[comp.virus] virus report

76304.1407@CompuServe.COM (Ray Glath) (12/13/90)

                 BEIJING VIRUS (a.k.a. "Bloody" virus)

December 7, 1990

Copyright Raymond M. Glath, Sr.
          President

          RG Software Systems, Inc.
          6900 E. Camelback Road, #630
          Scottsdale, AZ  85251
          (602) 423-8000

New virus discovery.

First reported appearance on a number of computers in the Civil
Engineering Department at Massachusetts Institute of Technology
(M.I.T.) in Cambridge MA, USA.

Mr. (   ) had been experiencing strange events with several
systems. Running Vi-Spy showed that there was an un-explainable
2048 bytes of RAM that was "hidden" from DOS. Mr. (    ) used
Vi-Spy to acquire the partition table and boot sector into a file
which he then sent to RG Software Systems, Inc.'s Virus Analysis
Lab (VAL) where the code was dis-assembled and analyzed. Within
24 hours after receipt of the virus sample, an identification
pattern was developed and an updated "emergency release" of Vi-
Spy was shipped overnight to Mr. (    ).

Type of Virus: PC DOS Boot infector. Infects Partition Table (Master
                    Boot Record) on hard disks as well. (Drive
                    C:)

Vector:        5 1/4" Diskettes only.

Types of computers susceptible to infection:
               PC's and Compatibles with 640k or more RAM.

Infection acquired by:
               Attempting to boot from an infected diskette,
                    whether or not the diskette is "bootable".

Symptoms:      Available RAM size decreases by 2048 bytes.
               3 1/2" diskettes become non-readable.
               Occasional "garbage characters" appear on screen.
               Diskettes that were "bootable" will no longer boot
                    the system.
               5 1/4" High Density diskettes may show "0 bytes in
                    1 hidden files" as a message from CHKDSK.

Danger level:  Considered to be a very dangerous virus in that it
               may cause damage to any diskette or hard disk due
               to bugs in the virus that can cause it to write to
               the FAT or the Root Directory.

Naming convention used:
               This virus was named for the political statement
               it attempts to make. The following message is
               stored in encrypted form. Due to a bug in the
               virus' decryption routine, the actual message may
               be displayed as garbage characters.

               Encrypted message: "Bloody! Jun. 4, 1989"

               This is the date of the Chinese "Tianamen Square"
               confrontation between rebelling Students and the
               Chinese Army in Beijing.

Technical Notes:

1. Trigger mechanism for message display: The first appearance of
the message will be 1 - 128 system boots, then every 6 boots
thereafter.

2. This virus attempts to save the original boot sector into
another sector, however bugs can cause it to just replicate
itself into both sectors. Thus no automatic clean-up can be
reliably performed unless the original, un-infected Partition
Table and Boot Sector are available to use in a replacement
operation.

There is no attempt made by the virus to determine what type of
disk is in use, thus the damaging effects are produced due to its
always writing to a fixed number of disk sectors, no matter what
disk mapping is in effect.

3. The virus intercepts all diskette reads and writes where it
checks for its infection through a comparison of the 1st 6 bytes
of sector 1. If the disk is not infected, it adds itself to the
disk.

4. Detection avoidance techniques used by the virus:
When attempting to infect, if the write fails, it tries one
additional time, and then aborts its infection attempt. Therefore
the user doesn't notice a failure when the disk is write
protected. Also, the virus bypasses DOS completely when
intercepting diskette reads and writes. Thus, a program that
monitors system interrupts will not see the activity of this
virus.

*************************************************************

Note: Since this report has been completed, the Beijing virus has
also turned up in another department at M.I.T. and has
simultaneously appeared at the City University of London.

This is the first time we've noticed a Boot Sector virus
appearing simultaneously on both sides of the Atlantic, leading
to speculation that multiple persons were involved in its
release.

Researchers in the U.K. have named this the "Bloody" virus.

With the timing of this virus' release, there is an improved
opportunity for it to spread, through students' carrying infected
diskettes home for the holidays.

To help protect his privacy, the name of the individual at M.I.T. has been
removed from this report.