what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

d-10.ciac-november-17-virus

d-10.ciac-november-17-virus
Posted Sep 23, 1999

d-10.ciac-november-17-virus

tags | virus
SHA-256 | 2a051e86f0593c2fdf0ac5ee2efc9fed8f2b9acdddde1100d16b84b6b258cd4c

d-10.ciac-november-17-virus

Change Mirror Download
        _______________________________________________________
The Computer Incident Advisory Capability
___ __ __ _ ___
/ | / \ /
\___ __|__ /___\ \___
_____________________________________________________
Information Bulletin

November 17 Virus on MS DOS Computers

March 15, 1993 1000 PST Number D-10
__________________________________________________________________________
NAME: November 17 virus
ALIASES: NOV 17, 855
PLATFORM: MS DOS Computers
DAMAGE: On November 17 will destroy hard disk contents
SYMPTOMS: Files grow by 855, 768, 880, or 800 bytes
DETECTION/
ERADICATION: FPROT 207, Scan V102, Novi
__________________________________________________________________________
Critical Facts about the November 17 virus

The November 17 virus is a simplistic file infector virus which has
recently been discovered to be fairly widespread. This virus will
overwrite the hard disk on November 17 of any year.

Infection Mechanism

This virus is a file infector virus (see CIAC bulletins A-20, A-27,
A-29, B-35, and 3 bulletins from Fiscal Year 1989 for information on
similar file infector viruses). Upon execution of a virus-infected
program, NOV 17 will become memory resident at the top of memory and
inhabit 896 bytes of memory.

Once resident, it will infect any .COM and .EXE programs when the file
attributes are set or read, when the file is opened for READ, and upon
loading and execution. Therefore, if the virus is resident in memory,
and a new disk with clean executibles is copied, the original disk's
.EXE and .COM files will become infected if the disk is not
write-protected. It can easily be transferred via LAN's anytime an
executible file is opened or executed over the LAN. This virus will
not infect files with a filename of SCAN.EXE or CLEAN.EXE, and it will
not infect files that have the system bit set. It does not affect
data files.

Potential Damage

On November 17 of any year this virus will overwrite portions of the
C: drive or current drive, depending on the variant. On any other day
of the year this virus will simply replicate. Some variants will
cause this overwrite process to occur on days after November 17.

Detection and Eradication

Many recent versions of antivirus products will detect this virus.
Another method of direct detection is to search for the string
"SCAN.CLEAN.COMEXE", which can be found within the virus code of every
infection.

Until March of 1993, there had been no reports of this virus in the
United States. Because of this fact, some anti-virus products do not
detect the presence of it by name. Some products, such as Data
Physician Plus!, do detect when it they themselves become infected, at
which point a message such as "A virus has been detected, would you
like to continue?" may appear on the screen. This message means that
the antivirus product's self check mechanism has detected a
modification to itself, and at this point CIAC recommends that you
check the machine with a different antivirus product, or call CIAC for
additional information on virus handling.

Virus Variants

There are four known variants to this virus, all increase file lengths
by a different amount and take up a different amount of resident
memory. The variants increase file lengths of infected files by 768,
800, 880, and 855 bytes. The 768 variant is almost identical to the
original virus but takes up 800 bytes of memory; it was discovered in
May of 1992. The variant which adds 800 bytes to files takes up 832
bytes of memory, was discovered in March of 1993, and activates
November 17-30 of any year. The 880 variant, which uses 928 bytes of
memory, first seen in November, 1992, will activate on any date from
November 17-December 31 of any year. The 855 variant, also called
Nov17B, first seen in September of 1992, causes infected .EXE files to
hang the system when executed.

Due to the nature of this virus's infection mechanism, it is sometimes
not possible to remove the infection from a host program. CIAC
recommends that if this virus is discovered a copy be kept and then
all infected files be deleted and restored from backup.


For additional information or assistance, please contact CIAC at
(510) 422-8193 / FTS or send E-mail to ciac@llnl.gov. FAX
messages to (510) 423-8002 / FTS.

Previous CIAC bulletins and other information are available via anonymous
ftp from irbis.llnl.gov (IP address 128.115.19.60).

PLEASE NOTE: Many users outside of the DOE and ESnet computing
communities receive CIAC bulletins. If you are not part of these
communities, please contact your agency's response team to report
incidents. Your agency's team will coordinate with CIAC. The Forum
of Incident Response and Security Teams (FIRST) is a world-wide
organization. A list of FIRST member organizations and their
constituencies can be obtained by sending email to docserver@first.org
with an empty subject line and a message body containing the line:
send first-contacts.

Neither the United States Government nor the University of California
nor any of their employees, makes any warranty, expressed or implied,
or assumes any legal liability or responsibility for the accuracy,
completeness, or usefulness of any information, product, or process
disclosed, or represents that its use would not infringe privately
owned rights. Reference herein to any specific commercial products,
process, or service by trade name, trademark manufacturer, or
otherwise, does not necessarily constitute or imply its endorsement,
recommendation, or favoring by the United States Government or the
University of California. The views and opinions of authors expressed
herein do not necessarily state or reflect those of the United States
Government nor the University of California, and shall not be used for
advertising or product endorsement purposes.
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close