Esta pagina ha sido traida exclusivamente como una novedad para los navegantes
que recalen en mi pagina.
Ni yo, ni por supuesto Fortunecity, nos hacemos cargo de lo que os pase, o los
da�os que causeis devido a los downloads aqui obtenibles.
Virus abundan, pero con el codigo fuente tan claro y ademas comentado.....
Bueno vosotros sabreis lo que haceis. �Disfrutadlo....SOLOS!
VXN
Department of Viric Resources
University of Oviedo U.C.G.
University Computing Group
|
 |
Android
|
Author: |
Vecna/29A
|
|
Origin: |
Brazil
|
|
Native of: |
DOS platform
|
|
Objects: |
MBR, boot sectors
|
|
Residency: |
int 13h
|
|
Behavior: |
this virus uses VRBL, the first polymorphic engine specifically
designed for boot viruses, written by Vecna. It installs itself
in 0/0/3 in hard drives and in 0/1/13 in floppies, thus forcing
AVs to change their boot virus detection algorithms as nowadays
no AV product scans other sector than 0/0/1.
| |
|
 |
AntiCARO
|
Author: |
Mister Sandman/29A
|
|
Origin: |
Spain
|
|
Native of: |
DOS platform
|
|
Objects: |
COM files
|
|
Residency: |
int 21h
|
|
Behavior: |
it is a joke virus to protest against the way Vesselin Bontchev
and CARO in general name viruses. It modifies AVP by using some
undocumented tricks so this AV will detect VLAD's Bizatch virus
as "Bizatch_:P", and not as Boza.
| |
|
 |
Anti-ETA
|
Author: |
GriYo/29A
|
|
Origin: |
Spain
|
|
Native of: |
DOS platform
|
|
Objects: |
COM, EXE files
|
|
Residency: |
int 3, int 21h, int 22h, int 28h
|
|
Behavior: |
it is a polymorphic retro virus with lots of technical features
such as its residency method. The Anti-ETA virus was written in
order to protest against the independentist group ETA and their
killings and kidnaps. The virus activates every july 10th (date
in which Miguel Angel Blanco was kidnapped) by printing a white
hand in the screen in which reads "Anti-ETA".
| |
|
 |
Apocalyptic
|
Author: |
Wintermute/29A
|
|
Origin: |
Spain
|
|
Native of: |
DOS platform
|
|
Objects: |
COM, EXE files
|
|
Residency: |
int 3, int 21h
|
|
Behavior: |
it is a stealth COM and EXE infector which disables TbDriver on
every execution and skips F-Prot's stealth detection engine. It
has a payload which activates every july 26th by showing a fake
filesize (29Ah) for all the files in the hard disk.
| |
|
 |
AVP-Aids
|
Author: |
Tcp/29A
|
|
Origin: |
Spain
|
|
Native of: |
DOS platform
|
|
Objects: |
COM files
|
|
Residency: |
n/a
|
|
Behavior: |
this virus is an attempt to prove the capabilities to write and
spread viruses using the APIs provided by AVPRO. It will insert
a new viral database into AVP. This database forces then AVP to
delete TbScan, Scan and F-Prot when being scanned, apart of not
making possible to detect any virus, favoring the appearance of
opportunist infections of other viruses.
| |
|
 |
Cabanas
|
Author: |
Jacky Qwerty/29A
|
|
Origin: |
Peru
|
|
Native of: |
Win32 platforms
|
|
Objects: |
PE files
|
|
Residency: |
per process
|
|
Behavior: |
it's a very complex resident antidebugging retro Win32 infector
which tries to hit every file when accessed by performing a per
process API hooking, including GetProcAddress. Besides, Cabanas
also uses direct action infection. The disinfection of infected
files is almost impossible as well as its debugging under TD32.
Cabanas is, undoubtly, the best Win32 PE infector so far.
| |
|
 |
CAP
|
Author: |
Jacky Qwerty/29A
|
|
Origin: |
Peru
|
|
Native of: |
WinWord platform
|
|
Objects: |
DOC, RTF files
|
|
Residency: |
n/a
|
|
Behavior: |
this is a macro virus which overcomes two of the most important
obstacles for the spreading of this kind of viruses. First it's
able to work under any version of Word without depending on the
language it uses. And second it avoids the "FileSaveAs" problem
and is able to be saved to any path or drive. CAP, dedicated to
Carlos Andres Perez (the president of Venezuela), ranks the 1st
position nowadays as the most widespread virus in the world.
| |
|
 |
Cri-Cri
|
Author: |
GriYo/29A
|
|
Origin: |
Spain
|
|
Native of: |
DOS platform
|
|
Objects: |
COM, EXE, MBR, boot
|
|
Residency: |
int 3, int 13h, int 21h
|
|
Behavior: |
Cri-Cri is a full-stealth polymorphic multipartite infector. It
will not infect files either having the current date or any "V"
in their names, as well as some AV executables. It activates on
june 4th by displaying a message on the screen.
| |
|
 |
Galicia Kalidade
|
Author: |
Leugim San
|
|
Origin: |
Spain
|
|
Native of: |
WinWord platform
|
|
Objects: |
DOC files
|
|
Residency: |
n/a
|
|
Behavior: |
it is an encrypted macro infector which hits documents whenever
they are closed. Its payload consists on deleting MSDOS.SYS and
IO.SYS when the string "dir a:" is found in any DOC. This virus
was the tiniest one in its class for a long time.
| |
|
 |
GoLLuM
|
Author: |
GriYo/29A
|
|
Origin: |
Spain
|
|
Native of: |
DOS, Win 3.1x and Win95 platforms
|
|
Objects: |
EXE files
|
|
Residency: |
V86 int 21h (VxD)
|
|
Behavior: |
this virus is the pioneer in its class, the class of the hybrid
DOS/Win infectors. When an infected file is run, it will modify
the SYSTEM.INI file in order to be loaded every time Windows is
executed. When Windows is loaded again, Gollum will go resident
by means of its VxD module, and then it will try to infect EXEs
which are run in DOS windows.
| |
|
 |
Internal Overlay
|
Author: |
Tcp/29A
|
|
Origin: |
Spain
|
|
Native of: |
DOS platform
|
|
Objects: |
COM files
|
|
Residency: |
int 21h
|
|
Behavior: |
this virus infects COM and EXE files without any need to modify
their header, thus bypassing lots of CRC checking programs. The
virus does this by appending an internal overlay to the file it
infects and writing an overlay loader at the entry point. It is
able, then, to infect EXEs which contain internal overlays.
| |
|
 |
Jacky
|
Author: |
Jacky Qwerty/29A
|
|
Origin: |
Peru
|
|
Native of: |
Win32 platforms
|
|
Objects: |
PE files
|
|
Residency: |
n/a
|
|
Behavior: |
Jacky is world's first Win32 (Win32s/Win95/WinNT) virus, albeit
it is not considered as so for most of the media, as they think
Cabanas (written by the same author some months later) is. This
virus (Jacky) however, is less complex and complete. It is a PE
direct action infector, which uses the so called "29A infection
technique for Win32", consisting on not assuming any hard-coded
value for both KERNEL32 and their APIs.
| |
|
 |
Lizard
|
Author: |
Reptile/29A
|
|
Origin: |
Canada
|
|
Native of: |
DOS, Win95 platforms
|
|
Objects: |
EXE files
|
|
Residency: |
V86 int 21h (VxD)
|
|
Behavior: |
it is a hybrid DOS/Win runtime EXE infector which goes resident
under Windows95 by means of its VxD module, which is dropped in
the \IOSUBSYS directory, thus being loaded on every boot of Win
and not being necessary to modify SYSTEM.INI. When a DOS window
is open it will intercept some functions of int 21h in order to
hit as many EXEs as possible. It is 1967 bytes only.
| |
|
 |
Orgasmatron
|
Author: |
Vecna/29A
|
|
Origin: |
Brazil
|
|
Native of: |
DOS platform
|
|
Objects: |
boot sectors
|
|
Residency: |
int 1, int 8
|
|
Behavior: |
this is world's first boot virus which uses 386+ PMODE features
and which does not hook int 13h in order to infect. Orgasmatron
first checks for a 386+ processor by means of int 6, and if all
is ok it will hook int 8 (in order to keep int 1 untouched) and
int 1, which will receive the control whenever it's called from
the DR3 debug breakpoint in order to infect boot sectors.
| |
|
 |
Prion
|
Author: |
Darkman/29A
|
|
Origin: |
Denmark
|
|
Native of: |
Win 3.1x platforms
|
|
Objects: |
NewEXE, DLL files
|
|
Residency: |
n/a
|
|
Behavior: |
it is a direct action NewEXE and DLL cavity infector. When it's
executed it looks in their victims for an area of its size (313
bytes) of constant data and then overwrites it with its code.
| |
|
 |
RedCode
|
Author: |
Wintermute/29A
|
|
Origin: |
Spain
|
|
Native of: |
DOS platform
|
|
Objects: |
COM files
|
|
Residency: |
int 21h
|
|
Behavior: |
it is a payload-based TSR COM infector. Its payload consists on
representing a fight between two CoreWar (the game A.K. Dewdney
invented in 1984) warriors in a RedCode arena. The warriors are
two persons Wintermute does not go along with.
| |
|
 |
SuckSexee (v4.0)
|
Author: |
GriYo/29A
|
|
Origin: |
Spain
|
|
Native of: |
DOS platform
|
|
Objects: |
COM, EXE, SYS, MBR, boot
|
|
Residency: |
int 12h, int 13h, int 1ch, int 21h, int 40h (UMB)
|
|
Behavior: |
SuckSexee, named "Implant" by CARO, is a polymorphic, retro and
full-stealth multipartite COM, EXE, SYS, MBR and boot infector,
and is one of the most widespread viruses nowadays in the world
according to the last "top tens". SuckSexee uses different poly
engines, depending on the file format it is about to infect (it
is different for COM/EXE, SYS and MBR/boot). It deletes lots of
AV files and bypasses most of the current heuristic engines. It
contains a payload which activates every june 4th by displaying
a message on the screen.
| |
|
 |
TheBugger
|
Author: |
The Slug
|
|
Origin: |
Spain
|
|
Native of: |
DOS platform
|
|
Objects: |
COM files
|
|
Residency: |
int 1, int 3, int 21h, int 0cdh
|
|
Behavior: |
this is a TSR COM infector whose main particularity consists on
the fact that it traces every file it infects and looks for any
"call" instruction in it. Depending on a random counter between
2 and 5 it chooses one of those "call" instructions in order to
modify it and make it point to the viral code start. It uses as
well a trick to avoid being deceived by resident programs which
just return the virus residency value. If such a try to fool it
is detected, the virus payload will activate. This payload just
makes the user think his HD is being formatted.
| |
|
 |
Torero
|
Author: |
Mister Sandman/29A
|
|
Origin: |
Spain
|
|
Native of: |
DOS platform
|
|
Objects: |
COM files
|
|
Residency: |
int 13h, int 21h
|
|
Behavior: |
Torero is a pretty curious TSR COM infector which doesn't store
the original header of the files it infects in its code, but in
the three first bytes of a reserved area of the directory entry
of infected files, thus making its removal much more difficult.
The virus uses as well another interesting feature, as it marks
infected files by switching on the unused eighth attribute bit.
| |
|
 |
Zohra
|
Author: |
Wintermute/29A
|
|
Origin: |
Spain
|
|
Native of: |
DOS platform
|
|
Objects: |
COM, EXE files
|
|
Residency: |
int 21h
|
|
Behavior: |
it is a double-encrypted polymorphic retro COM and EXE infector
which hooks int 21h in order to become resident by means of the
technique which consists on reducing the last MCB segment. This
virus uses UUencode encryption for its first layer and poly NME
(Necromantic Mutation Engine) for the second one. Zohra uses as
well another own engine, "The Tourniquet Kode Analyzer", to get
int 21h tunneled. Its payload activates on april 14th (the date
of the 2nd spanish republic) by displaying a video effect.
| |
|
Site supported by FORTUNECITY
|