TPE Virus


 Virus Name:  TPE 
 Aliases:     Girafe 
 V Status:    Rare 
 Discovery:   December, 1992 
 Symptoms:    .COM & .EXE file growth; decrease in total system & available 
              free memory; graphic & message 
 Origin:      The Netherlands 
 Eff Length:  Generally Over 3,000 Bytes 
 Type Code:   PRhA - Parasitic Resident .COM & .EXE Infector 
 Detection Method:  AVTK, F-Prot, ViruScan, Sweep, ChAV, 
                    IBMAV, NAV, NAVDX, VAlert, PCScan, 
                    Sweep/N, AVTK/N, IBMAV/N, NShld, Innoc, NAV/N, LProt 
 Removal Instructions:  Delete infected files 
 
 General Comments: 
       The TPE, or Trident Polymorphic Engine, was submitted in December, 
       1992.  It is from The Netherlands.  TPE is not actually a virus 
       itself, but rather a polymorphic encryption engine which is used 
       as part of the viruses indicated in this entry.  The encryption 
       produced by the encryption engine is extremely complex and in some 
       respects similar to the  DAME  encryption engine.  Viruses encrypted 
       with this engine can only be identified by the presence of the 
       encryption engine itself.  At the time of its submission, one virus, 
       Girafe, exists which uses TPE for its encryption.  Girafe uses 
       version 1.1 of the Trident Polymorphic Engine.  Another version, 
       1.2, has been submitted, but not with a virus which encorporated 
       it.  The entry below is for the Girafe virus, and future viruses 
       using this encryption engine will be listed below as they are 
       submitted and researched. 
 
       The first time a program infected with the Girafe virus is executed, 
       the Girafe virus will install itself memory resident at the top of 
       system memory but blow the 640K DOS boundary, hooking interrupt 21. 
       Total system and available free memory, as indicated by the DOS 
       CHKDSK program, will have decreased by 8,960 bytes.  Interrupt 12's 
       return will not have been moved. 
 
       Once the Girafe virus is memory resident, it will infect .COM and 
       .EXE programs, other than COMMAND.COM, when they are executed. 
       Infected programs will have a file length increase of 3,039 - 3,117 
       bytes with the virus being located at the end of the file.  The 
       program's date and time in the DOS disk directory listing will not 
       be altered.  The following text strings are encrypted within the 
       viral code in Girafe infected programs: 
 
               "COSCCLVSNEHTTBVIFIGIRAFEMTBRIM" 
               "[ MK / Trident ]3 RV" 
               "Amsterdam = COFFEESHOP!" 
 
       The Girafe virus activates on Thursdays, at which time it will 
       display a graphic cannabis (marijuana) leaf and the message 
       "legalize cannabis". 
 
       Other virus(es) which use the TPE engine are: 
       Beethoven: The Beethoven virus was submitted in March, 1994.  It 
               is a memory resident infector of .COM and .EXE programs.  Its 
               size at the top of system memory but below the 640K DOS 
               boundary is 2,048 bytes, hooking interrupts 1C and 21.  Once 
               memory resident, it infects .COM and .EXE programs when they 
               are executed or openned, as well as COMMAND.COM when the first 
               infected program is executed.  Infected programs will have a 
               file length increase of approximately 1,718 - 1,745 bytes with 
               the virus being located at the end of the file.  The program's 
               date and time in the DOS disk directory listing will not be 
               altered.  The following text string is encrypted within the 
               Beethoven viral code in all infected programs: 
               "Beethoven is here.... And now, enjoy the music..." 
               The following text string is visible within the viral code in 
               all infected programs: 
               "EMS Version Page Frame Mappable Pages" 
               Beethoven may play music on the system speaker. 
               Origin:  Unknown  March, 1994. 
       Bosnia: The Bosnia virus was submitted in September, 1993.  It is 
               a memory resident infector of .COM and .EXE programs.  Its 
               size at the top of system memory but below the 640K DOS 
               boundary is 9,216 bytes, hooking interrupt 21.  Once memory 
               resident, it infects .COM and .EXE programs, but not 
               COMMAND.COM, when they are executed.  Infected programs will 
               have a file length increase of approximately 3,146 - 3,245 
               bytes with the virus being located at the end of the file. 
               The program's date and time in the DOS disk directory listing 
               will not be altered.  The following text strings are encrypted 
               within the Bosnia viral code in all infected programs: 
               "HELP BOSNIA, BEFORE IT'S TOO LATE!" 
               "[ MK / TridenT ]" 
               "[TPE 1.4]" 
               Bosnia doesn't appear to do anything besides replicate. 
               Origin:  Unknown  September, 1993. 
       Civil War IV v1.1: A later variant of the  Civil War  virus, 
               Civil War IV v1.1 is a non-resident, direct action infector 
               of .COM programs, including COMMAND.COM.  It infects one 
               .COM program in the current directory each time an infected 
               program is executed.  Infected programs will have a file 
               length increase of 2,018 - 2,127 bytes with the virus 
               being located at the end of the file.  The program's date and 
               time in the DOS disk directory listing will not be altered. 
               The following text strings are encrypted within the Civil War 
               IV v1.1 viral code in all infected programs: 
               "Civil War IV v1.1, (c) Jan '93 *.com" 
               "For all i've seen has changed my mind 
                But still the wars go on as the years go by 
                With no love of God or human rights 
                Cause all these dreams are swept aside 
                By bloody hands of the hypnotized 
                Who carry the cross of homicide 
                And history bears the scars of our Civil Wars." 
               "[ DH / TridenT ] [ MK / TridenT ]" 
               "[TPE 1.3]" 
               Origin:  The Netherlands  March, 1993. 
       Civil War V v1.0: A later variant of the Civil War IV v1.1 
               virus, Civil War V v1.0 is a memory resident infector 
               of .COM programs, including COMMAND.COM.  This virus becomes 
               memory resident at the top of system memory, but below the 
               640K DOS boundary, when the first infected program is 
               executed, hooking interrupt 21.  Total system and available 
               free memory, as indicated by the DOS CHKDSK program, will 
               have decreased by 8,192 bytes.  Once resident, it infects 
               .COM programs when they are executed.  Infected programs will 
               have a file length increase of 2,068 - 2,161 bytes with the 
               virus being located at the end of the file.  The program's 
               date and time in the DOS disk directory listing will not be 
               altered. The following text strings are encrypted within the 
               Civil War V v1.0 viral code in all infected programs: 
               "Civil War IV v1.0, (c) Jan '92" 
               "DH[ DH / TridenT ][ MK / TridenT ]" 
               "[TPE 1.3" 
               Origin:  The Netherlands  March, 1993. 
       Coffeeshop 4: Received in June, 1993, Coffeeshop 4 is a memory 
             resident infector of .COM programs which uses the TPE engine 
             for its encryption.  It is based on the Coffeeshop viruses 
             which were encrypted with the Dark Avenger Mutating Engine. 
             It becomes memory resident at the top of system memory but 
             below the 640K DOS boundary when the first infected program 
             is executed.  Total system and available free memory, as 
             indicated by the DOS CHKDSK program, will have decreased by 
             8,960 bytes, and interrupt 21 will be hooked.  Once resident, 
             it infects .COM and .EXE programs, other than COMMAND.COM, when 
             when they are executed, adding 3,043 - 3,139 bytes to their 
             length.  The virus is located at the end of infected files. 
             The following text string is found within the virus, though it 
             is not visible in infected programs: 
             "Amsterdam = COFFEESHOP! =" 
             Origin:  Amsterdam, The Netherlands  June, 1993. 

Show viruses from discovered during that infect .

Main Page