET@CUNYVM.CUNY.EDU>
Subject: Two viruses
Here are descriptions of a virus and a nasty program header which run on the
Apple II family.
===============
The Elk Cloner V2.0
I found the Elk Cloner V2.0 #005 on a disk of mine in 1981 or 82. I'm
fairly certain it could not have been written before the publication of
Beneath Apple DOS, so I would date it around mid-1981... It works exclusively
with DOS 3.3.
THE VIRUS
1. It is installed by booting an infected disk. I'm not sure how it initially
gains control; apparently it is loaded in with some trash from T0 SA which DOS
loads for no apparent reason. (BTW, since HackerDOS rearranges DOS on the
disk, the Cloner would trash it. It might trash master disks, I don't know.)
If you use a modified DOS which marks T2 S3-8 as free for use (as HackerDOS
does), it would overwrite any file stored there.
A JMP $9B00 which was installed when the disk was infected jumps to this
code (I think) and loads the virus from T2 S3-S8 into $9000-95FF.
2. Next, it inserts its claws into DOS:
A. Hooks into the Do Command code at $A180 and makes every command
reset the DOS parse state to 0. I have no idea why it does this. It has
no obvious effects.
B. Hooks into the RUN, LOAD, BLOAD, and CATALOG commands to make them check
the disk accessed & infect it if necessary.
C. Create a USR vector for the Cloner diagnostics:
B=USR(10) Prints a cute poem:
ELK CLONER:
THE PROGRAM WITH A PERSONALITY
IT WILL GET ON ALL YOUR DISKS
IT WILL INFILTRATE YOUR CHIPS
YES IT'S CLONER!
IT WILL STICK TO YOU LIKE GLUE
IT WILL MODIFY RAM TOO
SEND IN THE CLONER!
B=USR(11) Prints ELK CLONER V2.0 #005 (version check)
B=USR(12) Read the disk & prints BOOT COUNT: (#)
B=USR(13) Infects a disk
3. Increments the boot count
4. Checks for any special event for this boot:
Boot # (hex) Effect
A Point reset vector to $FF69 (monitor)
F INVERSE
14 Click the speaker
19 FLASH
1E Switch letters at $B3A7-B3AA so filetypes T I A B will appear as I T B A
23 Change DOS signal character from ctrl-D to ctrl-E
28 Lockout the computer on reset (dangerous one!)
2D Run the current program on any keypress (locks out the machine, also
dangerous. BTW, this is done by setting the hibit of $00D6.)
32 Print above poem on reset
37, 3C, 46 Screw with the INIT code. I think it will give you an I/O
ERROR, but I haven't tried. 3C and 46 might be dangerous in that
it might not init a whole disk. I don't know.
41 'Crash' to monitor on every DOS command
4B Reboot
4C Reboot
4D Reboot
4E Reboot
4F Write 0 to the boot count & start all over again!
5. Sits back & infects disks.
This is how the program is structured:
9000 Version number
9001-9073 Setup
9074-908F [Check a disk for infection] code
9090-90D9 Replacement code for LOAD, BLOAD, & CATALOG
90DA-9178 [Infect] code
9179 Read VTOC
9181 Write VTOC
91A8 Print routine
91E4 Serial #
91E5 Marked with a 0/1 if a disk is infected/uninfected
91EC-9243 Diagnostics
9244-9328 Poem
9343-9435 Special events by boot count
9500-9532 Code which loads Cloner on boot
95E1-95FF ASCII: MATT BE<ctrl-D>JOHN HINKLYJOHN HINKLE<ctrl-D>
(The author's hero?)
These are within the VTOC:
B3BE Zeroed, I don't know why
B3BF Boot count
B3C0 Zeroed, don't know why
B3C2 Infection mark: Version number (=(9000))
There may be several versions out. The version number would be used so
later versions would write over older versions, for a new improved
infection.
THE TEST
Any of these methods will work:
1. Check T$11 S0 Byte 7. If it is non-zero, the disk might be infected.
2. Check T1 S0 B$80-82. If they are 4C 00 9B, you have the Cloner.
3. Check T2 S3 - T2 S8 for the Cloner.
4. From Applesoft, immediately after boot, enter B=USR(11).
THE VACCINE
If you write a 2 to T$11 S0 Byte 7, Cloner version 2 will not infect that
disk. I have verified this.
THE CURE
Write something (like 00:1 AD 88 C0 4C 59 FF) to sector 0 so you can't boot
that disk.
PRECAUTIONS
The Cloner will not work unless you boot an infected disk. It cannot infect
a write-protected disk. I have infected disks I use all the time. Just mark
them as infected & don't boot them.
===============
Disease DOS
This isn't a DOS at all, nor a virus, but a nasty program which is added
to the front of a program. The author posted it to a bulletin board with an
explanatory file. I don't know if they threw him off the BBS or promoted him.
(Promotion: higher disk quota, file access, more downloads permitted, etc.)
When the program is run, it decrements a boot count & erases the current
track after a number of runs. It might be used by a pirate who doesn't like
the fellow he is giving a program to, or who doesn't like people in general.
You can detect it by scanning your disks for the sequence BD 8C C0 B0 F6,
an unusual sequence which shouldn't be on any normal disk. (I haven't checked;
it could be on DOS 3.3, but I doubt it.) It won't be
divided between sectors because it is in the first few bytes of the file.
Or you can read T$11 S0 Byte 4, which is the number of boots remaining before
wipeout. Any commercial (read: non-standard) disk might be non-zero there.
===============
Note that a write-protect tab will deter either program: The Cloner can't
spread, & neither can increment/decrement the boot count.
And, no, I won't send you either program. So don't ask.
Phil Goetz
thrash@jolnet.ORPK.IL.US (Richie Tozier) (08/24/89)
I though people might like to heard about this, Source for VIRUS.KILLER follows... July 10, 1989 * * LOAD RUNNER * * (virus title) ******************************************************************************* VIRUS WARNING !! VIRUS WARNING !! VIRUS WARNING !! VIRUS WARNING !! ******************************************************************************* Well folks, here it is...installment number 3 in the Saga of the virus for the Apple II. First it was CyberAids, which wasn't all that great and was quickly defused. It was followed in June of 1988 by Festering Hate, a more sophisticated and deadly evolutionary offspring of CyberAids. F.H. spread rapidly throughout the Apple II world and was particularly insidious as it; infected (usually) the first .SYSTEM file in the root directory, usually Basic.System, would infect more than one file per disk, would infect files in sub-directories, and when it 'went off' would destroy all volumes currently on-line at the time. This included RAM disks and Hard Drives! By now, most of you are aware of Festering Hate and that there are several good virus detecting/protecting programs available that have virtually eradicated the FH virus. It is to the credit of the Apple II community in general, and selfless people like Glen Bredon that FH was halted before it got too out of hand. As a matter of fact it was the very vehicle that spread the virus so rapidly that was also responsible for its quick demise. After I did my initial research on FH last year I wrote a brief study of it and uploaded the study to most of the active BBS's in Canada and the U.S. I also sent copies to Glen Bredon and others who acted very quickly to develop the 'cures'. But it was the massive telecommunications network of Apple II users that spread the details so quickly and stopped FH. Now, number 3 virus has just appeared. Called, rather nostalgically, "LODE RUNNER", it is not quite as destructive as its predecessors but its a virus nonetheless. Here's what I've been able to pull together so far: SOURCE - Although we're not 100% positive it appears that the program called SPEEDY SMITH is the culprit. A recent import from France, Speedy Smith is one of the fastest copy programs for the IIgs. A full 800K disk copy takes about 50 seconds (without verification) to 70 seconds (with) using SS. It has an excellent SHR screen with 'thermometers' that indicate the copy's progress. Unfortunately the reason we cannot either convict or acquit SS is that its creators have seen fit to invent their own DOS. This DOS is not readable by standard Apple II sector editors such as the one in Copy II Plus. There are several reasons, however, for suspecting Speedy Smith. First SS's displays are in French and the virus's text screens are as well. When catalogued Copy II+ indicates that there are 292 used Prodos blocks, but adding up the individual files' blocks only totals 148. And lastly, what better vehicle for the spread of a virus than a copy program? HOW WAS IT DISCOVERED? - Lode Runner was discovered almost by accident by several members of the Apples BC Computer Society. Shortly after receiving several new disks of IIgs software, including Speedy Smith, one member found that his Test Drive II refused to run. This was followed by backups and originals of Space Quest I and Police Quest. At first it was thought that the member's IIgs was having hardware problems. But at the same time another friend from Eugene, Oregon contacted us about having seen a French hi-res screen appear on his monitor just before his Copy II+ disk was trashed. Not being Canadian he was only able to pick out the word "virus". Armed with this info and the 'damaged' Space Quest disks I spent a weekend checking things out. At the same time other friends in Oregon & California were independently analyzing infected disks. HOW DO YOU KNOW IF YOUR DISKS ARE 'INFECTED' - There are 4 ways of detecting Lode Runner: 1) When the virus "goes off" and erases your disk...not exactly the most desirable way, 2) If you have a copy of Space Quest I then you can use it to check all your disks. Boot any suspect disk and wait until the drive stops. Replace the disk with Space Quest and do the 3 or 4 fingered salute (OA-CTRL-RESET). NOTE: Keep Space Quest write protected so that it dosn't get screwed up. If Space Quest boots to the point where it asks you to press a joystick button then you can be pretty sure that the previous disk is OK. If Space Quest trashes with an error message (#206) then the previous disk is likely infected. If you DO get an infected disk then you MUST either power down your IIgs or run the self-test before continuing with your testing to clear the RAM as the virus seems to install itself there. 3) A better check (and much faster) is to boot Copy II+ and run the 3.5" Sector Editor. Do a read of Block 0000 (Track 00, sector 00, side 01). If the first 3 bytes are 01 A9 50 then the disk is infected. Those 3 bytes aren't the only bytes that are different but they are all that is necessary to identify the virus. 4) If you recall, last year during the Festering Hate panic it was noted that one of the best ways to have an Apple II virus was in BLOCK (0) on any Prodos disk. At that point, anticipating another virus, Guy T. Rice wrote a small virus detector/fixer. If you put this program into the SYSTEM/SYSTEM.SETUP folder on IIgs disks then it would automatically detect and correct modifications to Block (0). Now for LODE RUNNER this will also work.. that is, it WILL detect LODE RUNNER and it will try to correct Block (0). BUT, it appears that due to the method of spreading of LR Guy's program cannot correct it. Every time you boot the disk it'll give you the virus detect error. I think the reason for this is that LR installs itself in RAM upon bootup in preparation for infecting a new disk.. and the only way you can be sure that its gone is to either power down or run the self-test.. and since Guy Rice's program does an auto-reboot and corrects the block (0) all in one step then the RAM never really clears and the virus re-infects the disk. And since you cannot write-protect the disk it becomes a vicious circle. I am going to try to get these observations to Guy Rice in the hopes that he can modify his program. NOTE: Three other problems with using Guy's program: its no good for 5.25" disks, it only works with a IIgs and it only works with disks that are bootable. LODE RUNNER can infect ANY Prodos disk because it resides in one of the blocks created when a disk is formatted. There is a 5th way.. the friends in Eugene, Ore have written a Binary program to detect and disarm the virus and I will try to include it in this file when I upload it. The reason theirs is successful is that the detector is not part of the disk being checked and thus the "circle" is broken. METHOD OF SPREADING - As far as we can tell the virus is spread two ways: by being copied with a copy program and by booting an uninfected disk (using OA-CTRL-RESET) immediately after running an infected disk. NOTE: For a disk to be infected it must not be write-protected. The virus does NOT infect actual files so none of your files will look modified in either their file length or their modified date. The virus also does not search all drives, as did Festering Hate, so cannot be detected that way. Because it doesn't infect files it only infects one spot per disk and cannot destroy any sub-directories. Therefore your cannot get rid of the virus just by re-copying the files...the virus is actually part of the Prodos kernel created when the disk is formatted. WHAT HAPPENS WHEN IT "GOES OFF"? - To get Lode Runner to "go off" you must set your Control Panel's clock to the following: the MONTH must be October, the DAY must be an odd numbered day and the minute must be a number divisable by 8. Next you must boot an infected disk then boot (using OA-CTRL-RESET) any other disk. This second disk must NOT be write-protected or the virus won't activate. - Once the second disk is booted the virus will appear. Its a red screen with text characters as follows: +++ SYSTEM FAILURE in : +++ 08 and proceeds to count down to zero where the screen changes to another with a multi-colored scrolling background and the following text; 000E Copies. Distr:Artistes Associes === L O A D R U N N E R === Premier virus NON-DESTRUCTEUR sur IIGS par SUPER HACKER & SHYRKAN du MASTERS CRACKING SERVICE 1988 Lyon By the time you've read the first screen the disk that you just booted has been rendered useless. LR does not appear to erase more than the current disk and doesn't seem to affect 5.25" disks. Not being an expert in French I am unable to determine whether the phrase below the title means: "The first non-destructIVE virus for the IIgs" or "The first non-destructIBLE virus for the IIgs". This is a 'moot' point however as it DOES destroy one disk when it goes off. In addition, and I believe that the writers of LR didn't plan this, LR will destroy Space Quest 1 and Police Quest for the IIgs if they are booted AT ANY TIME after an infected disk.. and if they are not write-protected. It is not necessary for LR to "go off" for these programs to be rendered useless. I have only found these two that behave in this fashion but I am sure there are more.. likely most of the Sierra programs for the IIgs. ACKNOWLEDGEMENTS - As with the studies on Festering Hate there are many people who collaborated on the research for this virus. Many thanks go out to: APPLES BC members, Ross Woodhouse - for being so insistant that something WAS wrong. Pat Daley - for gathering data, programs and relaying info. EUGENE, OREGON users, Jack Stalcup - for accidentally setting the virus off because the battery in his IIgs was dead. And for sending the programs and keeping the communications alive. Neil Parker and Mike Suiter (sp?) - for analyzing LR and writing the detection/correction program. PLEASE upload this file and Virus.killer to all bulletin boards. Please tell everyone you know about this virus so that we can wipe it out as fast as Festering Hate. PLEASE.. if you find out any more information that is either not in these notes or that refutes any of these observations then let me know. I can be reached at (604)294-4471, 8:30am to 4:30pm Pacific time, Monday thru Friday up until September 30, 1989. I can also be either reached by answering machine or in person at home (604)947-9722 anytime. I will also be in attendance at Applefest in San Francisco Sept.22, 23, & 24th. Messages can also be left on Compuserve...to 76475,642 (>>>---Brian--->). >>>---Brian---> (Brian McCaig, Virus Busters) ******************************************************************************* --- cut here --- FiLeStArTfIlEsTaRt ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789() LVIRUS.KILLER AoAAAAAAAYw4GIADzKBAWcRF)DwsAoAAAgEG MICT8UIa9UIamDAoCANPx2j5GAPP93OIMsATI1TpIxTpggDYQ6)HDASIyDNDyf(7 g2e4xXu8yne9gOf5wDfwgWO7HncyA040QIKY8Cwv30d4TAtD0Dhy)OgohbBiOMT3 KXA0wQPEDASHpbNDzXv8v7OopDK9tDq7v3e5umv8A0YjM8NTCvPGN9KMPGuvhbBi ((0rK(Y4IFuFhTPSAQPACIKvAIiGiGOAiAhAhDAAD8voAAQq8CwnQoc47jT(MMAI tXez5L)7vPOogmP8ga(7ynu9gOf9sn(6kXO7N2YoDACAunMDyX(8kDK9rPf6vTPo lLOopTOoun(8jXu5kXO9w3IrzXu8iC68gK60g(O9hP(8vDq7iCq8gKa0g(O9pXf8 gqL9MACAgnc)pIAkTn83JrA8vDd093OI97IT93OI97II97II)CAIOECgINCkMMAI vLP0z)O5yXOoy)u8AQKoaDCadDS)OCy(OCS)fzU)QIKDWAQvOcT3KXA0wUPEDAiH pTMDgu(8gOf60)u7unOojXu5kXO9N2orfzEADACDpbNDzXv8lTOojXO9kXO9gCqr znOxm7e60Pe5ZjKop68rAA6v9zAIQCeyfniAwndyOnMEg8O0g0f7g0vjM1vjgww3 g0f7g0vjg0vjB(LAQ6wJMx0AAASDtE4vDApDNwETMMAIznOxjD665D)7m)OopbPo zXv8pvOolzO7NGK5MBQjDww3WAAUDAAASAAUDAAAUAAUcBQAh3riQlaAtOUhNW8) klgMMRmSk5EZAAwRAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA ynu1gOf9sn(yyXO75LOol7Mogye6yHO0yX(6qqKoEDqqpPf5l7(50DK5lD67tnO7 h7e6gWO9ljO9PzMogScwOXt0SXszpbPozXv8AAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoCAAhj(1hDK9gWu81)e(vTOo n7e6lLPopTe4geu7pjO9g(78oTNolLf5gO)p0)u7unO6oD65lLf51LOolDK90Df7 tDa(v3e5hmv8AAQqAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA wiTAyw0ADZYoIMQywliiKpkSAngSgmUhIR4)xiMK6ANSp6AsA04A9YOCIlUpItVq AVIYgiUhIF7YJQZmrDMyiaP0dwrBk0bCynZCr0bC)1ZCQosCJkq7pmUhAAqhwmfy IV4LECGhMRoSE6EhEi8REisQMkqRFGWhSAySoBbCmHm5GZeYJbUpvDpBMAQrMEQD p2G0CANBYoUpMMSbNAJqluk5wq0SKksBgWF8KRIBJIQro(QKZrUsQngAQg42wni9 QDSyQA6OJrUszA9)KFLyIbUhFqUsAk6RgqUhLRoHIHGhg0EhwmgEhZ(FkGm5OZuT FqUsMFrRRcUhnDtSgAATJ8DTSBlJPR0TgAyUgACIgACIgVKIlSUhFVYYAgEbk4BC HV0PXTvdLZb0myKtghxKJwLTI9ZqI9fqiGQq5xEAYBC9cAK)JAVuF4am3DBiJ0ET qqqqOXNoMLcwUDaxMD6zEH8zSDNoPT8zqC60lqqqDkyUrUgKA2rqskKwKHhop3P0 3DdAgtippYUpEk8BIMQKqgiCl2Thlq0RKpmRBVoSRVoCFWUprY6JAnYvJwLImfi5 9YePgMAs8mAvgBMiKAUppOVhUVIAFOVpljDUUAfUmTAsCA5U4MlxJ0GIYAVpJ8GI gOO0SR4f4gCCwLlxIghz1DPiAzYvAsPEAAAAAAAAMBAATBqbgM1TP9kQgACVx4SM TpAIuM1TSV0SMVkTgACITBCIgM1TOJ1SvkETFByTPJlUAggUMlkRnASRT90UFtkL F5kUgcCTU9kTPZEIE5UVJBQJBZlTElETFtEIF5kUGBCTFxUSAAgOeAADE4hDYjHp NeXqi()3so5(pCMEK3IQHk6)))ejODgoO()7tCCAQDCABka9pCehhXIAFCQqimah gYYhmHqvAkK4mbehGauhgYu5gGqvFGrAIDehFWYsqDd4QDeps1q5iXIog2WrYMeh pNeplXoAiXKOkOS7lSehAke5gWehiHLAN)QKQDaExiaIRkt4ZANo2DNixCAowni4 wDSywnsPuiA8gCKZUz0EliRoj0m4iXIppNepjXIAFTeplXq4wOe5liBvj0G5iXIp pVepjXIAQbuxP5albAKohSNTxGBogXo4iHLytGehFCqZn1ahGWIoh6LIgiWrtWYh FCaaA0qhgXIDNAQrgEehiGqvA07Bh0tHIAPogSmrMNBoKHK1p2OEnXIAmfu5Gauh 9eupFyAAA0L4hXYDQDephXKBgYA8MFqvYEqigqWregQbtiehtB6aF6RCozW6BkKA leYhhbK40nHIgFAsgKjrMlAoEGK1piz5nXOKlhhS9i65ZCaKKXwpnbMitSP0MBMQ AE67AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA Acx9 --- cut here --- Thrashing Rage / TVH | Some have eyes and still can't see | Their plastic noise is anything but music to me UUCP: jolnet!thrash | Mechanized and computerized ARPA: bellcore@csustan | Switch off your brain & make sounds that dehumanize.