02.08.2013 Views

Macro Virus Table - Defense Technical Information Center

Macro Virus Table - Defense Technical Information Center

Macro Virus Table - Defense Technical Information Center

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

PC<br />

MS-DOS/PC-DOS Computer <strong>Virus</strong>es<br />

working hard -2/14/92<br />

v6-126: CoffeeShop has same author as Cruncher virus.<br />

v6-151: At least one anti-virus program can detect and remove Coffeeshop.1568.<br />

Name: Mutator<br />

Aliases: Mutator Type:<br />

Disk Location: Features:<br />

Damage: Size: See Also:<br />

Notes: v6-151: At least one anti-virus program can detect and remove Mutator (307 and 459).<br />

Name: N8FALL<br />

Aliases: N8FALL Type: Program.<br />

Disk Location: COM application.<br />

Features: Sometime displays message.<br />

EXE application.<br />

May drop a ’CHILD’ non-polymorphic<br />

COMMAND.COM<br />

companion virus.<br />

May cause software problems ( false free<br />

memory available ) .<br />

Damage: Sometime displays Size: About 5800 byte long. See Also:<br />

message.<br />

Polymorphic: each infection<br />

May drop a ’CHILD’ nonpolymorphic<br />

companion virus.<br />

May cause software problems<br />

( false free memory available )<br />

.<br />

different<br />

Notes: The following notes are extracted from VB, May 1995:<br />

N8FALL is about 5800 byte long; It is quite complex and stealth, and employs DOS commands<br />

and functionality to its own advantage.<br />

When an infected file is executed, the virus checks for itself in memory by finding the value at<br />

000:05E0h. If the returned value is JMP VIRUS instruction, then N8FALL follows the instruction<br />

and determines that its indeed a memory resident. If the virus is memory resident, control is<br />

returned to the host program. Otherwise, It attempts to install itself in system memory.<br />

First, N8FALL calls Int 13h, Int 21h, and Int 2Ah vectors to check to anti-virus program as well<br />

as using them for its own installation, infection, etc. If any found, then they are disabled for salve<br />

preservation. Second, It looks for HIMEM.SYS. It uses Int 21h handler to determine the<br />

residence of DOS interrupt handler. If interrupt handler is in high-memory, then the area next to it<br />

will be over written with JMP VIRUS instruction. If interrupt handler is in low-memory, then it<br />

will be overwritten with JMP VIRUS instruction. Next, it opens COMMAND.COM files and<br />

closes the file, now COMMAND.COM is infected. Finally, N8FALL decrypts the string<br />

’C:\NCDTREE\NAVINFO.DAT’ which is name used by Norton Anti-<strong>Virus</strong> program. Control<br />

now is returned to the host program.<br />

The virus infects COM and EXE files. Before infecting any file, it conducts checks so that 1)<br />

anti-virus program are exclude. 2) floppy disk are not write-protected. 3) DOS error messages,<br />

VSAFE, and Microsoft’s TSR are disabled. When all these conditions are satisfied, the virus<br />

examines the lower five bits of the file, if they are all set to 1, then it becomes a candidate for<br />

infection. Next, the last 24 bytes are read and decoded. The virus look for its ID in this area. If the<br />

250 CIAC Computer <strong>Virus</strong> <strong>Information</strong> Update May 21, 1998

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!