copyright | disclaimer | privacy | contact  
Australia's Leading Computer Emergency Response Team
 
Search this site

 
On this site

 > HOME
 > About AusCERT
 > Membership
 > Contact Us
 > PKI Services
 > Training
 > Publications
 > Sec. Bulletins
 > Conferences
 > News & Media
 > Services
 > Web Log
 > Site Map
 > Site Help
 > Member login





 

AL-96.05 -- Euthanasia/Hare/Krshna Virus Alert

Date: 21 August 1996

Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----

=============================================================================
AL-96.05                        AUSCERT Alert
		     Euthanasia/Hare/Krshna Virus Alert
                               21 August 1996
- -----------------------------------------------------------------------------

AUSCERT has received the following bulletin concerning a new virus that
is expected to cause damage to data on August 22 or September 22 of any
year.

The information contained has been reproduced with permission from
Leprechaun Software Pty. Ltd.

- -----------------------------------------------------------------------------

Virus Name: HDEuthanasia version 2 & 3

How to tell if you have it:

    Very difficult. The virus is highly stealth (it even bypasses the BIOS
    hard disk virus protection).  If you have a large network you might
    notice a few PCs that fail to boot from the hard drive. (This is due
    to a bug in the virus infection code that destroys the occasional boot
    record).  You might notice files have grown by 8K using some disk
    utilities or if you boot clean & do a DIR.  You might notice a slight
    slowing of the diskette on 95 machines.

    It has been reported that the virus has been distributed in free
    software available on the Internet.

What it does:

    The virus is large and highly developed. The most relevant point is
    that the virus will activate on the 22nd of August and the 22nd of
    September any year.  The virus activates when an infected program is
    run or an infected PC is booted. When the virus activates it displays
    a message on the screen "HDEuthanasia by Demon Emperor: Hare Krsna,
    hare, hare..." and then proceeds to write random data to every sector
    of the drive, starting at the end and working to the start.  This
    effectively destroys the entire disk contents.  There is no recovery.

    Note that this virus alternates between version 2 & 3 (there are NOT
    2 different versions as reported elsewhere, it is the one version that
    mutates itself.)  Only one of the versions is destructive so only half
    the machines infected (on average) will be destroyed.

Which systems are affected:

    Any Intel based machine.  Since the virus infects .COM files, .EXE
    files, and the Master Boot Record, it is possible that DOS, Windows,
    and Windows 95 systems are vulnerable, as well as Unix systems if they
    were booted from an infected floppy disk.

    It is unclear if OS/2 systems are vulnerable, but it is likely.

    It is believed that Novell Servers are not vulnerable.

How to prevent it:

Simple fix
    On or before the 21st of the month set the system date to the 23rd of
    the month.  On the 24th of the month set the system date to the 24th.

Better fix
    Download the latest version of VCHECK from Leprechaun (at the time of
    writing, this was VCHECK9.EXE).
    Boot with a clean floppy, run VCHECK & follow instructions.
    VCHECK is available from:
	http://www.leprechaun.com.au/
    under the "Utilities and Free Software" link.

Long term fix
    Protect your systems with a quality anti-virus security system.

- -----------------------------------------------------------------------------
AUSCERT thanks Jack Kenyon from Leprechaun Software Pty. Ltd. and Adam
Radford from UNSW for their assistance.
- -----------------------------------------------------------------------------

The AUSCERT team have made every effort to ensure that the information
contained in this document is accurate.  However, the decision to use the
information described is the responsibility of each user or organisation.
The appropriateness of this document for an organisation or individual
system should be considered before application in conjunction with local
policies and procedures.  AUSCERT takes no responsibility for the
consequences of applying the contents of this document.

If you believe that your system has been compromised, contact AUSCERT or
your representative in FIRST (Forum of Incident Response and Security
Teams).

AUSCERT is located at The University of Queensland within the Prentice
Centre.  AUSCERT is a full member of the Forum of Incident Response and
Security Teams (FIRST).

AUSCERT maintains an anonymous FTP service which is found on:
ftp://ftp.auscert.org.au/pub/.  This archive contains past SERT and AUSCERT
Advisories, and other computer security information.

AUSCERT also maintains a World Wide Web service which is found on:
http://www.auscert.org.au/.

Internet Email: auscert@auscert.org.au
Facsimile:	(07) 3365 4477
Telephone:	(07) 3365 4417 (International: +61 7 3365 4417)
		AUSCERT personnel answer during Queensland business hours
		which are GMT+10:00 (AEST).
		On call after hours for emergencies.

Postal:
Australian Computer Emergency Response Team
c/- Prentice Centre
The University of Queensland
Brisbane
Qld.  4072.
AUSTRALIA

-----BEGIN PGP SIGNATURE-----
Version: 2.6.2i
Comment: Finger pgp@ftp.auscert.org.au to retrieve AUSCERT's public key

iQCVAwUBMhxnISh9+71yA2DNAQEowwQAi4dxPUQFIsu1fwPbCxIbzeXtQ9nC4pir
waf7G/WLJ+MMyURSbB+xGEyfwU4TTzLYmPQk/0jeQuxjwUlqrFCVugASKJmtgXw/
EQjUx+kwUdJLhPS3wZS/Ptqba+hFRnkQEDZzmCrYYZb8BTk+/m/XLOLfwLjNioJ4
SYy4/osPqGM=
=T29D
-----END PGP SIGNATURE-----