💾 Archived View for spam.works › mirrors › textfiles › virus › fish.vir captured on 2023-06-16 at 21:02:24.

View Raw

More Information

-=-=-=-=-=-=-

    This was originally posted in the International Virus Echo, but
some parties here may find of interest.

Date: 06-30-90 (03:11)     Number: 1344             The DATAMAX BBS
  To: ALL                        Refer#: NONE
From: MARK TAYLOR                  Read: YES
Subj: REPOSTED MESSAGE             Conf: (39) fVIRUS
------------------------------------------------------------------------
(This message was originally addressed to "Merry Hughes", an alias
used by the sysop of the Excalibur BBS. The author, Frank Breault,
tried to post it there on June 28.  Since he is not a caller of this
BBS, he asked me to repost it for him here because it contains
important information which everyone should be made aware of. Frank
is offering to substantiate his statements in writing in a docu-
mented, scientific way, and to provide samples, copies of work logs,
decrypted virus images and transcripts of debugger sessions to
anyone who is  *NOT CONNECTED*  in any way with the so-called
"researchers" of the McAfee company. A sworn, notarized affidavit
to that effect will be required prior to release of code data or
samples. Leave me a message if you are interested and I'll try to
make arrangements.  I make no claim of any knowledge of these
matters but think that people should be allowed to express the
results of their work, especially when they are trying to warn the
public about a serious possible danger in a selfless, noncommercial
manner). ------Message starts:

"Well, Merry, most of those who have looked at this unusual virus
still don't know everything about it.  Even after being fully
decrypted, the code remains hard to disassemble.  But I am certain
that it doesn't contain any reboot routine and I am *quite certain*
that it does not occupy variable memory size.  I have some idea of
how you came to believe that it uses variable memory allocation but,
not knowing exactly what you saw, I can't explain your belief. I
think perhaps you were misled by a trick it plays as it loads into
RAM. Anyway, Dave Chess of IBM stated that he has disassembled
about half of it.  Rick Engle of Wang Labs seems to have decrypted it
almost completely.  The difficulty in disassembling stems from its
intentionally-misleading code.

Regarding the reboot, perhaps the protection program you were using
caused it, not the virus itself (Incidentally, both version 1.07 and
v1.10 of the F-DLOCK program you mentioned are quite useless
against the FISH 6: it goes right by them).

Every day, I am finding new and intriguing aspects of the FISH 6.
You have no doubt noticed that the virus changes its appearance on
disk each day of the year.  All copies are encrypted, but copies
produced the same day are all encrypted similarly.  This indicates
that the date holds the encryption key and indeed, that turns out to
be so:  the virus looks at the date and adds the number of the month
+ the day of the month to derive `n', the number it uses as key for
its disk XORing routine. The encryption routine used on disk and the
one used in memory are not the same, however.

I now have a fully-decrypted copy of the FISH 6. The string you
mentioned is shown:


(Quotation marks are mine).  The entire string is displayed onscreen
if any infected file is executed twice when the system date is 1991.
any sense out of them yet (with my luck, it's probably my birthdate
- or yours!).

Once fully decrypted, the virus code is seen to contain the
following strings, scattered all over its body:

   FISH, SHAD, TROUT, FIN, MUSKY, SOLE, PIKE, MACKEREL,
   TUNA, CARP, COD, BASS, SHARK.

While in RAM, however, they appear only partially decrypted at any
one instant, but this appearance also changes constantly.  Although
obviously fish names, they are probably not true text strings as
such, but portions of executable code.  Did someone take the time to
compose this:
             T = 54h = PUSH SP
             U = 55h = PUSH BP
             N = 4Eh = DEC SI
             A = 41h = INC CX
and then incorporate it into self-encrypting code in some meaningful
manner..?  Are they just decoration..?  Encryption keys..?

The RAM image, responsible for the viral activity once the virus is
loaded into memory, is itself also encrypted, but not in the same
manner as on disk. Its appearance seems to change from one moment
to the next.  The virus does this every time Int 21 is called. Such
mutations in RAM do not involve the entire 3584 bytes, but only many
short portions of the code, each 4-5 bytes long, at any given time.
After enough such changes have taken place, the entire body of the
virus in RAM would have been completely altered (except the de-
cryption routine itself).  The size of the memory image, however,
remains definitely constant and *does not change*, as you stated.
You can be assured of that.

The string "FISH FI..." is found, as you yourself stated, Merry, at
the end of infected disk files. This, however, is not "later removed
from the file by the virus itself", as you said.  The "FISH FI..."
string is permanent. However, if you try to use it as a signature
for the virus, it isn't always useful.  Perhaps this action of the
virus is what gave you the impression that the string gets removed;
it doesn't, but neither can you read it if the virus is in RAM.  The
string, together with the rest of the virus code, appears to vanish.

Like the 4096, the virus disinfects files "on the fly" as these are
loaded into RAM, so they show the original size, date and CRC. The
FISH 6 seems to use an improved technique to do this, however, and
this probably allows it to "disinfect" even files that are being
opened for Read (as when being scanned for search strings).

The method used by the FISH 6 to determine which file to "clean up"
(as it's being opened or loaded into RAM) is different from the one
it uses to determine whether a file is already infected (for
purposes of avoiding multiple reinfection). Like the 4096, the FISH
marks infected files by altering a special byte in the file date
entry. (The presence of this "autodisinfection marker" is of limited
diagnostic value; several viruses use it). In the case of the FISH
6, files bearing this mark are automatically "disinfected" on the
fly when opened.  The virus does not use this modified date entry to
determine which files to infect, in the way Zero Bug, Vienna and
other viruses do. If this byte is altered, the virus stops "auto-
disinfecting" them, but the files remain infected and infectious;
FISH 6 knows this and does not reinfect them a second time. It uses
another method to determine which files it has already infected. I
believe this may be related to certain operations performed at the
very beginning of the virus code.

 NOTE: If an infected file is manually re-dated, it will no longer
       be disinfected "on the fly" by the FISH 6. Thus, files whose
       "autodisinfection byte" has been deleted *can be* identified,
       if infected, using string scanners, even if FISH 6 is active
       in RAM.  This offers a means, albeit inelegant, to prepare a
       suspected file for scanning without the virus being able to
       hide itself. If a file is so prepared (redated), then SCANV
       and F-PROT and other string searchers will again be able to
       detect it - but they may still spread the infection in any
       case, if FISH 6 is in RAM.

                           WARNING:
                           -------
This virus would seem to encrypt itself in more than one way or, at
least, change in some unusual manner.  I have in my possession
copies of what seems to be the FISH 6 virus, but which do not bear
the scanning string used by SCANV 64 and F-PROT 1.10 and are

DETECTED BY EITHER SCANNER* on disk.  Yet, they are active
and give
rise to infections which appear similar to the FISH 6.  In this
sense, I have also received confirmed reports about the existence of
a  "Mother Fish", larger in size and having the capability of
changing the character of the FISH 6 into a different virus. I don't
yet have this "Mother Fish" but wonder if perhaps these strange FISH
copies might have been produced by it, and if the virus which we all
call the "FISH 6" is really not a virus, in the usual sense, but
rather just the end product of a more complex, much more
sophisticated and dangerous viral *system*.  If this is so (and it
appears that it may be so), then analyzing the FISH 6 as a simple
entity might be a serious mistake.
---------Message ends.

Personally, I think it's very regrettable that the people in the
McAfee company are endangering the public by witholding information
just because it does not agree with the results they previously
published in error. How long does everybody have to live under false
assumptions just to allow "Merry Hughes" to save face? When Frank
Breault made a mistake earlier, he admitted it and corrected it
immediately (12 hours later). Why is it that the person who calls
herself (falsely) "Merry Hughes" (and who has made many, many
errors describing viruses!) cannot have the decency to admit

Really, there is no REQUIREMENT that he/she be infallible,
just plainly honest would do...