ЪДДДДДДДДДДДДДДДДДДДДДДДДДДДДДї
                    і        VIRUS REPORT         і
                    і        Alabama Virus        і
                    АДДДДДДДДДДДДДДДДДДДДДДДДДДДДДЩ

Date of Origin: October 13, 1989.

Place of Origin: Israel.

Host Machine: PC compatibles.

Host Files: Remains resident. Infects EXE files.

OnScreen Symptoms: One hour after activation, the virus displays this
message in a flashing box:

"SOFTWARE COPIES PROHIBITED BY INTERNATIONAL LAW

Box 1055 Tuscambia ALABAMA USA."

Increase in Size of Infected Files: 1560 bytes.

Nature of Damage: Affects system run-time operation. Corrupts program or
overlay files. Directly or indirectly corrupts file linkage.

Detected by: Scanv43+, F-Prot, IBM Scan, Pro-Scan.

Removed by: CleanUp, F-Prot, or delete infected files.

     This virus was isolated by Ysrael Radai at Hebrew University. It
manipulates the file allocation table and swaps file names so that files
are slowly lost.

     The Alabama virus will infect .EXE files, increasing their size by
1,560 bytes. It moves into memory when any EXE containing the virus is
executied. Unlike most other memory-resident viruses, the Alabama does
not use the normal TSR function, but rather hooks interrupt 9 as well as
IN and OUT commands. Upon detecting a Control-Alt-Delete, the virus
generates what appears to be a warm boot, but remains in memroy. The
virus loads to the top 30K of memory, unlike other memory-resident
programs, and does not reduce the available memory reported by DOS.

     The Alabama virus uses a complex procedure during infection. It will
first infect an EXE in the current directory, providing there is one
which is uninfected. If all EXEs in the current directory are infected,
then the Alabama virus will infect the program being executed --
provided the system date is not Friday. On Fridays, the Alabama virus
will swap entries in the FAT so that when the user attempts to execute an
uninfected file, an infected file executes instead.  Over time, files
will be lost through this process.


ЙНННННННННННННННННННННННННННННННННННННННННННННННННННННННННННННННННННН»
є  This document was adapted from the book "Computer Viruses",       є
є  which is copyright and distributed by the National Computer       є
є  Security Association. It contains information compiled from       є
є  many sources. To the best of our knowledge, all information       є
є  presented here is accurate.                                       є
є                                                                    є
є  Please send any updates or corrections to the NCSA, Suite 309,    є
є  4401-A Connecticut Ave NW, Washington, DC 20008. Or call our BBS  є
є  and upload the information: (202) 364-1304. Or call us voice at   є
є  (202) 364-8252. This version was produced May 22, 1990.           є
є                                                                    є
є  The NCSA is a non-profit organization dedicated to improving      є
є  computer security. Membership in the association is just $45 per  є
є  year. Copies of the book "Computer Viruses", which provides       є
є  detailed information on over 145 viruses, can be obtained from    є
є  the NCSA. Member price: $44; non-member price: $55.               є
є                                                                    є
є            The document is copyright (c) 1990 NCSA.                є
є                                                                    є
є  This document may be distributed in any format, providing         є
є  this message is not removed or altered.                           є
ИННННННННННННННННННННННННННННННННННННННННННННННННННННННННННННННННННННј

Downloaded From P-80 International Information Systems 304-744-2253