Re: Virus
Area: Computer Science
Posted By: Tom Kakanowski, Computer Science
Date: Fri Aug 23 12:45:28 1996
Message ID: 840817769.Cs
Summary:
Stealth Virus. Hard disks of infected machines will be
unrecognized if you boot from a clean floppy ("invalid drive
specification."), but will seem to work fine if the virus is
resident from a floppy boot, or if you boot from the infected
hard disk. On August 22 and September 22, the virus displays
the message:
"HDEuthanasia" by Demon Emperor: Hare Krsna, hare, hare...
While the message is displayed on either of these dates, all
hard disks in the machine are being overwritten.
Characteristics:
Krsna infects COM and EXE files, MBRs of hard drives and floppy
boot sectors. Infected files and boot sectors are encrypted
with a slowly changing polymorphic encryption layer. Infected
files are marked by setting the seconds field of the time stamp
to 34. Krnsa will not infect files starting with 'TB' or 'F-'.
When an infected file is run, the virus first infects the MBR
of the hard drive. When the machine is rebooted, the virus will
install itself to memory from the MBR and it starts to infect
also floppy boot sectors during floppy access as well as COM
and EXE files.
When resident, the virus occupies over 9kB of memory. Infected
files will grow around 7600-7800 bytes in size, depending on
the polymorphic decryptor. The polymorphic decryptor contains
several conditional and unconditional jumps and several calls
to do-nothing interrupts to confuse heuristics and emulation.
Polymorphic encryption changes slowly, trying to make it
difficult to create a large sample set with variable
decryptors.
Krsna will attempt to hide itself in files, but it will
sometimes report the infected files to be little bigger or
smaller than they originally were.
Krsna is Windows 95 -aware: it will delete the floppy disk
driver file to make make itself capable of spreading to floppy
disks used from Win95.
Krsna activates when the machine is booted on the 22nd of
August and 22nd of September. At this time it displays this
text:
"HDEuthanasia" by Demon Emperor: Hare Krsna, hare, hare...
After this the virus attempts to overwrite the hard drive and
A: and B: drives. This produces a 'Non-system disk' error, but
the virus stays resident after the destruction is done - so it
can still replicate if a boot floppy is inserted to start up
the machine.
Krsna was found in the wild in USA in May 1996 and it was
apparently distributed over the internet, as infections were
soon found from Canada, UK, Switzerland, Russia and The
Netherlands.
Hare.7750 a variant of Hare.7610, displays the following message:
"HDEuthanasia-v2' by Demon Emperor: Hare Krsna, hare, hare"
This is a newer variant which has some bugs corrected.
Otherwise the virus is like the original variant.
This variant was spread in faked posts in usenet news on 26th
and 29th of June, 1996. Infected files included:
vpro46c.exe in alt.cracks agent99e.exe in alt.cracks agent99e.exe
in alt.crackers lviewc.exe in alt.crackers red_4.exe
in alt.sex pkzip300.exe in alt.comp.shareware
Hare.7786 another variant of Hare.7610, displays the following message:
"HDEuthanasia-v3' by Demon Emperor: Hare Krsna, hare, hare"
In addition to the above message, the payload of Hare.7610
results in an overwrite of the system hard disks. The data
contained on the hard disks is destroyed during this process.
Infection Method:
Multi-partite viruses have two main routes of infection; either
as a Master Boot Record/Boot Sector Virus or as a File
Infecting Virus.
Most infections occur when a computer attempts to boot from an
infected floppy diskette. The boot sector of the diskette has
the code to determine if the diskette is bootable, and to
display the "Non-system disk or disk error" message. It is this
code that harbors the infection. By the time the non-system
disk error message comes up, the infection has occurred.
Once the virus is executed, it will infect the hard drive's MBR
and may become memory resident. With every subsequent boot, the
virus will be loaded into memory and will attempt to infect
floppy diskettes accessed by the machine.
The second route of infection is by receiving an infected file
through a multitude of sources including: floppy diskettes,
downloads through an online service, network, modem
connections, etc. Once the infected file is executed, the virus
may activate.
Removal:
Run McAffee's VirusScan or Dr. Solomon's FindVirus from a
clean, virus-free environment (ie. startup diskette)
Prevention:
Scan all files and diskettes before using them to minimize the
risk of infection.
Virus Information:
Found July, 1996
Origin Europe
Length 7610 Bytes
Type This is a resident stealth multipartite virus
with antiheuristics and antiemulation tricks, encrypted with a
slow polymorphic encryption layer.
Prevalence Common, increasingly widespread. Has been
reported in United States, Canada, the United Kingdom,
Switzerland, Russia.
Author Demon Emperor
Variants Hare.7750
Hare.7786
Aliases Krsna
HDEuthanasia
Current Queue |
Current Queue for Computer Science
|
Computer Science archives
Return to the MadSci Network
MadSci Home | Information |
Search |
Random Knowledge Generator |
MadSci Archives |
Mad Library | MAD Labs |
MAD FAQs |
Ask a ? |
Join Us! |
Help Support MadSci
MadSci Network
© Copyright 1996, Washington University. All rights reserved.
webadmin@www.madsci.org