Jeff Butonic v3.00 Virus - Amiga Virus Encyclopedia


Amiga Virus Encyclopedia
Jeff Butonic v3.00 Virus 

== Computer Virus Catalog 1.2: JEFF BUTONIC 3.0 Virus (10-Feb-1991) ==
Entry...............: JEFF BUTONIC 3.0 Virus
Alias(es)...........: ---
Virus Strain........: ---
Virus detected when.: ---
              where.: North Germany
Classification......: link virus (directory type), resident
Length of Virus.....: 1. length on storage medium: 2916 byte
                      2. length in RAM           : 2876 byte
--------------------- Preconditions ----------------------------------
Operating System(s).: AMIGA-DOS
Version/Release.....: 1.2/33.166, 1.2/33.180, 1.3/34.5
Computer model(s)...: AMIGA 500, AMIGA 1000, AMIGA 2000A, AMIGA 2000B
--------------------- Attributes -------------------------------------
Easy Identification.: typical text: ---
                      identification by the following entry (invisible
                         in ASCII editors) in startup-sequence as 1st
                         entry: "$A0,$A0,$A0,$20,$9B,$41";
                      identification using a disk manager: a file
                         $A0,$A0,$A0 (invisible) exists in root
                         directory, with length=2916 byte;
                      identification by text in memory: "Hi. Jeff's
                         speaking here... (w) by the genious BUTONIC...
                         V3.00/9.2.89 - Gen.0026 Greetings to
                         *Hackmack*,*Atlantic*, & Alex,Frank,Wolfram,
                         Gerlach,Miguel,Klaus,Snoopy-Data!"; this
                         text is displayed as alert message after
                         destruction of a disk structure;
                      identification by transient damage: window
                         titles are changed to following ones: "Ich
                         Brauch jetzt Alk!", "Bitte keinen Wodka!",
                         "Mehr Buszyklen fuer den Prozessor", "Paula
                         meint, Agnus sei zu dick"
Type of infection...: self-identification method: virus searches for
                         the following entry in startup-sequence:
                         $A0,$A0,$A0,$A0,$9B,$41 (invisible in ASCII
                      system infection: RAM resident, reset resident
Infection Trigger...: using unprotected disk-like devices
Storage media affected: all bootable and disk-like devices
Interrupts hooked...: ---
Damage..............: permanent damage: destroys directory structure;
                      transient damage: manipulation of window titles;
                         alert message after destroying the structure
                         of a bootable device
Damage Trigger......: permanent damage: (to be analysed)
                      transient damage: (to be analysed)
Particularities.....: DoIO vector and KickTag pointer are misused
Similarities........: author of this virus evidently knows BGS virus
--------------------- Agents -----------------------------------------
Countermeasures.....: Names of tested products of Category 1-6:
                      Category 1: .2 Monitoring System Vectors:
                                     CHECKVECTORS 2.3, VT 1.94
                                  .3 Monitoring System Areas:
                                     CHECKVECTORS 2.3, GUARDIAN 1.2,
                                     VIRUS-DETEKTOR 1.1, VT 1.94
                      Category 2: Alteration Detection: ---
                      Category 3: Eradication: CHECKVECTORS 2.3,
                                  BGS9-PROTECTOR, VIRUS-DETEKTOR 1.1
                      Category 4: Vaccine: BGS9-PROTECTOR
                      Category 5: Hardware Methods: ---
                      Category 6: Cryptographic Methods: ---
Countermeasures successful: CHECKVECTORS 2.3, VT 1.94
Standard means......: CHECKVECTORS 2.3 or VT 1.94 with deletion of
                      "no name" file entry (see above) with a disk
                      manager and correction of the startup-sequence
--------------------- Acknowledgement --------------------------------
Location............: Virus Test Center, University Hamburg, Germany
Classification by...: Alfred Manthey Rojas
Documentation by....: Alfred Manthey Rojas
Date................: 10-February-1991
Information Source..: ---
======================================== End of JEFF BUTONIC 3.0 Virus =================================

 Antivirus removal..: Kickstart 1.2 & 1.3 : VT-Schutz v3.17
                      Kickstart all others: VirusZ III with Xvs.library installed

Screenshot of JEFF BUTONIC 3.0 Virus:

Virum Help Team
Denmark & Canada
Copyright © All rights reserved