HappyNewYear 96 & 97 Virus - Amiga Virus Encyclopedia

VIRUS HELP TEAM




--------------------------
Amiga Virus Encyclopedia
HappyNewYear 96 & 97 Virus
--------------------------


-------------------------------------------------------------------------  
     
Entry...............: H.N.Y.96. / H.N.Y 97
Alias(es)...........: Happy_New_Year_96, Happy_New_Year_97
Known clones........: Aram Doll
Virus detected when.: 11/1995
              where.: Austria, Germany, Holland, Poland and USA
Classification......: Link virus, memory-resident, not reset-resident
Length of Virus.....: 1. Length on storage medium:  540 Bytes
                      2. Length in RAM:             540 Bytes

                      Happy New Year97 uses Filepart() instead of
                      LoadSeg infection and the static length 628 bytes.
                      All other commands are 100% equal.

--------------------- Preconditions ------------------------------------

Operating System(s).: AMIGA-DOS
Version/Release.....: 2.04 and above (V37+)
Computer model(s)...: all models/processors (MC68000-MC68060)

--------------------- Attributes ---------------------------------------

Easy Identification.: Text at the end of the first hunk: "Happy_New_Year_96"

Type of infection...: Self-identification method in files: 
                      -  Searches for $65772059 in the first Hunk.

                      Self-identification method in memory:
                      -  Checks for $2f08 in the LoadSeg function

                      System infection: 
                      -  RAM resident, infects the LoadSeg() code of
                         DOS library

                      Infection preconditions:
                      - device has more than 4 free sectors
                      - file is longer than $960 bytes and shorter than
                        $1e460 bytes
                      - Hunk_Code is found in the area behind the HUNK_
                        header (NO CHECK FOR RUNAWAYS!!!)
                      - The filename contains this not a "-" and does
                        not contains ".l". This is probably to be secure
                        no to infect a library.
                      - $4e75 is found at the end of the first CODEHUNK
                        or $4e75 is in the last $3f words of this hunk.


Infection Trigger...: Accessing the volume
                       
Storage media affected: all DOS-devices

Interrupts hooked...: LoadSeg() of DOS will be used for the infection code.
                      The routine is a little bit buggy and trashes the
                      a1 register.

Damage..............: Permanent damage: 
                      - None
                      Transient damage: 
                      - None
           
Damage Trigger......: Permanent damage:
                      - None
                      Transient damage: 
                      - None

Particularities.....: This virus uses no encryption routines to hide it`s
                      code. The LoadSeg() patch isn`t 100% clear and
                      trashes the adress register A1.


Similarities........: Link-method is comparable to the Crime
                      series. End of the first hunk will be the loc.
                      for the virus and the last "RTS" will be replaced.

Stealth.............: no stealth abilities found

Armouring...........: The virus uses only some special adresscommands to
                      confuse the AV people.

Installers..........: DemoManiac 2.19 fake (dop-dm1.dms)
                      DeTag0.63 (detag063.lha)

--------------------- Agents -------------------------------------------

Countermeasures.....: VT 2.79, VW 5.8
Countermeasures successful: all of the above
Standard means......: -

--------------------- Acknowledgement ----------------------------------

Location............: (C) Markus Schmall, Hannover, Germany
Classification by...: Markus Schmall
Documentation by....: Markus Schmall
Date................: November,24. 1995
Information Source..: Reverse engineering of original virus
Copyright...........: Markus Schmall, the VTC Uni Hamburg is allowed to
                      use this document in their libraries. SHI is
                      forbidden to use this document in any form.
===================== End of H.N.Y.96. Virus ============================

Antivirus...........: Kickstart 1.2 & 1.3 : VT-Schutz v3.17
                      Kickstart all others: VirusZ III v1.04B or higher, and also Xvs.library v33.47 or higher
                      

Notes about the known clones:

Aram Doll is a normal linkvirus with 560 byte length. It`s not crypted and
uses the LastAlert pointer of Execbase for the selfrecognition in memory.
The LoadSeg patch differs a little bit.


HEX dump of HappyNewYear 96 virus:


HEX dump of HappyNewYear 97 virus:






Virus Help Team
Denmark & Canada
Copyright © All rights reserved
www.vht.dk