💾 Archived View for spam.works › mirrors › textfiles › virus › funpiv3.cvp captured on 2023-06-16 at 21:02:43.

View Raw

More Information

-=-=-=-=-=-=-

FUNPIV3.CVP   911013

                      Viral code addition

In order to avoid damage to the original program, which might
lead to detection of the infection, the viral code can be added
to the beginning or end of the program.  (Or not attached at
all.)

Adding code at the beginning of the original program ensures
that the viral code is run whenever the program is run.  (This
also ensures that the virus is run before the program runs.  The
virus thus has priority in terms of operation, possible
conflicts and detection.)  With the addition of code to the
beginning of the program, it is possible to avoid any change to
the original code.  It *is* necessary to alter the file/disk
allocation table, at least, in order to ensure that the program
"call" starts with the viral code, and that the viral code is
not overwritten by other changes to the disk or files.  While
the original code may be left unchanged, the file will be,
essentially, altered, and, unless techniques are used to
disguise this, will show a different creation date, size and
image.

It is also, however, possible to add viral code to the end of
the original program, and still ensure that the viral code is
run before that of the original program.  All that is necessary
is to alter the file header information to reflect the fact that
you want to start executing the file towards the end, rather
than at the normal location.  At the end of the viral code
another jump returns operation to the original program.

(This kind of operation is not as odd as it may sound.  It is
not even uncommon.  A legacy from the days of mainframe "paging"
of memory, it is used in a great many MS-DOS executables, either
in single .EXE files or in overlays.  It is, therefore, not a
coding indication that can be used to identify viral type
programs or infected files.)

Appending, or prepending, viral code to an existing program
therefore avoids the problems of damage and potential failure to
run which plague overwriting viral programs.  Even these viral
programs, however, are not foolproof.  Programs which load in
very non-standard ways, such as KEA's "Zstem" terminal emulation
program, use the header information which the viral programs
alter.  Although not originally designed for virus detection,
the "Program abort - invalid file header" message thus generated
is an indication of viral infection.  Sometimes the first
indication that users have.

copyright Robert M. Slade, 1991   FUNPIV3.CVP   911014