About
Community
Bad Ideas
Drugs
Ego
Erotica
Fringe
Society
Technology
Viruses
Virus Information
Virus Zines - 40HEX, Crypt, etc.
register | bbs | search | rss | faq | about
meet up | add to del.icio.us | digg it

NCSA Virus Report #35


NOTICE: TO ALL CONCERNED Certain text files and messages contained on this site deal with activities and devices which would be in violation of various Federal, State, and local laws if actually carried out or constructed. The webmasters of this site do not advocate the breaking of any law. Our text files and message bases are for informational purposes only. We recommend that you contact your local law enforcement officials before undertaking any project based upon any information obtained from this or any other web site. We do not guarantee that any of the information contained on this system is correct, workable, or factual. We are not responsible for, nor do we assume any liability for, damages resulting from the use of any information on this site.
???????????????????????????????
? VIRUS REPORT ?
? Cascade-B ?
???????????????????????????????

Synonyms: 1704-B, 1701-B, Blackjack virus

Host Machine: PC compatibles.

Host Files: Remains resident. Infects COM files.

OnScreen Symptoms: There is no cascade display on the screen for this
version. The system will reboot at random intervals after activation.

Increase in Size of Infected Files: 1701 bytes (will infect both PCs and
compatibles) or 1704 bytes (will infect only PC compatibles).

Nature of Damage: Affects system run-time operation. Corrupts program or
overlay files.

Detected by: Scanv56+, F-Prot, IBM Scan, Pro-Scan.

Removed by: M-1704, M-1704C, CleanUp, or F-Prot. You may also follow the
instructions for removing the Jerusalem virus.

Derived from: Cascade.

Scan Code: Uses self-encryption. FA 8B EC E8 00 00 5B 81 EB 31 01 2E F6
87 2A 01 01 74 0F 8D B7 4D 01 BC 85 06 31 34 31 24 46 4C 75 F8. You can
also search at offset 01BH for 31 34 31 24 46 4C 77 F8.

This virus is identical to the Cascade except for these two changes:

* it activates in the fall of any year;

* the cascading display has been replaced with a system re-boot when
the virus activates.

The activation uses the same interrupt 8 randomization algorithm, so
the reboot will occur at a random time interval after executing an
infected program on or after the activation date.

This virus has the ability to infect a file more than once. Cleanup
works well at removing the virus, even from files infected multiple
times (Cleanup will have to be run the same number of times that the file
is infected). Be warned though, if you find a file has been infected more
than once, remove the virus and delete the file, as files infected more
than once will hang your computer. Files infected only once by this virus
seem to run OK after removing the virus.

??????????????????????????????????????????????????????????????????????
? This document was adapted from the book "Computer Viruses", ?
? which is copyright and distributed by the National Computer ?
? Security Association. It contains information compiled from ?
? many sources. To the best of our knowledge, all information ?
? presented here is accurate. ?
? ?
? Please send any updates or corrections to the NCSA, Suite 309, ?
? 4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS ?
? and upload the information: (202) 364-1304. Or call us voice at ?
? (202) 364-8252. This version was produced May 22, 1990. ?
? ?
? The NCSA is a non-profit organization dedicated to improving ?
? computer security. Membership in the association is just $45 per ?
? year. Copies of the book "Computer Viruses", which provides ?
? detailed information on over 145 viruses, can be obtained from ?
? the NCSA. Member price: $44; non-member price: $55. ?
? ?
? The document is copyright © 1990 NCSA. ?
? ?
? This document may be distributed in any format, providing ?
? this message is not removed or altered. ?
??????????????????????????????????????????????????????????????????????
 
To the best of our knowledge, the text on this page may be freely reproduced and distributed.
If you have any questions about this, please check out our Copyright Policy.

 

totse.com certificate signatures
 
 
About | Advertise | Bad Ideas | Community | Contact Us | Copyright Policy | Drugs | Ego | Erotica
FAQ | Fringe | Link to totse.com | Search | Society | Submissions | Technology
Hot Topics
Alternatives Internets to HTTP
Anti-Virus
a way to monitor someones AIM conversation
VERY simple question: browser history
anyone familiar with ms secure?
how do i hide files in to jpeg
FTP Attackers...
cable tv question
 
Sponsored Links
 
Ads presented by the
AdBrite Ad Network

 
www.pigdog.org
 

TSHIRT HELL T-SHIRTS