------------------------
Amiga Virus Encyclopedia
FA58B1EF Link Virus
------------------------
- FA58B1EF-LVirus Link
File extension: # 2440 bytes
Bent vectors: LoadSeg, NewLoadSeg
Bent vectors sometimes: BeginIo from scsi.device
Reason for name: see below
KS1.3: no
Memory Integration:
About LoadSeg and NewLoadSeg
The long word $ FA58B1EF (see above) is used to check whether
the part is already active in the memory.
Link to a file:
Medium valid
Executable file (3F3)
File length at least # 30000 bytes
$ 4AFC is not found (e.g. libs)
File not yet contaminated (test with FA58B1EF)
Overflows 3e8-, 3F1-Hunks etc.
The part links as a new 1.Hunk before the original 1.Hunk.
Therefore, the part must also relocate the following hunks.
to change.
VT tries to expand the part and also reloc hunks back
enforce.
VT should find the part in memory and turn it off.
Schaden1:
- Goes through the device list ($ 15e) and often (not
always) the nonsense addq.b # 1 (a0) + off.
Read out with VT List before:
Address Ver Rev NegOff PosOff Pri # OCnt Name Number: 12 Date
$ 0800d514 37 12 36 338 0 1 gameport.device (3.5.91)
$ 0800d6ac 39 4 68 380 0 24 timer.device (7/29/92)
; etc ...
List read with VT after:
Address Ver Rev NegOff PosOff Pri # OCnt Name Number: 6 Date
$ 0900d514 55355535 65535 65535 - 1 5535
$ ffffffff 07523498 26112 63498 0 2288
; etc ...
There is nothing left to save !!!! Carry out a reset.
Or damage2:
- Search for scsi.device and bend from BeginIo
for scsi.device every letter in the virus part is lower in 1
filed, so rbrh-cduhbd. Hence probably the
add bullshit see above , Waiting for a write request.
Read out with VT block beforehand:
0180: 00000000 00000000 00000000 00000000 ................
; ....
01e0: 00000000 00000000 00000000 00000000 ................
Read out with VT block afterwards:
0180: 00000000 00000000 0000ff00 000000ff ................
; .... ^^ ^^
01e0: 00000000 0000ff00 00000000 00000000 ................
^^
Of course, I chose an empty block for the test.
Such a destroyed block cannot be found by VT.
If the block belongs to a file, so is the file
lost.
So it would be reasonable after VT this virus part in
Found memory from a clean antivirus disc
to reboot.
Removal: Kickstart 1.2 & 1.3 : VT-Schutz v3.17
Kickstart all others: VirusZ III, and also Xvs.library must be installed
Original test by Heiner Schneegold
Translated from german to english by Google translate