[comp.sys.mac] "SCORES" virus

macak@lakesys.UUCP (Jim Macak) (04/13/88)

Another rather ugly virus has reared its head in the Macintosh world.  This
one has come to be known as the "SCORES" virus, for a file that it leaves in
the System Folder.

I am taking the liberty of uploading two rather lengthy messages that I found
in the User Group area of AppleLink regarding this virus.  Although I realize
that these files are quite long, I thought the subject important enough to
share over the net.  Feel free to flame away if you feel differently and I
will refrain from posting this sort of info in the future.

Following, then, is the first file from AppleLink, titled "Virus Info #1" on
that system.


This originally appeared on the Washington Apple Pi TCS:


All information is from Dave Lavery.
If you encounter this virus please contact at him at:
     (202) 453-2720 (work) [the area code might be 703 or 301]
     
 
We have discovered a new virus that is circulating through the Macintosh
community.  This is not the now-infamous MacMag virus, but is a completely new
and, as far as I can tell, unreported version.As of this date, we have not
determined exactly what the virus does other than replicate itself.  Because
we do not know exactly what this thing does yet, we are very concerned about
the possibility of any invisible operations and "time bombs" that it may
contain.  The presence of the virus in the Macintosh memory does causes
several symptoms, which have caused losses of data.  These symptoms include
difficulty running MacDraw, difficulty printing from any applications
(especially MacDraw), difficulty using the "Set Startup" option, difficulty
running Excel, corruption of Excel files, and frequent crashes when starting
applications.  This virus has existed since at least February, 1988, and may
have been around as early as September, 1987. 


Identification of infection:

It is possible to determine if this virus has infected your Macintosh with the
following procedure:  1) Open the System Folder of the Macintosh and locate
the "Note Pad File" and "Scrapbook File."  2) Examine the icons used on these
files and check that they resemble the small Macintoshes seen on the "System"
and "Finder" icons.  If they do not, and instead resemble the standard
Macintosh document icon (an upright piece of paper with the upper right corner
folded forward), you are probably infected.  3) To verify infection, execute
ResEdit or some other utility which can see "invisible" files.  Examine the
System Folder.  4) If the System Folder contains two invisible files named
"Desktop" and "Scores," you are definitely infected. 
 
 
The infection process: 
 
The virus transmits itself from Macintosh to Macintosh by invading a standard
executable application file on a contaminated Macintosh.  When this
contaminated application is copied to a "sterile" Macintosh, the virus attacks
the new system by making these changes to the System Folder:  three INIT
resources are added to the "System" file.  If the files "Note Pad File" and
"Scrapbook File" do not exist in the System Folder, they are created.  The
type and creator fields of the "Note Pad File" are changed from "ZSYS" and
"MACS" to "INIT" and "ZSYS," respectively, and an INIT resource is added to
the file.  The type and creator fields of the "Scrapbook File" are changed
from "ZSYS" and "MACS" to "RDEV" and "ZSYS," respectively, and an INIT
resource is added to the file.  Two new, invisible file are added to the
system folder, named "Desktop" and "Scores," each with an atpl, DATA and INIT
resource.  These changes are summarized below: 


 FILE           TYPE CREATOR NEW  INVIS  RESOURCES     SIZE
 
 System         ZSYS  MACS    No    No   INIT ID=6        772 bytes
                                                                  ID=10
1020 bytes
                                                                  ID=17
480 bytes
                                              
 Desktop        INIT  FNDR   Yes   Yes   atpl ID= 128      2410 bytes
                                                       DATA ID= -4001  7026
bytes
                                                         INIT ID= 10
1020 bytes
                                         
 Note Pad File  INIT  ZSYS    No    No   INIT ID=6      772 bytes
 
 Scores         RDEV  ZSYS    Yes    Yes   atpl ID=128   2410 bytes
                                                          DATA ID=-4001 7026
bytes
                                                            INIT ID=10    1020
bytes
                                         
 Scrapbook File RDEV  ZSYS    No    No   INIT ID=17     480 bytes
                                                                     ID=6
772 bytes

Note that, unlike the MacMag virus, no "nVIR" resource are used anywhere.  The
modified files, "Note Pad" and "Scrapbook," still appear to function normally
with the Note Pad and Scrapbook Desk Accessories, and any existing contents of
the file's Data Fork are not disturbed. 
 
Once the system files on the target Macintosh have been infected, the virus
will then begin to attack applications.  Not every application is attacked by
the virus Q the determination of whether or not to infect an application is
apparently a random decision (at this point, no discernible pattern has been
found, except that "Finder" and "MultiFinder" are usually attacked).
Applications that are attacked on one Macintosh may remain "sterile" on
another Mac, and vice versa.   
 
As each application is attacked, the virus installs a new CODE resource into
the application.  The identification of this new resource is variable,
depending upon the existing resources within the application.  The virus looks
for the first available CODE resource slot, then places the new resource one
position above that.  For example, HyperCard contains CODE resources 0 through
20, leaving an ID of 21 as the first available resource ID.  The virus placed
the new CODE resource in the application as CODE ID=22. 
 
The second step of the infection of the application is the modification of the
CODE ID=0 resource of the application.  The virus modifies the eleventh word
of this resource, which is the start of the application's jump table.  Where
the application would normally jump to the CODE ID=1 segment, the virus
modifies this pointer to refer to the new CODE resource that has just been
installed.  The example below shows the first sixteen words of a "sterile" and
infected version of HyperCard: 
 
          Sterile                              Infected 
    0000 1EF0 0000 559C    0000 1EF0 0000 559C 
    0000 1ED0 0000 0020    0000 1ED0 0000 0020 
    0008 3F3C 0001 A9F0    0008 3F3C 0016 A9F0 
    0000 3F3C 0001 A9F0    0000 3F3C 0001 A9F0 
                 ...                                     ... 
 
Note that the eleventh word has been changed from "0001" to "0016," which
points to the new CODE ID=22 resource (hex 16 = decimal 22).  Also note that
during our examination of suspected applications, we found that at least one
compiler - LightSpeed C, I think -  normally places non-"0001" values in the
eleventh word of the CODE ID=0 resource.  To verify infection if the eleventh
word is not "0001," check to see that the tenth word is NOT "4EED" and that
the eleventh word points to another CODE resource.  If both of these are true,
then the application is infected. 
 
The new CODE resource is a copy of the virus code, is of size 7026, and is
executed when the infected application is invoked.  When the virus completes
execution, it returns to the invoked application, which appears to proceed
normally.  The first sixteen words of the virus are: 
 
    0000 0001 xxxx 3F3C  
    0001 A9F0 4EBA 002E 
    204D D0FC 0020 43FA  
    FFEC 20D9 2091 204D  
                         ... 
 
The third word of the virus code is variable, and appears to be based on the
return address used when the execution of the virus is completed.  The virus
further modifies the code of the application in a manner which has not been
fully deciphered.  This was determined by attempting to recover the HyperCard
application by removing the new CODE ID=22 resource and patching the eleventh
word of the CODE ID=0 resource.  Any attempt to run the rebuilt application
resulted in a system bomb, intimating that the virus has modified other
sections of the application which prevented its complete exorcism. 
 
Vaccinating your Macintosh: 
 
If your Macintosh is infected, the contaminated system files and applications
must be completely removed from the Macintosh, and new ORIGINAL copies should
be installed.  When removing the virus from the Macintosh system files, you
cannot just go in with ResEdit and delete the offensive INIT resources - this
virus is apparently intelligent enough to recognize this attempt, and modifies
it's resource identification and memory location when probed by resource
utilities.  ResEdit "thinks" that the virus resources have been deleted, but
they have been renamed and will return when the Macintosh is restarted.  The
system must be sterilized by: 
 
1) Examine EVERY application (including any in the System Folder, and on EVERY
diskette you may have) you have with ResEdit, and check if a new CODE resource
has been added and if the CODE ID=0 resource has been modified to refer to the
new CODE.  This is the most tedious part of the process, and will probably
take quite a bit of time.  I have about 160MB of stuff on two 100MB drives,
and this step took about three hours.  If the application has been infected,
list it. 
 
2) Using ResEdit, open the infected System Folder and locate the "Desktop"
file.  Select the file and use the "Get Info" option on the  "File" menu.
When the file information window opens, turn off the "Invisible" bit, then
close the window and save the file information.  Do the same for the "Scores"
file. 

3) Locate a sterile system diskette (preferably one of the "System Tools"
diskettes from Apple), LOCK IT, and boot from it. 

4) Throw away the following files from the infected System Folder:  "System,"
"Finder," "MultiFinder," "Desktop," "Scores," "Scrapbook File," and "Note Pad
File."  Once these files are in the Trash Can, EMPTY THE TRASH IMMEDIATELY!
Note:  this is the minimum required to remove the System portion of the virus
- my personal preference is to delete the ENTIRE System Folder, not just the
suspect files in it. 
 
5) Locate all of the applications which you listed in Step 1.  Throw them
away, and empty the Trash Can. 
 
6) Shut down the Macintosh, and turn the power off.  Wait at least 30 seconds
for memory to clear before rebooting again from the sterile diskette (this may
not really be necessary, but better safe than sorry). 

7) Reinstall the Macintosh operating system from the System Tools diskette to
your Macintosh. 
 
8) Locate your original copies of the deleted applications software.  Before
reinstalling the applications, examine each one with ResEdit to be sure that
it is sterile.  If there is no problem, reinstall the application.   
 
A word of warning: 
 
The "Vaccine" CDEV which is currently appearing on bulletin boards is only
marginally useful in fighting this virus - if your system is already infected
when you install Vaccine, you will not get any warning from Vaccine that the
virus exists.  If you have Vaccine installed on a sterile system, and this
virus is introduced at a later time, Vaccine will only warn you of the virus
attack, but will not prevent infection. 
 
I do not know how far this virus has spread, or where it came from (although
we are working on that).  The information contained above reflects only what
we know so far about this virus - I do not know if it has any maliciously
destructive functions which have not yet activated, or if it does anything
other than replicate.  I do know that it is extremely virulent - it has
defensive mechanisms built in to protect itself from deletion, most of it's
resources are protected, and it places multiple copies of it's components
throughout the system to avoid single point of failure destruction.  This
thing is an order of magnitude more sophisticated than the MacMag virus, and
is considerably tougher to kill. 
 
So far, the virus appears to only affect system files and application files.
Data files (documents, spreadsheet data, HyperCard stacks, etc.) do not appear
to be affected, and do not seem to transmit the virus. 
 
While not apparently maliciously destructive, I have established that the mere
presence of this virus in the system is sufficient to cause the printing and
application instability problems (like the ones we have been experiencing).
Once the virus has been removed, all of our reported Macintosh problems have
gone away.  I believe that whoever wrote this could not foresee enough of the
potential system configurations to prevent an occasional collision between the
virus and other active applications and printer drivers.

Apple in Cuppertino has become intimately aware of this virus in the last two
days.  They are going to be working on a more complete disassembly of the
virus, and will hopefully be able to determine exactly what this thing does.


(Please see a following article for the second file regarding this virus.)


-- 

>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
Jim -->  macak@lakesys.UUCP (Jim Macak)  {Standard disclaimer, nothin' fancy!}
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<

macak@lakesys.UUCP (Jim Macak) (04/13/88)

Here is the second file (Virus Info #2) from AppleLink regarding the "SCORES" 
virus:


 The word from Dallas:

The information provided in the Virus Info # 1 Document is substantially
correct, although I will disagree with certain aspects according to my own
experiences with this plague.

Detection:

Check the System Folder for Scrapbook File and Note Pad File.  If they have
BOTH and they are generic document icons, i.e., a blank, dog-eared page,
assume you are infected.  If the icons are small Macs, like the System and
Finder icons, you are most likely safe.  But please read and try to understand
this document because failure to take precautions may cause you to be infected
tomorrow.

The viral files contain several distinct and possibly unique strings.  Use
Fedit to search for VULT and/or ERIC. If you do not find either of these
strings on your disk, it is NOT infected. If you find them, proceed as though
you are infected and make further tests.

When Vaccine has been installed on your disk and is running, opening an
infected application will produce either an alert message from Vaccine, a
bomb, or the Mac will hang up. In any case, the application should be examined
more closely: Use ResEd to open the CODE resource of the application. If the
top one is two numbers higher than the next highest number, do a Get Info on
it. If the size of this code resource is 7026, you have confirmed it as an
infected application. Throw it in the trash as it is unusable and will cause
you problems if you run it with Vaccine off.  If it is an application for
which you do not have a clean backup, save it to a floppy.  I'm sure that
before too long, someone will write an application that will repair
applications and you can recover it then.

If you have installed Vaccine and it periodically gives you a warning, even
when you are doing nothing to change anything on the Mac, Vaccine is NOT
defective. It is telling you that you are contaminated and that the virus has
tried and failed to attack a previously clean application. If you do not have
Vaccine installed and have noticed your disk drive (hard or floppy) run for a
few seconds when there is no cause, it is quite likely the same thing, except
in this case you just lost the application.

Check ALL of your applications. It is easy to overlook some of the smaller and
common ones like Font/DA Mover and backup programs. Be sure to check Finder,
MultiFinder, and ResEd itself. Remember, you do NOT have to have run an
application for it to be contaminated.  Thus far I have not seen a
contaminated document.  The virus seems to attack only those files which have
CODE resources, and virtually all documents do not contain these.  If there is
a type of document that does, please let me know and I will edit this notice.

Removal:

The virus CAN be removed from your System by less stringent means than
described in document # 1. 

Open your System folder with ResEd.

Select and Clear Scrapbook File, Note Pad File, Desktop, and Scores.

Open the System and clear these resources: atpl ID 128, DATA ID -4001, and
INITs 10, 17, & 6. 

Close ResEd and save changes. 

Note that the System file atpl and DATA resources are not mentioned in the
Virus Info # 1 document. However, they are in the System and should be
removed. A virgin System (4.1, at least) from Apple does not contain either
resource type, but some programs - LaserSpeed, for one - legitimately place
them in the System. Remove only the ID numbers listed.

My experiences with this virus over the past three months have shown this to
be an effective and relatively simple way to clean the System. I did this
three months ago and have seen no more Scores, etc. files until a week ago,
when a friend gave me an infected application.  Even then I had to turn
Vaccine off to get it to do its dirty work.  I have seen several infected
Finders.  If Vaccine is running and the Finder is contaminated, the Mac will
NOT boot.  In this case, boot with a CLEAN floppy and replace the Finder on
the hard drive.

This rather simple method of decontaminated the System is suggested because it
allows you to keep any special fonts, DAs, or other System modifications you
may have made.  If you want to go the full route and re-initialize the hard
disk, you should be thoroughly de-contaminated, but I feel that may be
overkill.  Just be sure to check all of the files you are re-installing.  A
friend went to an Apple dealer to get a new System and Finder, only to
discover that the dealer's Mac II was infected!

After you feel that all infected applications have been removed and replaced,
run Disk Express, if you have it, with the Erase Free Space option turned on.
This will cluster your good data to the start of the disk and zero out all
remaining space. Then use Fedit to search for the VULT and ERIC strings. If
they are gone, you are cured. If they are still there, do what you can to find
out which file they are in and remove it from the disk.  (Since the version of
Fedit I bought (1.1) had not yet implemented the "Sector Info" feature, it
would not show me the name of the file(s) which contained these strings.  I
had to search sectors before and after them to make a guess as to which files
I was looking at.)  Repeat this until there is no ERIC or VULT. (By the way,
if anyone knows where I might find a jerk named Eric Vult who wrote this
virus, I have a few things I'd like to say - and do - to him.)

Speculation:

In addition to ERIC and VULT, several of the viral resources contain another
possibly important string: HD20.  Pure supposition on my part, but this could
be a two-step virus.  First the spread.  You get a bad application. It infects
your System.  Once active, it spreads to applications. You give one of these
to a friend or put it on a BBS.  It infects other Systems, which infect more
applications...  In a finite and rather short time it is all over the country.
I know for a fact that as of April 5, 1988, it is in Hawaii, Dallas,
Washington, and a prominent computer in Cupertino!  Then on some predetermined
date, or following some specific action on your part, it performs some heinous
act, and possibly on HD20's.

If you own an HD20, I recommend the following: Choose a disk name other than
HD20.  The name may or may not have anything to do with the possible purpose
of this virus, but don't take a chance.  The bad news is that the name HD20 is
found in multiple places on your disk.  To simplify the name changing
procedure, choose a name comprised of four letters like Mine, Disk, or Bomb.
Use Fedit to search the disk for HD20, and change EVERY occurrence to the new
name.  You will also find your disk name in the next to the last sector on the
disk.  Don't overlook this one.  Changing to a name of other than four letters
is much more complex and I can't explain how to do it here, but merely
changing the name of the hard disk from the Finder is NOT enough.  Just a
friendly suggestion.

Prevention:

Contrary to the advice in the Info # 1 document, I have so far found Vaccine
to be very effective in controlling this virus.  Make sure you have the real
Vaccine and not a phony. It is 11,875 bytes in size, created March 19,1988 at
11:49 PM. (I guess CE Software worked long hours on this one. Have you thought
of paying them, even though the program is free?)  Notice that the file name "
Vaccine" starts with a space.  Leave it this way, as programs like this are
loaded alphabetically, and the space makes sure Vaccine is loaded first for
maximum protection.  Keep Vaccine running at all times. For those who do not
know how to use it, place Vaccine in your System Folder and then open the
Control Panel under the Apple menu. Vaccine will appear in the left window.
Select it with the mouse and read the instructions. I suggest putting an X in
the top box, the second one, and the fourth one.

Research:

We know that an infected application grows in size by 7042 bytes. CODE 0
resource is altered, but with no change in size, and a new CODE of 7026 bytes
is created. Where is the additional 16 byte increase?  Apparently not in the
CODE resources. Help here would be appreciated. Vaccine will beep three times
when an attempt is made to infect an application. My guess is one for adding
the 7026, one for the CODE 0 change, and one for the 16 bytes. Finding the
last may provide the means for rescuing a sick application.

Does the atpl resource have any reference to AppleTalk? Can this virus be
spread over a network? I am not a programmer, just a hacker, and do not know.

Me:

One hates to publish a phone number in a document designed for public
distribution, but without it you could not relay any important information.
Please call only from 8 AM to 8 PM Central time, and only if you have found
something not in either of the two documents in this package. Long distance
callers, please leave a complete message on the answering machine if it
answers, as I cannot afford to return many long distance calls. And thanks for
any help.

                       Howard Upchurch
                       3409 O'Henry Drive
                       Garland, TX  75042

                       (214) 272-7826

Notices:

I have reported information as I have found it. If there are any errors in the
above, I apologize but ask not to be held responsible. Some statements may
prove false or incomplete as more information comes to light.

Although most references in this document concern hard disks, floppies can be
infected in the same way.  Even if you do not use a hard disk, check
everything you own.


-- 

>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
Jim -->  macak@lakesys.UUCP (Jim Macak)  {Standard disclaimer, nothin' fancy!}
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<

alibaba@ucscb.UCSC.EDU (Alexander M. Rosenberg) (04/14/88)

To clear up this whole virus thing:

Beside the Scores/Desktop/VULT virus a few others exist.

Robert Woodhead (Wizardry I-IV, a reversi game, etc.) is writing and has
almost completed "Interferon". Interferon is an application that will
check all connected volumes and delete files that appear infected. The
info I have lists several known viruses including the VULT one mentioned
here. It is known to detect these viruses.

I assume that one uses Vaccine nnormally, then periodically uses Interferon
to do an indepth check. 

Other things about the VULT virus:

If I am correct, the virus has several bugs. It tries to modify the Desktop
file, but incorrectlly creates one in the System Folder. The atpl resource
is supposed to make it infect things connected via AppleTalk, but doesn't
appear to work correctly.

-------------------------------------------------------------------------------
-  Alexander M. Rosenberg  - INTERNET: alibaba@ucscb.ucsc.edu   - Yoyodyne    -
-  Crown College, UCSC     - UUCP:...!ucbvax!ucscc!ucscb!alibaba- Propulsion  -
-  Santa Cruz, CA 95064    - BITNET:alibaba%ucscb@ucscc.BITNET  - Systems     -
-  (408) 426-8869	   - Disclaimer: Nobody is my employer  - :-)         -
-			   - so nobody cares what I say.	-	      -

dudek@csri.toronto.edu (Gregory Dudek) (04/15/88)

In article <576@lakesys.UUCP> macak@lakesys.UUCP (Jim Macak) writes:
>
>
> The word from Dallas:
>
>The viral files contain several distinct and possibly unique strings.  Use
>Fedit to search for VULT and/or ERIC. If you do not find either of these
>strings on your disk, it is NOT infected. If you find them, proceed as though
>you are infected and make further tests.


    For whatever it's worth, there used to be a very notorious
bozo using Apple II's who called himself "The Vulture".  A large number
of commercial programs with copy-protection removed sported
complex logos ``advertising'' the fact that the "vulture" had
done it.
    It sounds like the same kind of mentality & the same kind of
skills at work.

    I don't know where the vulture-cracked programs came from, but I
saw a number of them here in Toronto Canada.
-- 
Dept. of Computer Science (vision group)    University of Toronto
Reasonable mailers:  dudek@ai.toronto.edu
Other UUCP: {uunet,ihnp4,decvax,linus,pyramid,
		dalcs,watmath,garfield,ubc-vision,calgary}!utai!dudek
ARPA: user%ai.toronto.edu@relay.cs.net