... as
STEALTH.COM. The program disk has PUT programs for other
formats, or you can modify PUT_360 to do it.
151 The Little Black Book of Computer Viruses
Appendix F: The HEX File Loader
The following ... call IS_HARD_THERE ;see if a hard disk exists here
jz DONE ;no hard disk, all done booting
1 49 The Little Black Book of Computer Viruses
mov ax,07FF7H
stosw...
... Found
Yes
No
34 The Little Black Book of Computer Viruses
cx:dx is used as the offset from the end of the file. Since the first
thing the virus must do is place its code at the end of the COM file
it ... [HANDLE]
44 The Little Black Book of Computer Viruses
Now, with the main body of viral code appended to the end
of the COM file under a...
... sort? Per-
haps they are the electronic analog of the simplest one-celled
8 The Little Black Book of Computer Viruses
The Little Black Book
of
Computer Viruses
Volume One:
The Basic Technology
By ... protected.
4 The Little Black Book of Computer Viruses
day to day computing. Many people think of viruses as sort of a
black art. The p...
... COM file.
26 The Little Black Book of Computer Viruses
essors. In the CP/M world, 64 kilobytes was all the memory a
computer had. The lowest 256 bytes of that memory was reserved
for the operating ... when they are correctly written. Which-
ever assembler you decide to use, though, the viruses in this book
19 The Little Black Book of Computer Viru...
... completion of the program.
Any other value indicates some kind of error, as determined by the
50 The Little Black Book of Computer Viruses
program making the DOS call. So, the simplest COM program
would ... risk! It’s not like any other computer program you’ve ever run!
52 The Little Black Book of Computer Viruses
infecting every EXE file on the sys...
... SEC_SIZE - 1]/SEC_SIZE
and the size of the file in sectors. The file size in bytes is stored at
the offset 1CH from the start of the directory entry at 0000:0500H.
The number of sectors to load is ... access the disk.
Rather than simply changing the address of the interrupt
1EH vector, the boot sector goes through a more complex procedure
that allows the table...
... DOS
92 The Little Black Book of Computer Viruses
VIRUS_START:
call GET_START ;get start address
;This is a trick to determine the location of the start of the program. We put
;the address of ... knows the disk is
infected. Otherwise it can infect the disk. The STEALTH virus uses
its own code as an ID. It reads the boot sector and compares the
86 The...
... VSEG,VSTACK ;Virus code and stack segments grouped together
105 The Little Black Book of Computer Viruses
Appendix B: The INTRUDER Virus
WARNING! The INTRUDER virus replicates without any
notice or ... Viruses
:100 490 00A2AF00FEC0A2FD00E80100C3E851007356
:1004A0004C803EFD0000743FFE0EFD00BFAF00BE5D
:1004B000AA00E8BB004757E8760075235F32C0AA60
:1004C000BFAF00BB4F00A0FD00B22B...
...
162 The Little Black Book of Computer Viruses
Computer Viruses,
Artificial Life
and Evolution
By Mark A. Ludwig, 373 Pages, 199 3, $26 .95
ISBN 0 -92 9408-07-1
Step into the 21st century where the ... Functions 161
The Giant Black Book
of Computer Viruses
by Mark A. Ludwig, 672 pages, 199 5, ISBN 0 -92 9408-10-1, $ 39. 95
Without a doubt, this is the bes...