========================================================================
==                Computer Virus Catalog (Version 1.2)                ==
========================================================================
==        Status:      October 31, 1989                               ==
==        Classified: 15 MSDOS-Viruses (MSDOSVIR.A89)                 ==
==                    24 AMIGA-Viruses (AMIGAVIR.A89)                 ==
==                     6 Atari-Viruses (ATARIVIR.A89: this document)  ==
========================================================================
= This document contains the classifications of the following viruses: =
==             1) Anthrax = Milzbrand Virus                          =+=
==             2) c't Virus                                           ==
==             3) Emil 1A Virus = "Virus 1A"                          == 
==             4) Emil 2A Virus = "Virus 2A" = mad Virus              ==
==             5) Mouse (Inverter) Virus                             =U=
==             6) Zimmermann-Virus                                    ==
========================================================================
== Remark: updates or additions sind  last edition (July 31st, 1989)  ==
== are marked =U= or =+= in column 72. We have problems to get        ==
== viruses, since many users wish to exchange their viruses (like     ==
== stamps) against our's, which we principally refuse: the Virus Test ==
== Center's ethical standard is, that we do not spread viruses!       ==
========================================================================
======================================================================== 
== The Computer Virus Catalog may be copied free of charges provided  ==
== that the source is properly mentioned at any time and location     ==
== of reference.                                                      ==
==                                                                    ==
==  Editor:   Virus Test Center, Faculty for Informatics              ==
==            University of Hamburg                                   ==
==            Schlueterstr. 70,  D2000 Hamburg 13, FR Germany         ==
==            Prof. Dr. Klaus Brunnstein, Simone Fischer-Huebner      ==
==            Tel: (040) 4123-4158 (KB), -4715 (SFH), -4162(Secr.)    ==
==  Email (EAN/BITNET): Brunnstein@RZ.Informatik.Uni-Hamburg.dbp.de   ==
======================================================================== 
==  Critical and constructive comments as well as additions are       ==
==  appreciated. Especially, descriptions of recently detected viruses =
==  will be of general interest. To receive the Virus Catalog Format, == 
==  please contact the above address.                                 ==
========================================================================
== Computer Virus Catalog 1.2: Milzbrand=Anthrax Virus (Nov.9, 1989) ===
Entry...............: Milzbrand Virus
Alias(es)...........: Anthrax
Virus Strain........: ---
Virus detected when.: April 1987
              where.: C'T (a german computermagazin)
Classification......: Program Virus (Extending V.)
Length of Virus.....: 1222 Bytes 
--------------------- Preconditions -----------------------------------
Operating System(s).: ATARI-TOS
Version/Release.....: All Versions of ATARI TOS 
Computer model(s)...: All Atari ST models
--------------------- Attributes -------------------------------------
Wasy Identification.: if killing the FAT it shows six 'Viruses' on screen
                      the Virus body (readable with HexDump-facilities)
                      include the text : 'DIES IST EIN VIRUS'
                                         (=`This is a Virus')
Type of infection...: Executable File infection(.PRG) extending
Infection Trigger...: all programs>1000 Bytes
Storage media affected: Infects programs on disks and hard disks 
                        (in the actuell path)
Interrupts hooked...: ---
Damage..............: overwriting bootblock and FAT on disks A and B
Damage Trigger......: year=1987
Particularities.....: shows six 'Viruses' on screen
Similarities........: ---
--------------------- Agents ------------------------------------------
Countermeasures.....: Category 1.1 Monitoring Files: program which
                                   monitors (attempted) changes of
                                   files
                      Category 2: Alteration Detection: a program which
                                  detects changes of given files
                      Category 3: Eradication: a program which erases
                                  specific virus code from files
Countermeasures successful: --- 
Standard means......: Write protect the disk
--------------------- Acknowledgement ---------------------------------
Location............: Virus Test Center, University Hamburg, FRG
Classification by...: ---
Documentation by....: Ralf Stegen
Date................: Nov.9 1989
Information Source..: C'T April 1987
===================== End of MILZBRAND Virus ==========================
===== Computer Virus Catalog 1.2: c't-Virus (July 30, 1989) ============
Entry...............: c't Virus 
Alias(es)...........: ---  
Virus Strain........: ---
Virus detected when.: ---
              where.: ---
Classification......: System (=BootSector) Virus, Reset-resident.
Length of Virus.....: 512 Byte
--------------------- Preconditions ------------------------------------
Operating System(s).: ATARI-TOS
Version/Release.....: 1.0 (06.02.86), 1.2 (TOS 1.4 not tested)
Computer model(s)...: All types of the Atari ST Series
--------------------- Attributes ---------------------------------------
Identification......: ---
Type of infection...: The virus tests two longwords near the top of the
                      available memory at locations (memtop)-$200 and
                      (memtop)-$200+$A.
                      The first longword is checked for $12123456, the
                      second one for $07A31CDF. If one of these doesnot
                      match, the virus is installed.
                      The virus is reset-resident.
                      1st: Virus is copied to a new location in memory;
                      2nd: Virus's age is increased by 1.
Infection Trigger...: Each time a diskette is changed, the new one
                      will be infected.
Storage media affected: Infects only diskettes. Damages Hard disks.
Interrupts hooked...: No interupts used.hdv_bpb and hdv_mediach vectors 
                      are changed for installation in the system.
Damage..............: Transient/Permanent damage:
                      A damage can occur only if a harddisk is connected 
                      to the system. Because of an error in the virus, 
                      the partition information will be destroyed, if 
                      the virus tries to write to the harddisk.
                      Otherwise, the following message is displayed on 
                      the screen after every 20th infection:
                      "ARRRGGGHHH Diskvirus hat wieder zugeschlagen" 
Damage Trigger......: Value of infection counter: every 20th infection.
Particularities.....: ---
Similarities........: ---
--------------------- Agents -------------------------------------------
Countermeasures.....: Programs that calculate the checksum and change 
                      it, if it is $1234; the sector is then regarded as 
                      not executable. (Category 1.3)
Countermeasures successful: ---
Standard means......: Write-protect the disk. Write a well-known program
                      to the boot sector; 'manually' change the check-
                      sum to a value other than $1234 .
--------------------- Acknowledgement ----------------------------------
Location............: Virus Test Center, University Hamburg, FRG
Classification by...: 
Documentation by....: Michael Gaudlitz          
Translated by.......: Bert K④hler  
Date................: July 30, 1989
Information Source..: c't (Computer Magazine)                              
===================== End of c't Virus =================================
===== Computer Virus Catalog 1.2: Emil 1A Virus (July 30, 1989) ========
Entry...............: Emil 1A Virus  
Alias(es)...........: "Virus 1A"
Virus Strain........: ---
Virus detected when.: 1987? 
              where.: FR Germany
Classification......: System (Boot Sector) Virus
Length of Virus.....: 512 Byte
--------------------- Preconditions ------------------------------------
Operating System(s).: Atari-TOS
Version/Release.....: 1.0, 1.2 (1.4 not tested)
Computer model(s)...: All types of the Atari ST Series
--------------------- Attributes ---------------------------------------
Easy Identification.: Boot sector will not be infected, if first word 
                      is $6038.
Type of infection...: Infects the boot sector of the disk, if it is
                      regarded as not infected.
Infection Trigger...: Each time a floppy disk is changed, the new 
                      disk will be infected.
Storage media affected: Floppy disks.
Interrupts hooked...: No interrupts used; diskvector hdv_bpb changed.
Damage..............: Infects the boot sector of the disk, if it is 
                      regarded to be non-infected.
                      If the memory resident virus finds a fitting 
                      key on a boot sector (first longword = $60381092),
                      then that sector is loaded and executed, regard-
                      less of the checksum. (Normally, the checksum
                      should be $1234 to indicate that this boot sector
                      is executable).
Damage Trigger......: Keyword ($60381092) in other Boot sectors. 
Particularities.....: ---
Similarities........: See Emil 2A Virus.
--------------------- Agents -------------------------------------------
Countermeasures.....: Programs that calculate the checksum and 
                      change it, if it is $1234; then, the sector  
                      is regarded as not executable. The suspicious 
                      (dangerous) second part of the virus might 
                      not be recognized because it does not need
                      to have the proper checksum (see: Damage).
Countermeasures successful: --- 
Standard means......: Write protect the disk.
                      Write a well-known program to the boot sector;
                      'manually' change the checksum to a value other 
                      than $1234 .
--------------------- Acknowledgement ----------------------------------
Location............: Virus Test Center, University Hamburg, FRG
Classification by...: Thomas Piehl/ Michael Nagel
Documentation by....: Bert K④hler
Translated by.......: Bert K④hler/Paul Drake (Racal-Milgo/TEMEX)/
Date................: July 30, 1989
Information Source..: ---
===================== End of Emil 1A Virus =============================
===== Computer Virus Catalog 1.2: Emil 2A Virus (July 30, 1989) ========
Entry...............: Emil 2A Virus  
Alias(es)...........: "Virus 2A" = mad Virus
Virus Strain........: ---
Virus detected when.: 1987?
              where.: FR Germany
Classification......: System (Boot Sector) Virus
Length of Virus.....: 512 Byte
--------------------- Preconditions ------------------------------------
Operating System(s).: ATARI-TOS
Version/Release.....: 1.0, 1.2 (TOS 1.4 not tested)
Computer model(s)...: All ATARI ST Computer models
--------------------- Attributes ---------------------------------------
Easy Identification.. First byte in infected boot sector is $60.
Type of infection.... Infects the boot sector of a disk, if it is 
                      regarded as not yet infected (value other than
                      $60 in first byte) and increments a variable.
Infection Trigger...: Every access to non-infected floppy disk.
Storage media affected: Floppy disks.
Interrupts hooked...: No Interrupts used;
                      hdv_rw vector changed to infect new disks.
Damage............... Permanent Damage: overwrites Boot sectors.
                      Transient damage: After each 5th infection, the 
                      screen is randomly shifted (upside down) or
                      inverted, together with a beep.
Damage Trigger......: Random.
Particularities.....: Evidently, this is a "Demo Virus"; but it may 
                      easily be changed to a dangerous one with only 
                      moderate programming experiences.
Similarities........: See Emil 1A Virus.
--------------------- Agents -------------------------------------------
Countermeasures.....: Programs that calculate the checksum and change 
                      it, if it is $1234; then, the sector is regarded 
                      as not executable.
Countermeasures successful: --- 
Standard means......: Write protect the disk.
                      Write a well-known program to the boot sector;
                      'manually' change the checksum to a value other 
                      than $1234.
                      Reboot the system with a 'clean' disk.
--------------------- Acknowledgement ----------------------------------
Location............: Virus Test Center, University Hamburg, FRG
Classification by...: Ralf Stegen
Documentation by....: Ralf Stegen
Translation by......: Bert K④hler
Date................: July 30, 1989
Information Source..: ---
===================== End of Emil 2A Virus =============================
== Computer Virus Catalog 1.2: Mouse (Inverter) Virus (Nov.11 1989) ==
Entry...............: Mouse (Inverter) Virus
Alias(es)...........: Ghost 
Virus Strain........: ---
Virus detected when.: ---
              where.: ---
Classification......: System (BootSector) Virus, Reset-resident, 
                      Overwriting
Length of Virus.....: 512 Byte
--------------------- Preconditions -----------------------------------
Operating System(s).: ATARI-TOS 
Version/Release.....: All Version of TOS
Computer model(s)...: All types of the Atari ST Series
--------------------- Attributes -------------------------------------
Easy Identification.: ---
Type of infection...: Self-Identification: The Virus tests adresse $140
                      for the first Virus instruction; virus installs
                      itself reset- and RAMresident if virus code does
                      not match.
Infection Trigger...: Each time a new diskette is inserted, the virus 
                      will infect the new diskette.
Storage media affected: The virus infect drive A,B!
Interrupts hooked...: No Interrupts used.
                      Resetvector for installation changed.
                      hdv_bpb changed to infect Bootsector of new Disk.
Damage..............: Permanent Damage: Overwriting Bootsectors.
                      Transient Damage: Inverting Mouse Up-Down Moving-
                                        direction.
Damage Trigger......: Damage Action after 10 infections. Always after     
                      5 new infections,the Mouse Movingdirection is 
                      again inverted.
Particularities.....: ---
Similarities........: ---
--------------------- Agents ------------------------------------------
Countermeasures.....: Programm that checks hdv_bpb-, Reset-vector if 
                      adresse is not lower $400(Exception vectors)
                      (Category 1.2).
                      Programs that calculate the checksum and change 
                      it, if it is $1234; the sector is then regarded
                      as not executable. Reboot the system with a
                      'clean' disk! ( Category 1.3 ).
Countermeasures successful: Poke instruction 'move.l #$D6,d3' to 
                      adresse $140 (this excludes Virus' installation).
Standard means......: Write-protect the disk. 
                      Write a well-known program to the boot sector;
                      'manually' change the checksum to a value other 
                      than $1234.
--------------------- Acknowledgement ---------------------------------
Location............: Virus Test Center, University Hamburg, FRG
Classification by...: Thomas Piehl  
Documentation by....: Thomas Piehl             
Date................: Nov. 11,1989
Information Source..: ---
===================== End of Mouse (Inverter) Virus ====================
===== Computer Virus Catalog 1.2: Zimmermann-Virus (July 30, 1989) =====
Entry...............: Zimmermann-Virus  
Alias(es)...........: ---
Virus Strain........: ---
Virus detected when.: 1988?
              where.: FR Germany
Classification......: Program Virus (Extending V.)
Length of Virus.....: 1414 Byte
--------------------- Preconditions ------------------------------------
Operating System(s).: ATARI-TOS
Version/Release.....: All versions
Computer model(s)...: All types of the Atari ST Series             
--------------------- Attributes ---------------------------------------
Easy Identification.: Infected System: The virus checks if the Trap 1-
                      vector points to a certain byte-sequence. Infected
                      programs are recognized by enlargement of the file
                      length and by typical virus specific code.
Type of infection...: Program virus: the virus code is appended at the
                      end of the program; the loader table is adjusted.
Infection Trigger...: Every time when a program is executed.
Storage media affected: Floppy disks only.
Interupts hooked....: VBL-Interupt for time control.
                      Trap #1 to control program start. 
Damage..............: Permanent Damage: the virus only infects files 
                      with extensions PRG, TTP and TOS in the current 
                      directory on drives A and B. The program's 
                      startup-time is considerably increased.
Damage Trigger......: ---
Particularities.....: After installation in the system, the virus is
                      distributed every time a program is started from 
                      disk A or B. Approximately 30 minutes after the 
                      installation, the virus generates a file, 50 bytes
                      long, with an unusual name consisting of special 
                      characters: "@^#%&   .(-: ".  The file is read-
                      only and contains the following text:
                      ";-) As MAD Zimmermann will be watching you )-;"
                      The characters at the ends of the line can be 
                      regarded as a happy face on the left and a sad 
                      face on the right side; probably kind of ASCII-
                      comic with political background: F.Zimmermann is 
                      a well-known conservative politician in FRG, and
                      a strong opponent of privacy and data protection; 
                      as former minister of Interior, he was responsible
                      for several intelligence agencies, though not for 
                      the German military intelligence service "MAD".
Similarities........: ---
--------------------- Agents -------------------------------------------
Countermeasures.....: The virus can be detected in and removed from  
                      infected files by 'Zimmermann Virusfilter 
                      Program', written by Thomas Piehl (see below).
Countermeasures successful: 4DETECT detects the Zimmermann-Virus, if you 
                      set 'System Supervision' to 'On'; 4DETECT then
                      tells when the trap #1 vector is changed. 
                      4DETECT also supervises suspicious write accesses
                      to boot sectors and program files.
Standard means......: Write-protect the disk.
--------------------- Acknowledgement ----------------------------------
Location............: Virus Test Center, University Hamburg, FRG
Classification by...: Thomas Piehl           
Documentation by....: Thomas Piehl
Translated by.......: Bert K④hler
Date................: July 30, 1989
Information Source..: ---
===================== End of Zimmermann-Virus ==========================
========================================================================
==                  End of ATARIVIR.789 document                      ==
==              (375 Lines, 2.045 Words, 21k Bytes)                   ==
========================================================================