VIRUS-L Digest   Monday, 30 Sep 1991    Volume 4 : Issue 177

Today's Topics:

More on Virus Simulator... (PC)
Heuristic analysis?
Re: Azusa Virus & CLEAN question (PC)
Re: Belch_Virus? (Mac)
Hardware Damage?
"Safe" MBR (PC)
DIR II (Cluster) Virus (PC)
Montreal Virus (PC)
re: Students and viruses
Again, F-prot, Clean, Joshi and DOS 2.0. (PC)
Unencrypted scan strings
Typical incidents
Hardware vs. software
!!Icelandic Virus (PC)
New virus info, Screen Trasher (PC)
Re: Heuristic analysis
Re: When will FPROT 2.00 work with Zenith Dos 3.30.1 (PC)
Re: Theory and practice
Re: Problems running F-PROT 2.0 on 386's (PC)
Re: F-prot 2.00 with 386s (PC)

VIRUS-L is a moderated, digested mail forum for discussing computer
virus issues; comp.virus is a non-digested Usenet counterpart.
Discussions are not limited to any one hardware/software platform -
diversity is welcomed.  Contributions should be relevant, concise,
polite, etc.  Please sign submissions with your real name.  Send
contributions to [email protected] (that's equivalent to
VIRUS-L at LEHIIBM1 for you BITNET folks).  Information on accessing
anti-virus, documentation, and back-issue archives is distributed
periodically on the list.  Administrative mail (comments, suggestions,
and so forth) should be sent to me at: [email protected].

  Ken van Wyk

----------------------------------------------------------------------

Date:    Fri, 27 Sep 91 20:30:03 -0700
>From:    [email protected] (Fred Waller)
Subject: More on Virus Simulator... (PC)

Writes [email protected] (Doren Rosenthal) about the
Virus Simulator:

> -------...I wrote an  information-extracting engine.
> -----------  -------  --------- ....
> My  engine runs an anti-virus program against real viruses and
> then  reports not only how well the anti-virus program works....
> but how it works and what it's looking for. Producers of anti-
> virus programs often go to great lengths to  guard  this
> information, but I found no encryption technique  they  used
> that could stand up to my engine.... none.

This is extremely interesting. It means the Virus Simulator doesn't
simply stuff "stolen" search strings into a file, as implied by
some, but actual information extracted from the scanners in real time
(including string-positioning information?), while they are scanning
for viruses.  This throws an entirely new light on the claims of
validation and testing that Rosenthal has made here.

Continues Rosenthal:

> Most suppliers are anxious to give prospective buyers a chance to
> try  their products,  and my Virus Simulator 2.0 makes some measure
> of  that  possible.

and adds later:

> Out  of the respect I have for efforts Frisk has made in this
> industry,  and the  strong  desire he announced privately and on
> this public forum  to  not participate  in my experiment, I removed
> his programs from the test...... Understand  that the  reason
> Frisk's  program does not report a much  higher  percentage  of
> discrepancies when used with my Virus Simulator 2.0, is that at his
> request, his program was not included.  Any false alarms (as he
> calls them) are due to the common search strings his programs
> shares with other programs. For Virus Simulator 2.0, I did not run
> my engine with Frisk's program and any viruses.

This explains then why the F-PROT program doesn't produce a higher
percentage of "hits" with the Virus Simulator. Nothing to do with
the number of strings per virus used by F-PROT, or anything like
that.  Rosenthal removed the F-PROT program in view of its author's
negative response to participation in the test.  Again, this throws
an entirely different light on the matter.

In view of these news, it would seem that Rosenthal's Virus Simulator
does indeed have the capability to test virus scanners in a manner
that is compatible with the way they were designed to work. It would
be very interesting if the idea could be carried further, to a still
higher level of simulation.

------------------------------

Date:    Fri, 27 Sep 91 20:28:21 -0700
>From:    [email protected] (Fred Waller)
Subject: Heuristic analysis?

On the subject of "Heuristic Virus Analyzers", I would like to
describe my experience with an interesting program.

"Heuristic analyzers" try to determine whether a program (other
than the analyzer) is a "good" program or a "bad" program (i.e.,
a virus), by looking at patterns of behavior and deciding whether
the program is acting "normally" or "abnormally".

Naturally, someone must make a series of _a priori_ decisions and
tabulate what is "normal" and what is "abnormal". (Of course, the
analyzer starts by defining itself as a "good" program !).  The
task is difficult (some say impossible) because PC viruses may
use the same system functions that innocent programs may use. In
addition, every "ethical" judgement (=good/bad) must perforce
involve the personal bias of the judge.  This is bound to produce
arguments, as has been amply demonstrated here.  Such are some of
the conceptual problems.

As an example of this difficulty, I will describe the action of T.
Matsumoto's data compressor called DIET v1.10a, (c) 1991. Previous
versions of Matsumoto's DIET were compressors somewhat similar to
Bellard's original LZEXE and its clones;  it was able to compress
.EXE files with good efficiency.  But v1.10a of DIET brought
with it some unusual features:

     1. ability to compress both .COM and .EXE formats;
     2. added ability to compress text files;
     3. ability to compress overlay, .HLP and data files.

these capabilities were complemented by DIET's new ability to remain
TSR, monitoring files being called up, to see whether they had been
compressed by itself. (No, it's not a stealth virus).

Like LZEXE and the rest of the executable compressors, DIET v1.10a
adds a special header to its compressed executables. (Virus? Nah.)
In by now standard fashion, this added code produces what I will
term "active decompression": it decompresses the rest of its own
file to memory on execution, like LZEXE. (You may even compress
COMMAND.COM - your system will boot normally).

Compressed data and text files, however, do not acquire such ability
to decompress themselves, and must suffer what I'll call "passive
decompression", i.e., they must be decompressed by DIET before
becoming useable.

DIET marks all `its' files with a coded marker, which it later
uses to recognize them. (Like a virus); as soon as a file has been
processed by DIET, it acquires this unique marker.  You could use
a virus scanner to find every one of them (!).

When TSR, DIET v1.10a has the ability to:

      1. Monitor whether an executable being called up needs to be
         decompressed or is self-extracting; whether it needs a
         .HLP, data or overlay file. (`Are we opening an
          executable...?')

      2. Check file markers to see whether these data file have
          been compressed by DIET. (`Is this one of *my* files?')

      3. If yes, decompress the compressed overlay, etc. file and
         "feed it" to the executable that's being run. (Write to
         disk during a file open..).

      4. Even when the data file does not "belong" to the executable,
         if the running program is, say, a word processor and calls
         up a compressed .LTR file for editing, the TSR DIET will
         decompress the .LTR file, allow its editing, printing, etc.

       5. If the proper command-line options were set, DIET will
          re-compress data files after use - automatically.

       6. Even if you use the DOS TYPE command to view a compressed
          text file, if DIET is resident it will de-compress it
          to allow onscreen viewing, then immediately re-compress.
          Automatically.

       7. On COPYing a compressed file while DIET is a TSR, the file
          gets copied into de-compressed form. (not identical, but
          reminiscent of the action of some furtive viruses...).

The active decompression is performed in memory, but the passive
decompression is done on disk: the executable has to be fed an
already-decompressed file. So DIET has to decompress the .HLP,
overlay, data file, etc. on disk. (Encrypt/decrypt to disk,
like a virus?).

Once the calling program has finished running, any file that was
decompressed may be re-compressed. In this way, overall disk-space
utilization remains low. DIET is a fairly fast compressor and the
passive compression/decompression times are tolerable, though not
unnoticeable. Active decompression is faster.

The overall effect is quite extraordinary: all files on disk, both
executable and data files, stay compressed most of the time. Overall
disk-space savings can be near 40%.  When called up for execution,
program files self-decompress to memory, while data files are
passively decompressed by the TSR.  Automatically.

DIET's compression efficiency is quite good, often better than PKLITE
and comparable to that of conventional compressors.  But to achieve
its good effect, the program must break "good" rules that a heuristic
virus analyzer author might consider sacred:

 -Like many viruses, DIET v1.10a becomes TSR and monitors Interrupts
   (it can also function as a transient program).
 -Like a virus, DIET v1.10a monitors file opens.
 -Like a virus, it checks to see whether the file is or is not
   an executable, and reacts accordingly.
 -Like most viruses, it then test files to see whether they
   contain its `marker'.
 -Like a virus, it writes to disk at seemingly odd times, when
   no write to disk is expected (i.e., during file opens).
 -Like some viruses, it `encrypts/decrypts' = compresses disk data.
 -Like a virus, it reads a file, then automatically rewrites it
   to disk - with a changed size and CRC!
 -Like a virus, it adds an `attachment' (the self-extracting header)
   to every executable it processes.
 -And, like a virus, this attached piece of `strange' code takes
   over control, and executes itself first.

But DIET v1.10a is not a virus.  Instead, it's a brilliantly-
conceived public-domain program that does things no utility has
ever been able to do before. In fact, DIET v1.10a uses stealth-virus
technology for a good, useful purpose in a competent and original
way.

--------------------
P.S. Should DIET v1.10a be a subject for that new science, "computer
     virology"?  Or for "computer filecompressology"?  :-)

------------------------------

Date:    Sat, 28 Sep 91 08:00:49 +0000
>From:    [email protected] (Thomas Wong)
Subject: Re: Azusa Virus & CLEAN question (PC)

[email protected] (Wes Morgan) writes:
>For those who track such things, the Azusa virus was discovered at the
>University of Kentucky today (9.24.91).  The Azusa virus infects the
>boot sector of floppy disks, the partition table of hard disks, and stays
>resident in memory.  It causes corruption of data files, general system
>slowdown, and generally wreaks havoc.

We found it on our grad student's floppies too, here in University of
British Columbia (Vanoucver, B.C., Canada). We found them before they
corrupted any files. It was still dormant in the boot sector.

>McAfee SCAN found it, and McAfee CLEAN removed it.  However, on several
>occasions,  the data on the floppies was unrecoverable.

Unfortunately, CLEAN stated that it wasn't save enough to remove it
from the boot sector and aborted. Since we found this virus on non
bootable floppies, we don't care what CLEAN does to the boot sector.
Is there a way to force CLEAN to erase it regardless? I can't find
this feature in the doc files. Thanks.

Thomas.

------------------------------

Date:    Sat, 28 Sep 91 14:15:52 -0400
>From:    Al Boulley <32DD3BN%[email protected]>
Subject: Re: Belch_Virus? (Mac)

I don't believe that MacPuke.init could be causing this because the
sound occurs only upon ejection of a disk.  Also, this would show up
in a system folder, hidden or not.  Anything else is beyond me.  Al
Boulley

------------------------------

Date:    Sat, 28 Sep 91 04:42:39 +0000
>From:    [email protected] (PIKEY TAM L)
Subject: Hardware Damage?

Hi,

I was wondering if anyone in this group could help me out.  I need
confirmation or denial of the following.  I read somewhere that a few
REALLY RARE virus's can do hardware damage basically by stressing out
the system.  In particuliar burning in monitors or burning out cpu
chips on brand specific motherboards.

If you know where I can find any information on this I would
appreciate email.
                                       Tam Pikey
                                       [email protected]
                                       [email protected]

------------------------------

Date:    Sat, 28 Sep 91 21:09:20 -0400
>From:    padgett%[email protected] (A. Padgett Peterson)
Subject: "Safe" MBR (PC)

       While putting together the second iteration of DiskSecure, the
thought struck me that everybody probably does not need or want full
password and floppy boot protection for their personal systems, but
rather need a simple means of basic protection.

       NoFBoot was the first result of this thought, a simple
resident TSR (uses a whopping 500 bytes, mostly for TSR overhead and
ASCII - comes from growing up with machines having 1 or 2k of main
memory - my Sinclair ZX-81 got one of the first 6116 RAM chips back
when 90 ns access was *fast*).  All it does is to prevent accidental
three finger salute (ctrl-alt-del) reboots with a floppy in drive A.

       Been out over a month now with no reported complaints so either
it is working or no-one else is using it.

       The second piece is now ready for wider testing: SafeMBR. This
is a partition table code replacement. Unlike DiskSecure, it does not
use "stealth" nor does it go resident so the RAM cost is zero (better
yet), but this means it is limited to exception detection only, it
cannot prevent anything. However, immediate knowlege of a viral attack
is not a bad thing.

       The difference between SafeMBR and "normal" MBR code is that
while all a "normal" MBR does is to check for one and only one
"active" partition, load its boot record, and check for the MicroSoft
signature before transferring control, SafeMBR also verifies the BIOS
vector for Interrupt 13 and its own integrity before loading the DOS
boot record. If "something" is wrong e.g. a MBR virus such as STONED
or JOSHI has bitten, it hollers for help.

       Surprisingly, it does not use any more code than many
production MBRs and works with hard disks using everything from DOS
2.0 to 6.0 (in fact it should not be DOS sensitive at all). The major
expansion is in the ASCII and even this ends far short of the Western
Digital "SuperBios" danger area. The partition table area is not
changed at all and my TANDON validating BIOS (plug again - their kind
of work deserves support) likes it just fine.

       In any event, it is available for uuencoded E-Mail for anyone
who would like to try it. Like NoFBoot, it is FREEWARE. All that I ask
is that you let me know if there are any problems.

                                               Padgett

  Disclaimer: Any & all liability is limited to price charged.

------------------------------

Date:    Sun, 29 Sep 91 07:17:00 +0000
>From:    Joe Wells <[email protected]>
Subject: DIR II (Cluster) Virus (PC)

After checking out some copies of the DIR II virus (all of which have
identical code, but are from different sources) I found no indication
that the virus is worth getting extremely worked up about.

It does use a new system of infection. It does not infect files per se
and does not infect the boot sector/partition table. Instead, the
virus (once in memory) writes its code to the last cluster of the disk
and modifies the directory accessed (including sub-dirs) by changing
all of the COM and EXE entries in the following manner:

Note: DOS directories have the following structure:

  Filename   = 8 bytes
  Extention  = 3 bytes
  Attribute  = 1 byte
  Unused     = 10 bytes
  Time       = 2 bytes
  Date       = 2 bytes
  Cluster    = 2 bytes
  File Size  = 4 bytes

and DOS uses the cluster entry to load the program.

The virus changes the cluster entry to point to the virus cluster and
stores the original cluster in the last two bytes of the unused area
listed in the structure above. The original is scrambled by using a
straight forward rotating xor encryption. Once an altered entry is
executed the virus first enters memory and "stealths" the directory
and its own cluster. Viewing the directory with a utility like Norton,
you'd see the original clusters in their original locations and the
last two bytes of the unused area is zeroed out.  Viewing the last
cluster is also redirected.

The virus code begins with the hex string: BC00 06FF 06EB 0431 C98E
D9C5 06C1 0005 2100.

The virus sets up its own INT 21 redirector (the only detectable INT
call is an INT 20), accesses the undocumented DOS list of lists, and
does not infect the system (DOS & BIOS) files even if they have COM
extentions.

The virus doesn't really "crosslink" anything in the FAT. But if you
run CHKDSK with the /f option (and the virus isn't in memory) all your
executables will become 1k files (all pointing to the virus code).

My disassembly has not been completed yet. If I get more info I'll let
you know.  (Thanks to Glenn, Igor, and Dave in expiditing this.)

Joe Wells
Virus Specialist (deprogrammer)
Certus International
216-752-8181

Ciao

------------------------------

Date:    Sun, 29 Sep 91 07:26:00 +0000
>From:    Joe Wells <[email protected]>
Subject: Montreal Virus (PC)

This is a pre-analysis announcement (the sample is "in the mail").

An evidently new virus has been reported in Montreal. The caller/victem
believes he may have gotten the vermin from a BBS (he's checking it out).

The virus evidently infects COM files (appending) only, including Command.com
and contains messages:

Copyright 1991 [NUKE]
Software development.
Sicilian mob, I.A.
Virus by [NUKE] mp.completed.
Montreal.

As soon as there's more (once I get a hold of it) I give more info.

Joe Wells
Virus Specialist (deprogrammer)
Certus International
216-752-8181

Adieu

------------------------------

Date:    Sun, 29 Sep 91 12:15:37 -0300
>From:    00073040%[email protected]
Subject: re: Students and viruses

> VIRUS-L Digest   Friday, 20 Sep 1991    Volume 4 : Issue 168
>
> Today's Topics:
>
> From:    "Jon Womack (Ext. 2-2141)" <[email protected]>
> Subject: re: Students and viruses
>
> [email protected] writes:

etc. etc. etc.

I am involved in teaching a microcomputer applications course at our
university.  Since starting, I have (usually) always included an
introductory section on computer viruses.  Nothing elaborate, however
we do discuss the various types of 'viruses', boot sectors in general
as well as the STONED virus.  I have generally found a great deal of
interest from the students w.r.t. this material.  Such an approach
has, I feel, two immediate advantages, 1) Increasing the level of
knowledge and awareness of students and 2) Increasing the awareness of
responsibility and ethic idealogoy of computer user's and
programmers/designers.  While (realistically), students may not cope
unassisted with virus encounters, they can be provided the knowledge
and awareness to be helpful in the *fight* against viruses.

Brian J. d'Auriol
[email protected]
[email protected]

Standard Disclaimers apply:  These are my own opinions which may (or
may not) coincide with my employer and/or colligues.

------------------------------

Date:    Sun, 29 Sep 91 15:14:58 -0400
>From:    George Svetlichny <[email protected]>
Subject: Again, F-prot, Clean, Joshi and DOS 2.0. (PC)

In relation to my question concerning the problem that I had in
removing a Joshi infection from a Print Shop disk (Virus-l 4/166:
"F-prot, Clean, Joshi and DOS 2.0") Gryaznov Dmitry
([email protected]) writes (Virus-l 4/171):

>It could be just a multiple infection with two slightly different
>versions of JOSHI virus..........................................
>................................................So, original non-virus
>BOOT will be lost and where both of JOSHIs (and anti-virus programs as
>well!) expect it to be in fact resides JOSHI-A. Such a disk becomes
>not bootable - an infinite loop will take place. When JOSHI-B is
>removed by this or that anti-virus JOSHI-A is restored to BOOT sector.
>This is a deadlock - removing JOSHI-A from the BOOT an anti-virus will
>restore it back from where an original BOOT is supposed to be.
>...
>So I think this problem has nothing to do with a version of DOS.

Well, this sounded like such a logical explanation of everything that
had happened in my attempts to remove the virus that I decided to
check it out. Much to my surprise I found that I posessed a utility
that can read the 41st track of a floppy (a shareware program called
DISKED) and upon examininig this track of the floppy that I
disinfected I found, besides the 'Type "Happy Birthday Joshi"' message
that the Joshi virus carries, also the message "Your PC is now
Stoned!, LEGALISE MARIJUANA" which is the message of the Stoned virus.
So my conclusion is that before being infected with Joshi, the disk
was already infected with Stoned. It was probably this that led to the
behaviour described (Both F-prot and Clean reporting successful
removal, yet subsequent scans continuing reporting presence - of the
same virus, Joshi, which is a point I still don't understand). Both of
these viruses have been very prevalent in Rio de Janeiro; Stoned was
already endemic when Joshi arrived.

George Svetlichy                  |
                                 |
Departamento de Matematica        |
Pontificia Universidade Catolica  |
Rio de Janeiro, Brasil            |

------------------------------

Date:    Sun, 29 Sep 91 20:49:00 -0700
>From:    [email protected] (Fred Waller)
Subject: Unencrypted scan strings

Writes [email protected] (David.M.Chess) on the subject of
intentional changes to scanning strings to avoid detection:

> On IBM's scanner having strings in clear:  I have seen at least
> one sample in which two tiny changes were made, one of which was
> in the middle of one of our signatures.   The sample came to us
> very indirectly, though, and it wasn't clear whether it had been
> found in the wild, or prepared specially by someone out to prove
> a point.   We've never seen that particular variant again, so it
>  was probably a "lab specimen".

Precisely as expected. That one specimen, even had it not been
doctored to prove a point, would represent a 1:500 or 1:1000
occurrence  [depending on how one counts his viruses :-)].
This reinforces earlier statements that encrypting search strings
does not work mainly to prevent virus authors from changing their
viruses to avoid detection, but rather is an anti-competitive and
anti-evaluation technique,

It seems obvious: if a virus author wants to change his virus to
avoid detection by some scanner, all he needs to do is rewrite it
very slightly, then reassemble.  Or use a different assembler to
reassemble his old code. The new version so produced will have
enough differences that the old strings will probably no longer
catch it.  They don't need to even guess what the scanning string
was.

But the one thing that encrypting search strings *did* accomplish
very well (until now) was preventing third parties from testing the
scanners.

------------------------------

Date:    Sun, 29 Sep 91 20:50:15 -0700
>From:    [email protected] (Fred Waller)
Subject: Typical incidents

Further writes Dr. Chess ([email protected]):

> The need for verifiers:  If the typical incident involved
> detecting an infected object (program, diskette) before it
> was used (run, booted from), I would tend to agree that
> verifying the exact identity of the virus would be of
> secondary interest (possibly interesting to trace spread,
> but not of vital interest to the user).

I would say that typical incident involves cure rather than
prevention because we allow it to be so.  The public is being
trained to rely on virus scanning as the main prophylactic measure.
They don't realize that while this method will catch infection
after the fact (wins the battle), it hasn't been able to check the
increasing spread of the infectors (looses the war), and demonstrably
encourages the creation of new ones (gives aid, publicity and comfort
to the enemy?).

> Of course, if that were the case  [Detecting a virus before it
> had a chance to run],  viruses would cease to be a problem shortly
> thereafter!

Yes, they most likely would. But no software approach can achieve
such goal because all software uses the same tools for defense that
the enemy uses for attack.  Hardware defenses are needed to put a
stop to viruses.  Software defenses can never do that.  Hardware
defenses cannot be subverted by software.

> As it is, the typical incident involves finding that a system
> is infected, and has been for at least a little while.

I believe this happens because we allow it to be so. We set out to
detect infection after it happens, not to prevent it, so naturally
all incidents we detect are already-occurring infections.

------------------------------

Date:    Sun, 29 Sep 91 20:51:26 -0700
>From:    [email protected] (Fred Waller)
Subject: Hardware vs. software

Writes Dr. Chess:

> Hardware and Software:  Even the ideal combination of hardware
> and software doesn't make viruses completely impossible.  As
> Cohen and others have shown....

We don't have to make viruses `impossible', we only have too
prevent them from infecting our machines. After that, we could
have a worldwide contest of virus writing, and televise the
ceremony! Give prizes, or something. Publish anthologies.

But hardware alone is enough. To illustrate: there's no virus in
the world that can bypass a simple hardware device called a write-
protect tab.  This humble little piece of black paper doesn't care
one bit about Cohen's theories.  Disobeys them every time.  :-)

> Now this may be of only theoretical interest, in
> that such a virus might never actually become a problem
> (spreading too slowly to become pervasive in any real
> environment), but it's worth remembering that *any* search
> for _perfect_ protection is almost certainly doomed, and we
> have to look for "good enough".

This is entirely reasonable and I couln't possibly argue the point.
No scheme can truly be _perfect_ since perfection, as defined by
implication above, may never be achieved.   But I repeat: a humble
paper write-protect tab comes as close to perfection, in this sense,
as anything can. Certainly close enough, and infinitely closer than
any software ever could.  Can we not learn something from this?

------------------------------

Date:    Sun, 29 Sep 91 23:51:00 -0600
>From:    [email protected]
Subject: !!Icelandic Virus (PC)

I have a machine that is infected with !!Icelandic-2*1* Virus.  Has
any one dealt with this before, if so what does the virus do and are
there any software fixes out there.  I would really appreciate it if
those who know more would enlighten me via E-Mail.

Thanks,
G.Searle

------------------------------

Date:    Mon, 30 Sep 91 10:29:00 -0500
>From:    [email protected]
Subject: New virus info, Screen Trasher (PC)

name                Screen Trasher

other names         (none I hope)

family              (under investigation)

first sighting      Sept. 1991

site                Germany

type                file virus, resident

size                appends 1000 bytes


operating system    MS-DOS

version             all versions above 1

computer            PC and all compatibles


direct detection    every hour the screen is overwritten by trash
                   infected files will contain the string
                   '  S E M T E X  by Dusan Toman, CZECHOSLOVAKIA'
                   ' (7)213-040 or (804)212-23  '

type of infection   all *.COM that are executed or opened will be infected
                   provided they are not greater than 61000 bytes
                   COMMAND.COM will also be infected, there is explicit code
                   in the virus that exploits the comspec

trigger of infection load and execute or open of a *.COM file

infection targets   all *.COM file below or equal 61000 bytes

interrupts          INT 08 (hooked)
                   INT 10 (used)
                   INT 21 (used)
                   INT 61 (occupied)

payload             at an hourly intervall the virus will trash the screen
                   contents by writing garbage over it.

trigger of payload  counter that counts the timer tics

peculiarities       this virus does not intercept INT 24, so a write error
                   will occur upon each infection attempt.

                   Windows 3.0 will not like what it does to the memory
                   allocation.

                   INT 61 usage will reder the following products inoperative
                   Atari Portfolio (system management)
                   HP 95LX System (system management)
                   JPI topspeed modula (procedure exit trap)
                   FTP PC/TCP (function calls)
                   Adaptec and Omti controller
                   Banyan Vines (network)
                   Sangoma CCIP (CCPOP3270)

detection           see above

removal             will be possible

analysis            Christoph Fischer
                   Micro-BIT Virus Center
                   University of Karlsruhe
                   Zirkel 2
                   7500 Karlsruhe 1
                   +49 (0)721 37 64 22 phone
                   +49 (0)721 32 55 0  FAX
                   Germany

------------------------------

Date:    Mon, 30 Sep 91 12:46:31 +0000
>From:    Fridrik Skulason <[email protected]>
Subject: Re: Heuristic analysis

In Message 17 Sep 91 23:01:00 GMT, [email protected] (Bob Babcock) writes:

>>>  Frisk's "heuristic virus analyzer"
>>>  is *extremely* prone to false alarms, much more so than his string
>>>  scanner.

I know - this is just why it is released as an *experimental* program -
use it if you want, but don't take it too seriously yet.

>I've written some code which does none of these things, yet it still
>triggers a false alarm.

What does it say ?  There are around 20 different messages you may get.
Also, If you can send me a program which produces a false alarm, I will
do my best to fix my set of rules.

- -frisk (back from vacation)

------------------------------

Date:    Mon, 30 Sep 91 12:51:50 +0000
>From:    Fridrik Skulason <[email protected]>
Subject: Re: When will FPROT 2.00 work with Zenith Dos 3.30.1 (PC)

>When will the fix be out?

In a few days - I just came back from vacation today.

- -frisk

------------------------------

Date:    Mon, 30 Sep 91 13:17:30 +0000
>From:    Fridrik Skulason <[email protected]>
Subject: Re: Theory and practice

> If it did just that I wouldn't have objected.  The "heuristic virus
> analyzer" boldly proclaims: "A BADLY WRITTEN PROGRAM" when it finds
> something that, in its opinion, is not the way it should be.

Well, I assume you mean one of the messages which say "This is .... or
just bad programming".  Maybe I should change the wording a bit, but
keep in mind that this is only an experimental feature of the program.
This particular message may for example be produced if my program
finds code like the following.

      MOV AX,0FFFFH
      MOV CX,1234H
      INT 21H
      CMP CX,2345H
      JE RESIDENT_IN_MEMORY

This is a clear example of "bad programming".  Why ?  It uses an undefined
subfunction of INT 21H to check if it is resident in memory, but INT 21H
is reserved for DOS....although a few other programs, such as Novell Netware
use it as well.

In all other cases when I give the "bad programming" warning it is because
some (formal or informal) rule has been broken.

> > Well, when I tried Mark Washburn's program, it just hung my

Please remember that Mark Washburn is the author of several viruses, and
a virus author who writes anti-virus software is not something I find
ethically acceptable.

- -frisk

------------------------------

Date:    Mon, 30 Sep 91 10:09:00 -0600
>From:    Steven Klepzig <[email protected]>
Subject: Re: Problems running F-PROT 2.0 on 386's (PC)

>26 Sep 91 10:27:57 Fran Holtsberry
>Subject: Problems running F-PROT 2.0 on 386 systems (PC)

>Seems we are having trouble running F-Prot 2.0 on ANY 386 machines.
>Getting a "Cannot read drive C" error.  Anybody else getting this?

Fran,

I haven't seen any problems running F-Prot 2.0 on any of my 386
machines.  I've got VIRSTOP running right now, I've even been able to
load VIRSTOP into high memory using BlueMAX.  Haven't seen any drive
error messages.

Hope this helps.

- -- Steven
========================================
Steven R. Klepzig                      =
University of Utah                     =
135 Student Services Building          = Murphy's Law, v.1.7 "The time it
Salt Lake City, Utah 84112             = takes to pinpoint a LAN problem is
                                      = directly proportional to its
Phone    -- 801-581-3437               = gravity."
FAX      -- 801-585-3034               =
InterNet -- [email protected] =
========================================

------------------------------

Date:    Mon, 30 Sep 91 13:14:00 -0400
>From:    "Ignorance HATES Knowledge..........!!" <[email protected]>
Subject: Re: F-prot 2.00 with 386s (PC)

>Date:    26 Sep 91 10:27:57 +0800
>From:    "Fran Holtsberry" <[email protected]>
>Subject: Problems running F-PROT 2.0 on 386 systems (PC)
>
>Seems we are having trouble running F-Prot 2.0 on ANY 386 machines.
>Getting a "Cannot read drive C" error.  Anybody else getting this?
>
>Fridrik...How about a response?
>
>Fran Holtsberry
>Cal State Chico
>[email protected]

Fran -- et.al. ,

I am currently using F-Prot 2.0 on a Dyna Workmaster 386DX computer. I
have used it with DOS 4.01 (yech) and am now successfully using it
with DOS 5.0. I have had ZERO reports of any problems with this
program from people on campus and the many (about 40) home users in my
area. It even seems to work on various Tandy Computer Models.

I guess that I should also mention that I have experienced no problems
with F-Prot even with StarLan version 3.4 software loaded and/or
running. I have also successfully 'run' the program while still using
the Kermit Program.

I'll be happy to provide assistance if you can provide a bit more
info.  about your environment. I'm sure that Frisk wouldn't mind...
:-)

-Bob-
****************************************************************
Robert C. Martin Jr.
Computer Consultant, Academic Computing Services
Eastern Kentucky University
Richmond, KY 40475-3111
Telephone:  606-622-1995
   BITNET:  ACSMARTIN@EKU or Graphics@EKU

------------------------------

End of VIRUS-L Digest [Volume 4 Issue 177]
******************************************

Downloaded From P-80 International Information Systems 304-744-2253