Home

Awesome

Second Part to Hell's artworks

articles -- viruses -- 23 open problems -- historic e-zines -- twitter -- e-mail

News:

<b>21.01.2024:</b> I wrote a demo for a GPT-based anti-virus program: LLMarshal can detect computer-viruses that use Large Language Models. I was motivated by seeing that none of the AV programs at virustotal detect the LLMorpher family, while at the same time, security researchers agree and consider it as a huge threat. It is a simple demo, but i believe using programs that are fluent in natural and computer languages might be the only robust way to detect such programs in the future.<br><br> <b>22.11.2023:</b> I have created a subsite about the 23 Open Problems for Digital Self-Replicators. None of these questions is solved so far. I will update if their are new partial or full solutions. If you think you have made a contributions, contact me!<br><br> <b>21.11.2023:</b> Today, <a href="https://tmpout.sh/3/">tmp.0ut#3</a> has been published. For the first time in more than 10 years, i have contributed to this old-school hacking/vxing magazine (together with many other excited hobbyists and security researchers). My contributions involve the LLMorpher series (<a href="https://github.com/SPTHvx/SPTH/blob/master/viruses/files/LLMorphism/LLMorphismI.py">LLMorpher I</a>, <a href="https://github.com/SPTHvx/SPTH/blob/master/viruses/files/LLMorphism/LLMorphismII.py">LLMorpher II</a> and the brand new GPT4 powered, strongly language mutating <a href="https://github.com/SPTHvx/SPTH/blob/master/viruses/files/LLMorphism/LLMorpherIII.py">LLMorpher III</a>) together with two articles (<a href="https://github.com/SPTHvx/SPTH/blob/master/articles/files/LLMorpher.txt">Using GPT to encode and mutate computer viruses entirely in natural language </a>, <a href="https://github.com/SPTHvx/SPTH/blob/master/articles/files/LLMorpher2.txt">Full Metamorphism of computer virus Code and Prompts via GPT4</a>). In addition, -- in the <a href="https://en.wikipedia.org/wiki/Hilbert%27s_problems">spirit of David Hilbert</a> -- i have written a text on <a href="https://github.com/SPTHvx/SPTH/blob/master/articles/files/23problems.txt">23 open problems for digital self-replicators</a>. In addition, the tmp.0ut staff was so kind and did an <a href="https://tmpout.sh/3/02.html">interview with me</a>.<br><br> <b>02.03.2023:</b><font size="2"> Just uploaded a new article, in which I use <a href="https://github.com/SPTHvx/SPTH/blob/master/articles/files/LLMorpher.txt">OpenAI's GPT to encode and mutate self-replicating code</a>, see for concrete implementations of the self-replicating linguisto-morphic codes <a href="https://github.com/SPTHvx/SPTH/blob/master/viruses/files/LLMorphism/LLMorphismI.py">LLMorpher I</a> and <a href="https://github.com/SPTHvx/SPTH/blob/master/viruses/files/LLMorphism/LLMorphismII.py">LLMorpher II</a>.<br><br> <b>11.08.2019:</b><font size="2"> My old domain (spth.virii.lu) has been down now for some time (thanks a lot perforin for hosting it!). I decided to upload the news-page (basically a logbook over the past 17 years), my <a href="articles/">articles and interviews</a>, as well as <a href="viruses/">codes</a> to github. Many links in this logbook are broken, but for reasons of nostalgia i will keep everything as it is. Please enjoy some old ideas on self-replicating codes, artificial life, artificial evolution, metamorphism, ... If you have cool idea or projects, let <a href="mailto:sperl.thomas@gmail.com">me</a> know.<br><br> <b>05.04.2014:</b><font size="2"> <a href="https://www.youtube.com/watch?v=BGBM5vWiBLo">High Hopes</a>!<br><br> <b>08.02.2014:</b><font size="2"> <a href="https://twitter.com/mikko">Mikko Hypponen</a> has mentioned my research in <a href="http://spth.virii.lu/InfectingDNA.txt">infecting biological DNA with digital Computer Code</a> in his <a href="http://sms.cam.ac.uk/media/1649555">talk in Cambridge on "Silicon Plagues"</a> (see minute 51++). My code was inspired and uses the <a href="https://www.sciencemag.org/content/329/5987/52.abstract">ideas of Craig Venter's synthetic life research</a>. They try to understand DNA in such a level that it becomes a tool solve important problems of humanity, such as creation of fuel, food or medicine at superfast and efficient rates. A great summary by him is given on his <a href="http://www.youtube.com/watch?v=HdgfzdlgUHw">TEDx talk on Future Biology</a>.<br> The idea is clear: Similar as we can use electronic computers to perform logical tasks, they want to control DNA in such a way that it can perform biological tasks which are unfeasible otherwise. Examples mentioned above - fuel, food, medicine, you are only bounded by your imagination.<br><br> I am a bit worried about the risk of abusing such techniques by criminals, nation states, you name it. Similar as computers are abused and can cause alot of trouble, also synthized DNA can be abused, but obviously on a much more dangerous scale. Compared to that, abusing computers seems like some kiddy games.<br> Per fortuna, yet we are far from the point were synthesizing DNA and booting up bacteria with it is possible on a big scale (Venter compares it with the 40s or 50s of electronic computers). Actually, afaik Craig Venter's lab is the only place where this can be done yet.<br><br> As a conclusion I think Mikko's statement "<i>Do not write a computer virus that is able to infect DNA</i>" is of course true, but naive.<br> Synthezised DNA has the potential to change our lifes in future tremendously (maybe similar or even more than computers have done), but can (and most likely will) be abused aswell - obviously in a much worse way than computers can ever be.<br><br> I wonder if somebody is thinking about serios solutions. Those bio-researchers have done some ethical studies, but I don't know how they evaluate the long-term risk. And security-people might be not be interested, as there has not been any accident yet or because the field is too different. Well, maybe it's SciFi after all.<br><br><br> <b>25.11.2013:</b><font size="2"> I have just announced <a href="http://vxheaven.org/forum/viewtopic.php?id=2467">valhalla#5</a> vx-magazine. It will be a special issue celebrating hh86's <a href="http://vxheaven.org/?year=2009">5th birthday</a> on 27.11.2014. Deadline is exactly in 365 days - so hurry up with your projects :-) I have some nice ideas for my next projects, was able to solve some things which I was thinking about for years. Hope that many people join again in this issue; i'vealready seen some of other people's project and they are wonderful; I'm excited to see the outputs :-)<br><br> </font><a name="05112013"></b><b>05.11.2013:</b><font size="2"> Finally I have uploaded my things in <a href="v4/">valhalla#4</a>: An article that explains how a <a href="InfectingDNA.txt">digital computer code can infect biological DNA, thus spread in the biological world as a self-replicating bacteria</a> (and the corresponding PoC code called <a href="InfDNA.rar">Mycoplasma mycoides SPTH-syn1.0</a>). My second article was about a way to <a href="CrossMeta.txt">infect many different programming languages with just one code, based on a special Meta-Language</a>, the corresponding <a href="Polygamy.rar">code can infect five languages (JS, VBS, MatLab, Ruby, Python), I called it Polygamy</a>. Furthermore, i did three very interesting interviews with <a href="intRGB.txt">roy g biv</a>, <a href="intJP.txt">JPanic</a> (both together with hh86) and <a href="intJeffDahmer.txt">Jeff Dahmer</a>.<br><br> In general, the quality of valhalla#4 was very high. We saw the source of JPanic's <a href="http://spth.virii.lu/v4/articles/jpanic/JPanic-MP-VX.txt">Windows/Linux/MacOS cross-infector and an detailed explanation</a> of the technique behind. He also write a tutorial about <a href="http://spth.virii.lu/v4/articles/jpanic/JPanic-MP-VX.txt">Linux 64bit infection</a> (and we believe to know what his next project will be ;-)). roy g biv submitted his collection of <a href="http://spth.virii.lu/v4/codes/roy_g_biv/Quines.txt">quine-based infectors for 32 (!) different languages</a> - most of them you find on the <a href="LIP.html">Language Infection Project</a>. M0SA showed how one can <a href="http://spth.virii.lu/v4/articles/m0sa/evade.html">circumvent automated dynamic analysis</a> with surprisingly simple techniques. r3s1stanc3 shows a new and unexpected technique for worms, <a href="http://spth.virii.lu/v4/articles/r3/mailworm_gpg.txt">based on GPG encryption and web-based keyservices</a>. And hh86 analysed the deep dark corner of native GPU languages (who's binary form is undocumented!) for <a href="http://spth.virii.lu/v4/articles/hh86/CUPTX.TXT">encryption</a> and <a href="http://spth.virii.lu/v4/articles/hh86/GPUFF.TXT">file-infection</a>. Furthermore she shows how one can infect <a href="http://spth.virii.lu/v4/articles/hh86/CLASSI.TXT">Java Class with Win32 files</a>, and the <a href="http://spth.virii.lu/v4/articles/hh86/JBSO.TXT">other way round</a> (and i wish she combines those two kitties, to get a full Java/W32 cross-infector). Another surprising and high-quality submission was a huuuge (more 7000 lines of C) <a href="http://spth.virii.lu/v4/codes/black_sun/Ether.txt">metamorphic code written by Black Sun</a>. As I said, this was a wonderful release, awesome work of many people. And - I already heared rumors of follow up projects by several of the above mentioned people, it will be awesome!! :-)<br><br> I also updated my <a href="links.htm">link</a>-section. If you think I missed somebody, please <a href="mailto:sperl.thomas@gmail.com">send me a message</a>.<br><br><br> <b>02.11.2013:</b><font size="4"><strong> <a href="http://hh86.virii.lu/Valhalla_4.rar">valhalla 4</a> has been released by hh86!!! Also see the <a href="v4/">online viewer</a>. :-DDD</strong><br><br> <b>16.10.2013:</b><font size="2"> After a small break, I'm back again. Yesterday, pr0mix and others released Inception#1 e-zine: <a href="inception1/">see online</a> or <a href="inception1/inception1.zip">download</a>. It has very nice personalized intro-pictures to every article - that's so cool. And the content is also good/interesting. Some nice essays - haven't seen such types of texts since the very old-school e-zines in 90s or early 2000s. Nice work guys, hope you continue!<br><br>There will be another vx-magazine out very soon - valhalla#4 (read <a href="http://vxheaven.org/forum/viewtopic.php?id=2199">hh86's annoucement</a>). I know that there will be some fancy stuff inside again. I have contributed aswell some things, again :-) The last one I just finished two days ago, its an idea+implementation about artificial life. I would say its my most creative thing I've done in my >11years vx-career. Maybe a bit "too creative" :-) you will see. If you want to be part of valhalla-ezine, contact <a href="mailto:agonisthh86(at)gmail.com">hh86</a> before 1st of november. :-)<br><br><br> <b>06.07.2013:</b><font size="2"> <a href="http://vxheaven.org/">VX Heaven</a> is back online, after more than a year of down-time due to an incredible stupid, unfounded raid. I'm looking forward to information about what happend exactly, I guess we can hear something about this soon. Now - let's enjoy our library and discussion-platform again :-)<br><br> <b>02.07.2013:</b><font size="2"> Today, <a href="http://ezine.vxnetw0rk.ws/mag5/">DarK-CodeZ #5</a> has been released. You find several nice things in it, among others, 15 source-codes of first-time infected programming languages from genetix, roy g biv, hh86, herm1t and perforin (which I have separatly mentioned on the <a href="LIP.html">Language Infection Project</a> subpage). My small contributions are two interviews, one with <a href="inthh86_2.txt">hh86</a> and one with <a href="intGenetix.txt">genetix</a>. I have not read all things yet, but two things I find already pretty nice: one text by <a href="hh86/">hh86</a> about <a href="http://ezine.vxnetw0rk.ws/mag5/TEXTS/hh86/EPO64_hh86.TXT">EPO In Windows 64-bit</a>, where she explains a technique used in a former virus by her, and one new technique - which I predict to come true soon ;-). Second interesting thing: perforin wrote a <a href="http://ezine.vxnetw0rk.ws/mag5/VIEWER/arcusdaemonica.html">malicous program with PostScript languages</a>, thats the native langauges of printers, and many PDF files are compiled via PS files. I guess with a bit more research, its also possible to write a self-replicator for this fine language - something I would like to see :-). OK, well done perforin and R3s1stanc3, thanks for this magazine!<br><br>
<b>19.06.2013:</b><font size="2"> As she has no own homepage, hh86 gets her own corner at my page, with a collection of all her viruses and articles: <a href="hh86/">hh86 corner</a>. Welcome! Maybe I can also convince her to write some interesting guest comments some day :-)<br><br> <b>09.06.2013:</b><font size="2"> For my <a href="ezines.html">online ezine section</a>, I just uploaded online versions of *-zine from 1999 (<a href="asterix1/">#1</a>, <a href="asterix1/">#2</a>), and 40hex from 1991-1995 (<a href="40hex1/">#1</a>, <a href="40hex2/">#2</a>, <a href="40hex3/">#3</a>, <a href="40hex4/">#4</a>, <a href="40hex5/">#5</a>, <a href="40hex6/">#6</a>, <a href="40hex7/">#7</a>, <a href="40hex8/">#8</a>, <a href="40hex9/">#9</a>, <a href="40hex10/">#10</a>, <a href="40hex11/">#11</a>, <a href="40hex12/">#12</a>, <a href="40hex13/">#13</a>, <a href="40hex14/">#14</a>). 40hex was one of the best and most well-known magazines from the early 90s.<br><br> Some highlights from the magazines: <a href="asterix1/intsep.html">Interview with Sepultura/IR</a> (who came back very recently and released a cross infector for Windows, Linux and OS-X), <a href="asterix2/articles/winfuture.html">text about future viruses ideas from 1999</a>, short explanation about <a href="40hex1/40HEX-1.004.txt">encryption for viruses</a> in 1991, an article about <a href="40hex2/40HEX-2.005.txt">Dark Avanger</a> that (among many other things) says that Dark Avanger created an AV (!). Some <a href="40hex4/40HEX-4.013.txt">jokes</a> that maybe nobody has seen for 20years, great texts and codes by Dark Angel such as his poly-engine <a href="40hex11/40HEX-11.002.txt">DAME</a>, texts about <a href="40hex12/40HEX-12.003.txt">Self Dis-Infecting File</a>, a virus (<a href="40hex14/40HEX-14.011.txt">JUMP by Strombringer</a>) that uses overlapping code as obfuscation (i used overlapping code in a polymorphic code <a href="w32.kitti.rar">W32.Kitti</a>) and many many many more awesome stuff!<br><br><br> <b>08.06.2013:</b><font size="2"> Peter Ferrie has written an analysis for my <a href="Transcriptase.rar">JS.Transcriptase</a> (the first metamorphic script virus) - see <a href="transcript.pdf">Read your transcript</a>.<br><br>Due to the huge unexpected success of the <a href="LIP.html">Language Infection Project</a> (there are now already 33 new infected languages), I decided to annonce a LIP-zine. Still the best codes should go to general VX magazines such as valhalla or Dark-CodeZ, however, simpler codes which infect new languages can go to this collection. I will release it someday after <a href="http://vxnetw0rk.ws/#news">DarK-CodeZ#5</a> (which will appear in about one month), but before valhalla#4 (which was scheduled for some bright day at the end of the year). If you want to be part of LIP-zine, find a new yet uninfected language and hit it for the first time :-)<br><br><br> <b>26.05.2013:</b><font size="2"> So there has been this W32/Linus/OSX infector recently - most likely written by "Sepultura", a former member of Immortal Riot - one of the first virus-writing groups from the 1990s. For that reason, I have uploaded in the <a href="ezines.htm">Online VX e-Zines</a>-section the magazines from that group: <a href="ir1/">Insane Reality#1</a> (07.1993), <a href="ir2/">Insane Reality#2</a> (11.1993), <a href="ir3/">Insane Reality#3</a> (01.1994), <a href="ir4/">Insane Reality#4</a> (04.1994), <a href="ir5/">Insane Reality#5</a> (07.1994), <a href="ir6/">Insane Reality#6</a> (11.1994), <a href="ir7/">Insane Reality#7</a> (12.1995), <a href="ir8/">Insane Reality#8</a> (12.1996)... nostalgia<br><br> Beside of that, roy g biv (who actually also started to code viruses more than 20years ago in 1992) continued his series of quine-based source-code infectors. His latest creations is a self-replicator for <a href="http://en.wikipedia.org/wiki/SmallBASIC">SmallBASIC</a> and the compiled version of Haskell. Well done! Hope more people continue joining the <a href="LIP.html">Language Infection Project</a> - there are many very interesting and challanging projects yet to be done, for example - my Top7: <a href="http://en.wikipedia.org/wiki/Prolog">Prolog</a>, <a href="en.wikipedia.org/wiki/SAS_language">SAS</a>, <a href="http://en.wikipedia.org/wiki/LabView">LabView</a>, <a href="http://en.wikipedia.org/wiki/Intel_Ct">cT</a>, <a href="http://en.wikipedia.org/wiki/Occam_programming_language">occam</a>, <a href="http://en.wikipedia.org/wiki/X10_%28programming_language%29">x10</a>, <a href="http://en.wikipedia.org/wiki/VHDL">VHDL</a> (for VHDL, herm1t as well as rgb said its impossible. but I disagree with them - can you prove them wrong? :-) )<br><br><br> </font><a name="23052013"></b><b>23.05.2013:</b><font size="2"> <a href="http://pferrie.host22.com/">Peter Ferrie</a> has written an analysis of a new virus for VB 06.2013 - its called "Multi-platform Madness", and its about a virus called "{W32/Linux/OSX}/Clapzok". Now it seems like this virus is an advanced version of <a href="http://spth.virii.lu/rrlf7/sources/clt.htm">{W32/Linux}.Capzloq by JPanic in rRlf#7 from 2006</a> - with additional infection of OSX files. This is awesome for more reasons: First, it seems to be the first multiplatform virus for those three OSes, thats defintivly great work! Secondly, JPanic decided to code an advanced version of this great code 7 years later, so maybe one very high-skilled person found his way back. But now, who is JPanic? He writes <em>JPanic (aka Sepultura, aka The Soul Manager)</em>. Now check out that: <a href="https://www.google.at/search?q=inurl%3Aspth.virii%20sepultura">Sepultura in old magazines</a> - JPanic/Sepultura is a viruswriter from the 1990s, was a principal <a href="http://spth.virii.lu/29a2/29A-2.1_8.txt">member of "Immortal Riot"</a>. OK - I hope this great viruswriter will keep staying here for some moments - nothing more to say... (thanks to <a href="https://twitter.com/hh86_">hh86</a> for the initial information)<br><br>
</font><a name="08042013"></a><b>08.04.2013:</b><font size="2"> It seems like there is no day without a new platform hit for the first time. Today, there are two new platforms. One by psychologic for <a href="CSH.rar">C Shell</a>. The other one by genetix for the functional language <a href="http://en.wikipedia.org/wiki/Ocaml">Ocaml</a> (the source of the OCaml virus will be released soon). Well done to both of you, and have fun on the <a href="LIP.html">Great Wall of LIP participations</a>! :-)<br><br> </font><a name="03042013"></a><b>03.04.2013:</b><font size="2"> The <a href="LIP.html">Language Infection Project</a> makes great progress - there are already 14 (!!!) new targets hit since its announcement 3 months ago. This is a huge success. The main-contributor was genetix, and most of the sources will be released in forthcoming magazines such as <a href="http://vxnetw0rk.ws/#news">DarK-CodeZ #5</a> (i promised to contribute something there as well - huh, should get my hands on some good projects i guess :-) ).<br><br> It has been more than a year now that our library <a href="http://vx.netlux.org/index.html">VX Heavens</a> got burned down. Unfortunatly, there is still no official announcement about any progress. In any way, I have a good feeling that everything becomes solved in some time.<br><br> It seems like that one of the best and most active viruswriters - hh86 - took a break. While she took breaks also in past times, for some reason I think its a bit different this time. She has written some of the most interesting viruses in recent times (just look at <a href="http://pferrie.host22.com/papers/mikasa.pdf">Peter Ferrie's latest analysis</a> about her <a href="http://spth.virii.lu/v3/vessel/display/articles/hh86/inline.txt">W32.UNIT00</a>). Furthermore, she was the initiator and editor of the valhalla magazine series (see <a href="v0/">v0</a>, <a href="v1/">v1</a>, <a href="v2/">v2</a>, <a href="v3/">v3</a>). Of course I hope that she comes back again some day, but I also understand that after such an highly productive VX career, one needs a break. (in any case, if you read this, drop me a mail - two proposals are left).<br><br><br> </font><a name="22012013"></a><b>22.01.2013:</b><font size="2"> Update of the <a href="LIP.html">Language Infection Project</a>: herm1t has written the first virus infecting MySQL databases. Congratulations, and welcome on the Great Wall of LIP participations :-) The source will be released soon. He has also told me that there has been a virus written in <a href="FORTH.zip">FORTH (by Light General in Infected Voice#11 in 1996)</a> and a virus for <a href="jgama.tar.gz">T-SQL virus by Joseph Gama in 2004</a>. I'm looking for more participations soon :-)<br><br> </font><a name="20012013"></a><b>20.01.2013:</b><font size="2"> The <a href="http://vxnetw0rk.ws/#news">DarK-CodeZ #5 announcement</a> has been released recently. Great - I'm looking forward to the magazine (i expect to find some several new infected platforms there, in addition to other things ;-) ), and I will try my best to be part of it aswell.<br><br>Have continues with uploading <a href="ezines.htm">online-versions of good old VX magazines</a>. This time: <a href="coderz1/">coderz#1</a>, <a href="coderz2/">coderz#2</a>, and <a href="coderz3/">coderz#3</a>, as well as <a href="cb1/">Codebreakers#1</a>, <a href="cb2/">Codebreakers#2</a>, <a href="cb3/">Codebreakers#3</a>, <a href="cb4/">Codebreakers#4</a>, <a href="cb5/">Codebreakers#5</a>. Especially codebreakers#4 and #5 are one of the best VX magazines ever, they are full of awesome stuff such as <a href="cb4/Brew/index.html">the first Java infector</a>, the <a href="cb5/cb5418.txt">first WScript virus</a>, the <a href="cb4/CB4303.ASM.txt">source of Win32.CIH</a> and many many other things.<br><br>About the <a href="LIP.html">Language-Infection-Project</a>: genetix did it again and wrote the first infectors for <a href="http://en.wikipedia.org/wiki/Scala_%28programming_language%29">Scala</a> (a language also used by Twitter and LinkedIn) and for <a href="http://en.wikipedia.org/wiki/R_(programming_language)">R</a> (a language for statistical computing) - sources of both will be released soon. Well done once again!! Now I'm waiting for the next successful targeted language - what will be infected next? Who will infect next? :-)<br><br><br>
</font><a name="15012013"></a><b>15.01.2013:</b><font size="2"> Woaahh - I'm extremly amazed: Got the news that there are two new languages infected from my <a href="LIP.html">Language Infection Project</a>: The one is done by Perforin who has written the first infector (prepender) for <a href="http://en.wikipedia.org/wiki/AWK">AWK script language</a>. And genetix did it again - she infected google's new script language called <a href="http://en.wikipedia.org/wiki/Dart_%28programming_language%29">Dart</a>. Well done - congratulations to perforin and genetix!! The sources of all infectors so far (REXX, AWK, Dart) will be released soon hopefully. And that's definitivly not the end, I know of several other project that are under developement at the moment; the only thing I'm afraid of is that we ran out of languages ;-)<br><br> </font><a name="14012013"></a><b>14.01.2013:</b><font size="2"> hh86 has made an <a href="http://hh86.virii.lu/">announcement for valhalla#4</a>. Deadline is 1st of November 2013. Contribution is open to everybody (of course, stuff will be evaluated), the topics of interest are listed in the announcement. I would suggest to sit down on our devices and create the best and craziest codes that we ever made! :-) <a href="v3/">valhalla#3</a> was great - but its our duty to make the next issue even better! For questions, comments and contributes, please send a mail to the editor and initializer of valhalla - <a href="mailto:5f3bc5221626b2f8d66261fb073394{at}gmail.com">hh86</a>!<br><br>Two days ago, I've started the <a href="LIP.html">Language Infection Project (LIP)</a>. Now there is already the first participant who finished a nice project: Genetix has written the first infector (with EPO technique) for <a href="http://en.wikipedia.org/wiki/Rexx">REXX scripting language</a> (the language of the ancient christman-tree worm)! Congratulations! (The code will be released soon I hope.) This is now genetix's 3rd entry in the list (after her <a href="dr1/main/articles/genetix_AutoItv3%20Vir%20tutorial.rtf">AutoIt</a> and <a href="eof1/contents/articles/FBSLVirusWritingGuide_Genetix.htm">FBSL</a> infectors in 2007). I know of several other people who are preparing, researching, discovering new languages. (Going to join as well - already have one target in mind, but need to finish another project first :-) ). I'm looking forward to an very exciting and creative year 2013 for viruswriting!<br><br><br> </font><a name="12012013"></a><b>12.01.2013:</b><font size="2"> Recently I've seen the <a href="http://www.tiobe.com/index.php/content/paperinfo/tpci/index.html">Top100 programming languages</a>. I thought "challange accepted!" - and made this new subpage: <a href="LIP.html">Language Infection Project</a>. The plan is to collect all infected languages, and have a handy list to search for new projects! Everybody who is going to write target a new language will become part of this eternal list :-) Thanks foes to herm1t and hh86 for help with the list; any comments/suggestion on the List is wellcome, just <a href="mailto:sperl.thomas(a)gmail.com">drop me an eMail</a>!<br><br> </font><a name="03012013"></a><b>03.01.2013:</b><font size="2"> Small update today: Uploaded an online-version of <a href="dr1/">DoomRiderz#1</a>, and I got a mail (thx) with <a href="mtx2/">Matrix#2</a>, <a href="vlad1/">VLAD#1</a> and <a href="vlad2/">VLAD#2</a> viewer screenshot, so now you can see that nice old viewers as well :-)<br><br> </font><a name="31122012"></a><b>31.12.2012:</b><font size="2"> Have continued with creating <a href="ezines.htm">online versions of important ancient e-zines</a> - today I've uploaded all iKX#1-#4, DDT#1, MATRiX#1-#3 and VLAD#1-#7 magazines, as well as screenshots of the viewers and demos in the magazines (i was not able to execute <a href="mtx2/mtx2.zip">MATRiX#2</a>, <a href="vlad1/vlad1.zip">VLAD#1</a> and <a href="vlad2/vlad2.zip">VLAD#2</a> viewers, so no pictures from those magazines; if you know how to do it, please <a href="mailto:sperl.thomas@gmail.com">send me an eMail</a>). Among them, there are some revolutionary magazines such as <a href="vlad6/">VLAD#6</a>, where Qark and Quantum explain for the first time Win95 PE file infection.<br><br>It is great to see that starting from <a href="vlad1/">VLAD#1</a> in 1994 until <a href="v3/">valhalla#3</a> there are overlapping groups and magazines with overlapping coders (VLAD 1994-1996, 29A 1996-2005, rRlf 2002-2007, EOF 2007-2011/today, valhalla 2011-today), which means we are actually connected to those genious coders/discoverer in the past - we could even define some sort of <a href="http://en.wikipedia.org/wiki/Erd%C5%91s_number">Erdos number</a> for viruswriting :-). A totally crazy thing: roy g biv has contributed to all of those magazines (<a href="vlad7/ARTICLE.2_7.txt">see his text in VLAD#7</a>)! I will continue creating online-versions of old important magazines such as SLAM, Immortal Riot, Phalcon/Skism in 2013 (if you have suggestions or ideas, dont hesitate telling me)- see you next year!<br><br><br>
</font><a name="29122012"></a><b>29.12.2012:</b><font size="2"> I have created a collection of online-versions of recent VX-zines as well as of some important ancient magazines: <a href="ezines.htm">Online e-zines</a>. This should help to preserve some parts of our history :-)<br><br> </font><a name="26122012"></a><b>26.12.2012:</b><font size="2"> The <a href="valhalla3.zip">valhalla III</a> magazine has been released 5 days ago by hh86. For convenience, I have uploaded an <a href="v3/">online version of valhalla#3</a>. Contributors are hh86, roy g biv, (o), R3s1stanc3 and myself; herm1t wrote a nice guest comment and interviewees are <a href="https://sites.google.com/site/ericfiliol/">Eric Filiol</a>, <a href="http://www.cs.sjsu.edu/~stamp">Mark Stamp</a> and VirusBuster/ex-29A. The magazine contains so many new ideas about self-replicating codes: viruses with many new methods to obfuscate themselves, by using neverused novel instruction-sets, virtual code, own debuggers or inline JScript/CFF scripts; new true RNGs in viruses, infections of JAR files using JavaCompiler, ... <br><br> I have uploaded my contributes separately on my page. My main contribute is the <a href="Transcriptase.rar">first metamorphic script virus, written in JavaScript</a> and an article which describes <a href="MSCJS.txt">how the metamorphism and self-compiling compiler is implemented in JavaScript</a>. A second article is about <a href="MetaLanguage.txt">meta-level languages used in viruses</a> and what the highest level language could be. One text deals with <a href="BTTF.txt">past expectations of viruswriters about the future of computerviruses</a>, there I collected quotes from 42 interviews with VXers back to 1993, and in the end give a prognosis myself. Highly interesting interviews with <a href="intEricFiliol.txt">Eric Filiol</a> (head of EICAR) and <a href="intMarkStamp.txt">Mark Stamp</a> (professor and academic reseracher in computer virology) have been done, giving clear neutral pictures of the potential advancements and problems with computer viruses and fascinating insights and opinions on military usage of malware. Together with hh86, we <a href="intVirusBuster.txt">interviewed VirusBuster mainly about 29A</a>.<br><br> The editor of valhalla and one of the best viruswriters has finally got a new homepage: <a href="http://hh86.virii.lu/">hh86's room</a>. Another contributor of valhalla3 and member of <a href="http://ezine.vxnetw0rk.ws/">DarK-CodeZ</a> has a homepage too: <a href="http://r3s1stanc3.virii.lu/">r3s1stanc3</a>.<br><br> Virus-writing is obviously alive. Our main library, <a href="http://vx.netlux.org">VX heavens maintained by herm1t</a>, is still temporarily unavailable - but I expect it to be back soon. Meanwhile, Perforin (who is also my host) provides <a href="http://download.adamas.ai/">big parts of VXers history</a> such as many of the most important ancient and modern e-zines, and <a href="http://cryptohub.nl/zines/vxheavens/">DrWhax has mirrored VX Heavens</a>. Due to persons such as Perforin, hh86, herm1t, DrWhax (motivated and excellent organizers) and many other contributors, the real original VXing has no chance to die! :-)<br><br><br> </font><a name="21122012"></a><b>21.12.2012:</b><font size="2"> VX e-zine <a href="valhalla3.zip">valhalla III</a> has been released by hh86.<br><br> </font><a name="08122012"></a><b>08.12.2012:</b><font size="2"> Finally, after about four months of planning, coding and bug-fixing, I have finished my latest project. It's one of my most complex codes, and most likely the code which was most difficult to debug. At the moment I'm writing the corresponding article - the whole project will be released soon I hope :-)<br><br>In November issue of VirusBulletin, Peter Ferrie has written a text called <a href="addisco.pdf">Is Our Viruses Learning?</a> about my project to <a href="addisco.rar">autonomously finding new anti-emulation tricks</a> . If you want to understand the idea in more detail, you can read my text about it: <a href="dynamic_anti_emulation.txt">Dynamic Anti-Emulation using Blackbox Analysis</a><br><br><br> </font><a name="08102012"></a><b>08.10.2012:</b><font size="2"> An analysis about my <a href="filly.rar">W32.Filly</a> has been released in last issue of VirusBulletin, written by Peter Ferrie, called <a href="frilly.pdf">"LAHF"ing All The Way</a>. Some quotes: <i>Now we have a virus which decodes itself by using a much more subtle side effect of multiple instructions - the state of the CPU flags.</i>, <i>the virus will encode the contents using a very interesting encoding method</i> or <i>Viruses that integrate the encoded virus body are a nuisance for static analysis, because there is no easy way to decrypt the non-existent single block of data.</i>... :-) It seems like my <a href="addisco.rar">W32.Addisco</a> should have been the next target for analysis, but according to <a href="http://pferrie.host22.com/">Ferrie's homepage</a> its delayed until November.<br><br>Some news from coding side: I'm working on something new and hopefully interesting, and I underestimated its complexity and expenditure of time. However, the engine is ready and works quite fine; and the translation of the whole code is in a pretty advanced state. Hopefully the translation can be finished by the end of this week, and the whole concept be put together afterwards.<br><br><br> </font><a name="22082012"></a><b>22.08.2012:</b><font size="2"> <a href="WhatAreWeDoing.js.txt">A small preview</a> - now guess what I'm doing ;-) ... Much to work now, have to get back to it.<br><br> </font><a name="18082012"></a><b>18.08.2012:</b><font size="2"> Found something funny today: Concept-Sheets for two viruses I wanted to write in 2005 and 2006: The first one (<a href="ArchivTiger.PNG">1</a>) shows some first ideas about the implementation of <a href="overfile.txt">Over-File Splitting </a>, which later leaded to my most complex virus from that time: <a href="ArchiveTiger.rar">ArchiveTiger</a> (see <a href="http://www.mcafee.com/threat-intelligence/malware/default.aspx?id=139466">short description</a>). The second one (<a href="CodeViaBehaviour1.PNG">1</a>,<a href="CodeViaBehaviour2.PNG">2</a>,<a href="CodeViaBehaviour3.PNG">3</a>) is a concept for <a href="covbeh.txt">Code via Behaviour</a>. I was not able to implement it at that time (end of 2006). But four years later when I started again, in end of 2010, I finally coded the <a href="mimic.rar">Mimic-virus</a> (implementation is explained in <a href="CvB.txt">Code Mutations via Behaviour Analysis</a>) - which is among the most complex kitties i've ever written... OK - enough history and nostalgia - I will be back very soon with some actual news :-)<br><br> </font><a name="09082012"></a><b>09.08.2012:</b><font size="2"> This news is a few days delayed, but here it is: <a href="http://ezine.vxnetw0rk.ws/mag4/">Dark-CodeZ#4</a> has been released (<a href="http://download.adamas.ai/cgi-bin/dlbase.cgi?dir=/ezines/Dark-CodeZ">offline version</a>). Contains some unexpected things like a <a href="http://ezine.vxnetw0rk.ws/mag4/Code/Perforin/Tevil.html">maleware that uses Samsung TVs</a> :-o :-) Well done to the editors <a href="http://virii.lu/">Perforin</a> and <a href="http://www.r3s1stanc3.co.cc/">R3s1stanc3</a>!<br><br> </font><a name="28072012"></a><b>28.07.2012:</b><font size="2"> Belial has released a good technical article about implementing an PE Crypter called <a href="http://www.nullsecurity.net/papers/nullsec-pe-crypter.pdf">Hyperion: Implementation of a PE-Crypter</a> (<a href="http://www.nullsecurity.net/papers/belial_bsides_2012_slides.pdf">Slides</a>, <a href="http://www.nullsecurity.net/tools/binary/Hyperion-1.0.zip">Source</a>). On his russian blog, <a href="http://lj.rossia.org/users/herm1t/">herm1t</a> made some entries recently - one says he's free and fine (and other things google-translate cant translate), and the other he shows some code snaps. Is he coding again? :-). <a href="http://www.virii.lu/">Perforin</a> just told me that <a href="http://download.adamas.ai/cgi-bin/dlbase.cgi?dir=/ezines/Dark-CodeZ">Dark-CodeZ</a>#4 magazine will be released very soon, with a higher asm density - i'm looking forward :-). I wrote virus writing predicitons for 2011 and 2012 in VX Heavens forum. As the page is down currently, I copied an old google-snapshot of it: <a href="predictions2012.txt">Virus Writing Predictions 2012</a> (some URLs are missing sorry) - several things has been done, but we have to work hard to fulfill more of them!<br><br> </font><a name="24072012"></a><b>24.07.2012:</b><font size="2"> Good news: <a href="https://eof-project.net/">EOF Project</a> homepage is back, having a very active blog now, and a collection of many important vx magazines - including <a href="https://eof-project.net/?page_id=258">some</a> <a href="https://eof-project.net/?page_id=46">awesome</a> <a href="https://eof-project.net/?page_id=221">pictures</a> which I've never seen due to incompability of those old magazines with todays Windows. Well done, continue like this! - Oh, and I guess <a href="http://www.bbc.co.uk/schools/gcsebitesize/science/images/prism.jpg">somebody</a> has to contact me as I can not contact you!<br><br> </font><a name="01072012"></a><b>01.07.2012:</b><font size="2"> Mousafa Saleh released his thesis called <a href="http://arxiv.org/abs/1206.5871">Towards Metamorphic Virus Recognition Using Eigenviruses</a>. There he presents a novel way to detect metamorphic computer viruses using similar technology as used in face recognition. In the experiments, he uses G2, viruses from SnakeBytes NGVCK, Z0MBie's ZPerm, Mental Drillers MetaPHOR and my Evolus/Flibi virus - for all of hem he gets very good results. The Flibi virus used in the experiments were a beta-version of <a href="ArtEvol.html">Evolus</a>, and in fact in the conversations with him I were able to improve the stealth technology (and I hope as well he got several ideas for improving his original concept). I hope there will be follow up work on this great creative idea to detect metamorphic viruses.<br><br> </font><a name="30062012"></a><b>30.06.2012:</b><font size="2"> Apparently nic.de.vu decided to deactivate my spth.de.vu redirect. That is very sad as this addresse was active for more then 10 years. I have not got an response, but I'll try again and post here when I can find something out. At <a href="https://twitter.com/SPTHvx">my Twitter account (SPTHvx)</a> I'll always have an updated link to my page hope twitter won't deactive me either :-).<br><br>Herm1t has still not <a href="http//vx.netlux.org/">wrote an update</a> about his case, but somehow I believe things will turn out well, as the whole case was rediculous and he got strong support. For supporting him and his great project, visit <a href="http://www.facebook.com/SavingPrivateHerm1t">SavingPrivateHerm1t</a>!<br><br>After having 7 analysis in VirusBulletin from <a href="Valhalla.zip">valhalla#1</a>; there are already three viruses analysis from <a href="valhalla2.zip">valhalla#2</a> in VB, and several potential candidates are still waiting. And I have a good feeling that viruswriters have continued and will continue creating new ideas, finishing unfinished concepts, disovering new neverseen techniques. You might <a href="mailto:sperl.thomas@gmail.com">contact me</a> for more news or if you have some additional interesting information.<br><br><br> </font><a name="15042012"></a><b>15.04.2012:</b><font size="2"> Virus-Writers are pretty active, there is <a href="ApproximateReal8_6Calc.jpg">one finished</a> and one <a href="FancyRank1tensorAddon.jpg">near to finished piece of art</a> by hh86, other people are diligent too. And I am just at starting also a new project, something that I have mentioned in <a href="valhalla2.zip">valhalla2</a>. It will be released when the <a href="http://www.youtube.com/watch?v=Z0GFRcFm-aY">countdown hits zero</a>...<br><br> </font><a name="03042012"></a><b>03.04.2012:</b><font size="2"> Peter Ferrie's text about my <a href="Matlab.MicrophoneFever2.rar">Matlab.MicrophoneFever2</a> is available: <a href="mifeve.pdf">Not 'Mifeve'-ourite Thing</a>. It is a very detailed 8.5 pages techniqual analysis about MF2, including especially one nice quote "<i>The virus is extremely complex, but amazingly stable despite its size</i>". It also seems that this code gave <a href="http://pferrie.host22.com/">Peter</a> some tough time, alluding to the "Perhaps the author of the virus became as tired of writing it as I did of reading it" and the title, which maybe stands for "Not my favourite thing" :-) In any case, after analysing he found some structural weaknesses and made a good detection routine. Now Microsoft Security Essentials is the only AV who can detect this virus (according to VirusTotal). Well done!<br><br>
</font><a name="02042012"></a><b>02.04.2012:</b><font size="2"> <a href="https://sites.google.com/site/ericfiliol/">Eric Filiol</a> just wrote a wonderful <a href="http://cvo-lab.blogspot.fr/2012/04/saving-private-herm1t.html">supportive letter</a> for herm1t. I hope other rational thinking security experts/researchers follow his great example. Peter Ferrie's text hh86's 32bit and 64bit cross infector W48.Sofia (in <a href="Valhalla.zip">valhalla#1</a>) called "'Amfibee'-ous vehicle" has been released in <a href="http://www.virusbtn.com/virusbulletin/archive/2012/04/vb201204-amfibee">this month's VB</a>. After writing three texts about evolvable viruses last year (<a href="http://pferrie.host22.com/papers/flibi.pdf">1</a>, <a href="http://pferrie.host22.com/papers/flibi2.pdf">2</a>, <a href="http://pferrie.host22.com/papers/flibi3.pdf">3</a>), he draws some funny conclusion to evolution again: "<i>A virus that can run its code natively on both 32-bit and 64-bit platforms is a bit like a lungfish that can live in water or on land (but perhaps less ugly). Fortunately, this virus is in the early stages of evolution - however, we can probably expect to see future advances in this technique.</i>". To every VXer out there, <a href="mailto:virii@tormail.org">Perforin</a> is offering hosting for you - contact him! Thanks alot perforin - again! :) And, you can <a href="https://twitter.com/#!/SPTHvx">follow me at twitter</a> and subscript my <a href="spth.rdf">RSS feeds</a>.<br><br> </font><a name="28032012"></a><b>28.03.2012:</b><font size="2"> <br><a href="http://vx.netlux.org">VX Heavens</a> has been shut down by urkainian police "due to the criminal investigation" (<a href="VXHeavensDown.html">here you find the original post by herm1t</a>). It's disgraceful to close down this clearly white-hat library, which has provided free information for all of us (academic and professional security researchers, programming enthusiasts, anti virus analysts, ...). I can't believe and <b>it's a shame</b> that such ignorantly <a href="http://en.wikipedia.org/wiki/Censorship">closing of a library and source of knowlegde</a> is still possible in Europe; thought this is a weapon of <a href="http://en.wikipedia.org/wiki/Book_burning">retarted anti-democratic regimes</a> only. herm1t talks about a "tip-off" by somebody - now I wonder if its connected to <a href="kav.txt">some old</a> or <a href="#15122011">recent investigations</a> by KAV or a different antivirus company... I wish herm1t all the best such that he can clarify all absurtities that he is faced now!!!<br><br>As you can see - I have a new host: <a href="http://adamas.ai">Perforin</a> - thanks alot for this great possibility! (As last 10 year, you can reach my homepage via <b>www.spth.de.vu</b> - this always links to my current host.) He decided to host also other PoC-vxers, if you are interested, write him <a href="mailto: virii@tormail.net">an email</a>. Thanks again Perforin, this is a very important offer!! (The good thing: Server is in luxembourg, which is part of the civilized liberal europe, which most likely will not investigate against libraries.)<br><br>Of course, we will not stop researching in computer virology, discovering new technologies and make this knowlegde public such as we did in recent years. We will continue, and all vxers I have talked so far said the same: They can not supress us by such inglorious soviet-methods. So many new ideas for viruses are arround, so many new fields which should be analysed, so many techniques to discover and improve. There is much to do for us - we are already working on it, and we will continue working on it.<br><br>In the end, you can download some of the important VX magazines in recent years: , <a href="mtx3.zip">MATRIX#3 (2001)</a>, <a href="29a-6.zip">29a#6 (2002)</a>, <a href="29a-7fe.zip">29a#7 (2004)</a>, <a href="29a-8.zip">29a#8 (2005)</a>, <a href="rrlf6.zip">rRlf#6 (2005)</a>, <a href="rrlf7.zip">rRlf#7 (2006)</a>, <a href="coderz3.zip">coderz#3 (2003)</a>, <a href="EOF_0x01.zip">EOF#1 (2006)</a>, <a href="edr.zip">EOF-DoomRiderz-rRlf zine (2007)</a>, <a href="eof_3.rar">EOF#3 (2011)</a>, <a href="0_virus writing bulletin.zip">VwB-2011 (2011)</a>, <a href="Valhalla.zip">valhalla#1 (2011)</a>, <a href="valhalla2.zip">valhalla#2 (2012)</a>, <a href="b8_3.zip">Brigada Ocho#3 (2011)</a> - a big collection of vx-magazines is avainable <a href="http://download.adamas.ai/cgi-bin/dlbase.cgi?dir=/ezines">here</a>.<br><br><br> </font><a name="15032012"></a><b>15.03.2012:</b><font size="2"> Ladies and gentlemen: <a href="valhalla2.zip">Valhalla 2</a>!<br><br> </font><a name="03032012"></a><b>03.03.2012:</b><font size="2"> In <a href="http://www.virusbtn.com/news/2012/03_01_vb.xml">Virus Bulletin March 2012</a>, there is an article about my <a href="Matlab.MicrophoneFever2.rar">MatLab.MicrophoneFever2 virus ("Not 'Mifeve'-ourite thing")</a> by Peter Ferrie. Unfortunatly <a href="mailto:sperl.thomas@gmail.com">I have not seen the article yet</a> - in any case I presume it gave Peter some headaches. :-)<br><br> </font><a name="25022012"></a><b>25.02.2012:</b><font size="2"> Just lost a bet, so: hh86 is an extremely fast coder - <a href="http://webspace.webring.com/people/ba/aurora_monday/fizzy.gif">congratulations</a>! :-)<br><br> </font><a name="19022012"></a><b>19.02.2012:</b><font size="2"> Just finished a polymorphic self-replicator, whichs code appears as the shadow of some overlayed instruction-flow - you will see soon what this means :-). Do you remember my <a href="http://vx.netlux.org/forum/viewtopic.php?id=2029">10 Virus-Writing predictions</a> for this year? Well - in march at least two of them will be fulfilled... and once again, if you are writing viruses, having good ideas, <a href="main.htm#15012012">etc.etc.</a> - and we have not talked last two months - you should write me an <a href="mailto:sperl.thomas@gmail.com">e-Mail</a> immediatly!<br><br> </font><a name="29012012"></a><b>29.01.2012:</b><font size="2"> I have played with a <a href="http://arxiv.org/abs/quant-ph/0208149">semi-quantum version of the game of Life</a>, that's a cellular automata developed by Adrian Flitney and Derek Abbott and released in the great book <a href="http://en.wikipedia.org/wiki/Quantum_Aspects_of_Life">Quantum Aspects of Life</a>. I've created a video which shows the difference between the classical rules, an intermediate version and the final semi-quantum game of life: <a href="http://www.youtube.com/watch?v=yogLQB-s8dw">Game of Life: from Classic to Semi-Quantum</a> - hope you enjoy! More about this topic maybe another time.<br><br> </font><a name="15012012"></a><b>15.01.2012:</b><font size="2"><br>If you are interested in virus-writing;<br> if you consider virus-writing as an artistical and intellectual challenge;<br> if you loathe criminals who spread malware for earning money;<br> if you enjoy thinking about new ways to hide and spread;<br> if you love seeing virgin platforms touched for the very first time;<br> if you want this kind of virus-writing to continue - <br><br> then you should immediatly <a href="mailto:sperl.thomas@gmail.com">contact me</a>! #60days2go<br><br><br> </font><a name="14012012"></a><b>14.01.2012:</b><font size="2"> My <a href="http://vx.netlux.org/forum/viewtopic.php?id=2029">Virus-Writing predictions for 2012</a>. Hope you help to fullfill them! :-)<br><br> </font><a name="30122011"></a><b>30.12.2011:</b><font size="2"> I found this stupid behaviour of notepad.exe (at WinXP SP3 32bit and Win7 64bit) yesterday: Write "<strong>{-42,237},</strong>" (without quotes) to notepad.exe, save, close and open again. It will be interpreted as <a href="NUBnotepad.PNG">Unicode by Notepad</a>, but in fact it is <a href="NUBHex.PNG">ANSI as a Hex-Editor</a> says. It seems like notepad uses <a href="http://msdn.microsoft.com/en-us/library/windows/desktop/dd318672%28v=vs.85%29.aspx">IsTextUnicode</a> to find out whether a text is unicode. Notepad might use lpiResult-Parameter to be NULL, such that the API runs every test; now the test for IS_TEXT_UNICODE_STATISTICS and IS_TEXT_UNICODE_UNICODE_MASK returns TRUE. Dont know why the text fullfills some Unicode-Masks. Maybe some <a href="http://en.wikipedia.org/wiki/Bush_hid_the_facts">new easteregg</a>?<br><br> </font><a name="18122011"></a><b>18.12.2011:</b><font size="2"> A very interesting paper has been released: <a href="EigenvirusesForMetamorphicVirusRecognition.pdf">Eigenviruses for metamorphic virus recognition</a> by M.E.Saleh, A.B.Mohamed and A.A.Nabi in <a href="http://digital-library.theiet.org/IET-IFS">IET Information Security</a>. The article covers the detection of metamorphic viruses using a novel and very intuitive methode called <em>Eigenvirus</em>. Eigenviruses are an analogon to <a href="http://en.wikipedia.org/wiki/Eigenface">Eigenfaces</a> for human face recognition. The main idea is to decompose viruses into a set of eigenvectors (called eigenviruses here). At detection, the principal components of the decomposition are compared with a prepared set of known generations of a virus. This is similar to a projection to a sub-vectorspace - the hypothesis of the paper is that for each generation of a specific metamorphic virus, this sub-vectorspace is similar, thus can be used for recognizion/detection. The authors prove their hypothesis by successfully detecting G2, NGVCK, Zperm and MetaPHOR very efficiently and with low false-positive.<br><br> </font><a name="15122011"></a><b>15.12.2011:</b><font size="2"> Have been watching the trial of an austrian Bootkit writer <a href="http://www.stoned-vienna.com/">Peter Kleissner</a> today. He was accused of <a href="http://www.jusline.at/126c_Missbrauch_von_Computerprogrammen_oder_Zugangsdaten_StGB.html">&#167 126c StGB</a> - rawly translated "abuse of computer programms". This law also talks about the creation or adaptation of general malicous software - which was the case for Peter Kleissner, who created Stoned Bootkit, presented it at hacker conferences (BlackHat,...) and at his homepage. After 7-8h hearing, including two programmers from <a href="http://www.ikarus.at/en/">Ikarus</a>, the sentence was one of acquittal. The reason was (and this is interesting for any austrian malware author - I wonder if there is one?! :-) ) that software has to be predominantly created for malicous reasons, which was not the case for Peter. The public prosecutor immediatly declarated nullity, such that the case goes to court of next instance. One interesting thing is, that the case was started by our friends - the <a href="http://forum.vxheavens.com/viewtopic.php?id=692">KAV dolls</a>; they informed the prosecutor that Peter is writing a bootkit and sent him preliminary data.<br><br> </font><a name="04122011"></a><b>04.12.2011:</b><font size="2"> Peter Ferrie has released his 3rd paper about my <a href="ArtEvol.html">artificial evolution</a> project: <a href="flibi3.pdf">Flibi: Reloaded</a>. From the conclusion: "W32/Flibi is more like a life-form than ever before. It looks like a heavily armoured threat whose spread might be difficult to stop [...]".<br><br> </font><a name="15102011"></a><b>15.10.2011:</b><font size="2"> Just went thru some old eMails, and discovered an <a href="Sophos_AV.mp3">MP3 about viruswriters by Sophos from 2004</a>. Funny :-)<br><br> </font><a name="12102011"></a><b>12.10.2011:</b><font size="2"> <br>While finishing the article to my latest project, I realized that it might fullfill <a href="http://en.wikipedia.org/wiki/Tom_M._Mitchell">Tom Mitchell</a>'s definition of <a href="http://en.wikipedia.org/wiki/Machine_learning#Definition">machine learning</a>. I suspect the underlying concept to be useful for many other applications too - in fact I have already used it one time for a mutation engine, without being aware of its possible capacity :-) I'm releasing the engine and the article in future (you might speculate what this mean - if you are curious, send me an <a href="try_this:sperl.thomas_gmail">e-Mail</a>).<br><br>In June, <a href="ArtEvol.htm">Evolus</a> has been analysed using a special statistical methode called "Eigenvirus" (a wonderful technique similar to <a href="http://en.wikipedia.org/wiki/Eigenface">Eigenfaces</a>, but for metamorphic virus detection; introduction article will be released in <a href="http://www.springer.com/computer/security+and+cryptology/journal/10207">International Journal of Information Security</a> in December 2011). The analysis helped me alot to find and correct possible weak points. The researcher promised me to prepare a public available summary of Evolus' analysis very soon, I wish he does :-)<br><br>I decided to try Twitter. As you visit my homepage, you seem to be interested in those topics, so just <a href="http://twitter.com/#!/SPTHvx">follow me</a>!<br><br><br>
</font><a name="09102011"></a><b>09.10.2011:</b><font size="2"> Recently I thought it would be of some value to learn about the PE format. So I took <a href="http://vx.netlux.org/vx.php?id=zv18">W32.Sigrun by hh86</a>, printed the source and analysed it. I made a few adjustments such that the MASM code is compileable in FASM, you can find it (together with the commented off-line source :-D) <a href="sigrun_FASM.rar">here</a>. After reading the <a href="http://forum.vxheavens.com/viewtopic.php?id=1563">latest issue of VirusBulletin</a>, I suddenly got an idea what could be a subject for a virus to learn and how it can do so. The proof-of-concept code is finished (its easier than expected), an article covering the topic will be written now. :-)<br><br> </font><a name="01102011"></a><b>01.10.2011:</b><font size="2"> A third article about my <a href="ArtEvol.html">Artificial Evolution project</a> will be released in VirusBulletin November 2011 according to <a href="http://pferrie.host22.com/">Peter Ferrie</a>. :-)<br><br> </font><a name="28092011"></a><b>28.09.2011:</b><font size="2"> <br>While at <a href="http://www.virusbtn.com/conference/vb2011/programme/index">VB2011 conference</a> - which starts in a few days - there are <a href="http://www.virusbtn.com/conference/vb2011/abstracts/Assolini.xml">several</a> <a href="http://www.virusbtn.com/conference/vb2011/abstracts/SchipkaNikishin.xml">interesting</a> <a href="http://www.virusbtn.com/conference/vb2011/abstracts/CosoiDichiu.xml">topics</a> announced, one talk is especially funny: <a href="http://www.virusbtn.com/conference/vb2011/abstracts/Muttik.xml">Malware mining</a> by Igor Muttik of McAfee, about heuristic detection methods. OK - Stop now - let's remember: <a href="http://slashdot.org/story/06/03/13/1322215/mcafee-anti-virus-causes-widespread-file-damage">McAfee Anti-Virus Causes Widespread File Damage</a> and <a href="main.htm#24082011">my old entry about them</a>. So the company with the worst heuristic is giving a talk about it. I wish with their research they will fix their own product.<br><br>While many AV companies are <a href="http://www.f-secure.com/weblog/archives/00000346.html">pretty narrow-minded</a> about hiring virus researchers with empirical knowledge, this is not the case for serious security researchers: <a href="http://www.ted.com/talks/misha_glenny_hire_the_hackers.html">TED Talk: Misha Glenny: Hire the hackers!</a><br><br>Found a very funny response on <a href="http://vxheavens.com/lib/iv055.html">hh86's interview</a>: <a href="http://black-of-hat.blogspot.com/2010/12/chick-virus-writers.html">Chick Virus Writers</a> :-)<br><br><br>
</font><a name="14092011"></a><b>14.09.2011:</b><font size="2"> There is a new virus-coder called <a href="http://corrupt_genetix.vxer.org/">c0rRuPt G3n3t!x</a>, who is working on quite interesting virus-techniques (including Java-Infection and C# viruses) - worth to keep an eye on him :-)... Recently I stumbled upon Orr's analysis of two metamorphic viruses: <a href="http://www.openrce.org/articles/full_view/27">The Viral Darwinism of W32.Evol</a> and <a href="http://www.openrce.org/articles/full_view/29">The Molecular Virology of Lexotan32: Metamorphism Illustrated</a> - a must-read! No fancy vx-news from me yet; just a small extention to a <a href="http://vx.netlux.org/lib/vrg18.html">script technique by roy g biv</a> is finished. Some more interesting things are in my mind, but not far enough developed to present it; hopefully by the end of this month planning will be exchanged with codeing again. :-)<br><br> </font><a name="27082011"></a><b>27.08.2011:</b><font size="2"> <br><a href="http://eof-project.net/eof_3.rar">EOF#3</a> has been released today, with some cool things in it. <a href="http://herm1t.vxer.org/">herm1t</a> has done a project (<i>Advanced EPO: Deeper, longer and harder</i> and <i>Linux.RELx</i>) to infect a file in the middle of its code flow graph, which is clearly the most advanced EPO technique so far. I wonder whether there is a way to improving it further - can't imagine anything. One of the best creations that I've seen in long time, well done! :-) pr0mix wrote a text called <i>"Smart" trash: building of logic</i> (and engine <i>xTG 2.0</i>), which analyses trash generators and possible weaknesses/mistakes. It's absolutly worth a read if you plan to work on similar topics.<br><br>kefi has written six pretty interesting short papers in 2009 (signed with <a href="http://en.wikipedia.org/wiki/Discordian_calendar">discordian calendar</a>). One is about spreading worms using rapidshare (i wonder whether this 2 year old technique still works today); and one is called <i>undeletables in windows vista</i>, which is a technique that <a href="http://spth.vxheavens.com/UDF.txt">I have talked about 9 years ago</a> for Windows 95,98,ME, already. It's a way to abuse a weakness of Windows Vista to make your viruses undeleteable. Interestingly this bug has been fixed in Windows XP, and reintroduced in Vista. Can one still use this technique in Windows Vista and Windows 7? I will try some day :-). There is also a polymorphic python virus PY.Lame.c by him in the magazine.<br><br>Malum wrote a DOS infector which just consists of [a-z;A-Z], using (byte XYh --> word 0X0Yh+'aa') and a special decryptor (same idea as my <a href="eicART.rar">eicART</a>, but better :-) ), F0g wrote a FreeBSD virus that used Merging of segments to infect files, and maybe some other interesting things, too. After <a href="http://vx.netlux.org/vx.php?id=zb02&lang=en&amp;fid=1942#f1942">Brigada Ocho #3</a> and <a href="http://vx.netlux.org/vx.php?id=zv18">Valhalla #1</a>, this is now the 3rd virus-magazine released within very short time: Good to see that still some people are working on interesting things :-)<br><br><br> </font><a name="24082011"></a><b>24.08.2011:</b><font size="2"> I proudly present <a href="mfave.txt">the most awesome computer virus ever according to McAfee</a> (its just a .txt). Check the <a href="vt.PNG">scanning result</a> (or <a href="http://www.virustotal.com/file-scan/report.html?id=fd75da5872a25f15fdf4e7dadbd8a82ef51a8243b7930a141d8bf92f9c2611f2-1314212268">original link</a>), where McAfee team shows its skill and beats every other AV. Together with their former <a href="http://it.slashdot.org/article.pl?sid=06/03/13/1322215&amp;from=rss">detection of GriYo's CTX (where McAfee destroyed massively data of their customers)</a>, this is one of their best coups. Congratulations to the genious crew!!!<br><br> </font><a name="16082011"></a><b>16.08.2011:</b><font size="2"><br> I went thru <a href="http://vx.netlux.org/vx.php?id=zb02&lang=en&amp;fid=1942#f1942">Brigada Ocho#3</a> recently, and want to guide your attention to some pretty interesting things by alcopaul: In the text <i>Why Did I Write Perrun.NET?</i>, he describes the concept of his new JPGE virus: First cool trick - Perrun.NET adds itself as a ZIP archive to the JPGE file, such that it is a valid JPGE and a valid ZIP file at the same moment; in this ZIP file, there is the virus-file. Then comes the second trick: Perrun.NET writes a message into the actual picture that the user should open it with a ZIP extractor (!). Nice thing - next step: MP3-file infection (with some voice telling to open it as ZIP) or MPGE-file infection (there are nice ways to guide people to do stupid things i think hrhrr). In the text <i>C# Random Subroutine Sequencing</i> he shows a pretty technique how simple permutation in C# could look like. Then there is <i>Growing Programs</i>, where alcopaul talks about an idea (multiplying+modifying subroutines), which is non-usual, and somehow i feel this could be used for funny mutation engines :-)<br><br><a href="http://herm1t.vxer.org/2011/08/stab-in-back.html">herm1t</a> has posted a pretty interesting entry about polymorphism and grammar - especially about grammar and instruction transposition. I wondered how one can find a simple algorithm about that, and wrote a very small thing: <a href="InstrTransp.PNG">Instruction Transposition</a>. Nothing ground breaking - just wrote it down because I didnt see the soluton immediatly.<br><br><br> </font><a href=16082011></a><b>16.08.2011:</b><font size="2"><br> I went thru <a href="http://vx.netlux.org/vx.php?id=zb02&amp;lang=en&amp;fid=1942#f1942">Brigada Ocho#3</a> recently, and want to guide your attention to some pretty interesting things by alcopaul: In the text <strong>Why Did I Write Perrun.NET?</strong>, he describes the concept of his new JPGE virus: First cool trick - Perrun.NET adds itself as a ZIP archive to the JPGE file, such that it is a valid JPGE and a valid ZIP file at the same moment; in this ZIP file, there is the virus-file. Then comes the second trick: Perrun.NET writes a message into the actual picture that the user should open it with a ZIP extractor (!). Nice thing - next step: MP3-file infection (with some voice telling to open it as ZIP) or MPGE-file infection (there are nice ways to guide people to do stupid things i think hrhrr). In the text <strong>C# Random Subroutine Sequencing</strong> he shows a pretty technique how simple permutation in C# could look like. Then there is <strong>Growing Programs</strong>, where alcopaul talks about an idea (multiplying+modifying subroutines), which is non-usual, and somehow i feel this could be used for funny mutation engines :-)<br><br><a href="http://herm1t.vxer.org/2011/08/stab-in-back.html">herm1t</a> has posted a pretty interesting entry about polymorphism and grammar - especially about grammar and instruction transposition. I wondered how one can find a simple algorithm about that, and wrote a very small thing: <a href="InstrTransp.PNG">Instruction Transposition</a>. Nothing ground breaking - just wrote it down because I didnt see the soluton immediatly.<br><br><br> </font><a href=05082011></a><b>05.08.2011:</b><font size="2"><br> hh86 has released <a href="Valhalla.zip">Valhalla magazine</a>! It contains hot new stuff: two Win32/Win64 cross-platform viruses (one by rgb using the Heavens Gate; one by hh86 using native code), two polymorphic viruses using MMX instructions for encryption (by hh86), one Cross-Infector for Win32/010 Editor Scripts (by rgb), one virus with new EPO infection technique using Exception directory (by hh86), a brief and pretty interesting overview of Statistical Detection Techniques and possible counter measurements (by m0sa), several nice script techniques, - and my stuff ;-)<br><br>I uploaded my contributes separatly: Two articles <a href="IncDetComplex.txt">Some ideas to increase detection complexity</a>, <a href="ArtEvol3.pdf">Imitation of Life: Advanced system for native Artificial Evolution</a> and three viruses: <a href="evolus.rar">Evolus</a> (evolved version of Evoris - <a href="ArtEvol.html">artificial evolution</a> worm including several other mutation technique, polymorphism, Start- and Stop-codons), <a href="Matlab.MicrophoneFever2.rar">Matlab.MicrophoneFever2</a> (improved version of Matlab.MicrophoneFever, fixed a few weaknesses and included partial encryption with trigonometric and algebraic functions) and <a href="w32.kitti.rar">W32.Kitti</a> (a polymorphic virus that can change its instructions to other instruction using overlapping code).<br><br>Now there are over 9.000 things that should be finished! Let's start! :-)<br><br><br> </font><a href=20072011></a><b>20.07.2011:</b><font size="2"> herm1t has decided to give non-russian readers the chance to follow his blog (without crappy rus->eng translation engines): <a href="http://herm1t.vxer.org/">herm1t.vxer.org</a>. Cool URL, btw! :-)<br><br> </font><a href=04072011></a><b>04.07.2011:</b><font size="2"> Finished Evoris 2: Evolus, and finished an article called "Advanced native Artificial Evolution". Will be released within the next four weeks. Now I'm closing this project for a while and playing with other ideas :-)<br><br> </font><a href=23062011></a><b>23.06.2011:</b><font size="2"> Feeling funny today, I have uploaded a <a href="Cassandra-testset.rar">collection of 350 different representations</a> of my old JS.Cassandra. This is a highly polymorphic virus created in 2004, <a href="http://www.virustotal.com/file-scan/report.html?id=6f36297b2264310678834a7553b6bd7e50317adeb66118ac051dee00a8aaa58d-1308787559">and</a> <a href="http://www.virustotal.com/file-scan/report.html?id=2e4dc93c41a4d62037e098c0699785cc44718bf49510fca5d56059eb4bbb4d43-1308001245">still</a> <a href="http://virusscan.jotti.org/de/scanresult/bab59c7a0595870b8cdbf0908c3e56111d2cb847">is</a> <a href="http://virusscan.jotti.org/de/scanresult/e93fc984f45333114474cdd1b4410a4c0d1f695b">not</a> <a href="http://virusscan.jotti.org/de/scanresult/c12ed9226b913093d073d76f3768d83f05640432">detected</a> <a href="http://virusscan.jotti.org/de/scanresult/3d088a302baa29f0ead15190e06d977b34b7a6e8/b12bc79e5f543010831807ea16de228a163fea35">by</a> <a href="http://virusscan.jotti.org/de/scanresult/b0e72160d115c550bc6ecaa51a9d872964bd21de">most</a> <a href="http://www.virustotal.com/file-scan/report.html?id=2e4dc93c41a4d62037e098c0699785cc44718bf49510fca5d56059eb4bbb4d43-1308001245">AVs</a>. (Well done Microsoft for being the only program who detected all variants I've tested - would be interesting if it's actually a good detection-algorithm or just some high false-positive tolerance.)... Something more interesting is comming soon, hopefully :-)<br><br> </font><a href=13062011></a><b>13.06.2011:</b><font size="2"> Alcopaul just made a surprise release of <a href="http://bangingatbang.land.ru/b8/">Brigada Ocho #3</a>! :-) It's a very nice synthesis between novel virus technologies and (psychodelic) artworks - a blast from the past. My personal favorite is "one good thing about twitter" - genious! :-D With it, there also comes a little interview with me. - So all in all, nice move alcopaul, thank you!<br><br> </font><a href=03062011></a><b>03.06.2011:</b><font size="2"><br> There has been a second description of my <a href="ArtEvol.html">artificial evolution project</a>, released in Virus Bulletin 05.2011 - the text can be seen here: <a href="flibi2.pdf">Flibi: Evolution</a>. It is a very detailed - 10 pages (!) - analysis of the evolutionary metalanguage of the project. Peter Ferrie has used many clever/beautiful tricks to reduce the original instruction set (44 instructions) to an incredible compact set of 18+2 instructions, without the loss of functionality. I have already applied some of these tricks to the next generation of Evoris, and will analyse its effect on the overall robustness of the codes. The codes and discoverments about that topic (you can see my progress at the <a href="ArtEvol.html">ArtEvol subpage</a>) will be released in about two months.<br><br>Something else: My personal <i>"idiots-of-the-month-Award"</i> goes to <a href="http://www.mcafee.com/">McAfee (idiot#1)</a> and <a href="http://www.avira.com/">Avira AntiVir (idiot#2)</a>, for detecting the plain html pages of my homepage and ArtEvol subpage as malware. This is an obvious sign for unbelievable incompetence (or worse: censorship) - think about that when you install/order an AV program next time. There are several free and much better alternatives out there (for instance <a href="http://www.microsoft.com/security_essentials/">Microsoft Security Essentials</a>). It would be interesting whether some AVs really abuse their "power" and also block other non-malicious websites...<br><br><br> </font><a href=01062011></a><b>01.06.2011:</b><font size="2"> I've uploaded a small but funny <a href="radix.rar">mutation engine for JScript using radix</a>. The possibility for this technique (and any other creative input) has been discovered by hh86 some time ago, who has written a short, unpublished text about it (the text is in the .RAR file, too). The idea is that in JScript you can represent the ASCII code of a character as decimal, hex, binary, octal - or in general with any radix from 2 to 36. Per fortuna we dont have to calculate the results ourselves, but the function <a href="http://www.w3schools.com/jsref/jsref_parseInt.asp">parseInt</a> provides the algorithm, thus using the technique is straight forward.<br><br>
</font><a href=01052011></a><b>01.05.2011:</b><font size="2"><br> Just read an article called <a href="http://scholar.google.com/scholar?q=%22Detection+of+metamorphic+computer+viruses+using+algebraic+specification.%22">Detection of metamorphic computer viruses using algebraic specification</a> - an interesting methode. I wonder whether their rewriting system can be seen as some kind of <a href="http://en.wikipedia.org/wiki/Formal_grammar#The_Chomsky_hierarchy">formal grammar</a>, thus can be bypassed as Eric Filiol has shown in <a href="http://vx.netlux.org/lib/aef04.html">Metamorphism, Formal Grammars and Undecidable Code Mutation</a>?! (Btw: If you have some ideas how to solve the Tzeitsin system T<sub>1</sub> mentioned in IV.A in his article, contact me!)<br><br>The authors of the article, <a href="http://www.csc.liv.ac.uk/~grant/">Grant Malcolm</a> and <a href="http://www.matt-webster.com/">Matt Webster</a> have a very interesting collection of publications on their pages, I'm looking forward reading more about their research.<br><br><br> </font><a href=19042011></a><b>19.04.2011:</b><font size="2"><br> Some days ago, <a href="http://vx.netlux.org/fAMINE/">fAMINE</a> wrote a quite interesting posting. It remembers me on something <a href="http://vxheavens.com/lib/vzo05.html">Z0MBiE</a> once wrote.<br><br> I am currently writing a second version of my <a href="ArtEvol.html">artificial evolution worm</a>. So far, I have rewritten the API hash routine and the NOP-Insertion routine, and I added <a href="http://en.wikipedia.org/wiki/RNA_splicing">START/STOP codons</a>, a kind of <a href="http://en.wikipedia.org/wiki/Horizontal_gene_transfer">horizontal gene transfer</a> and a polymorphism that takes advantage of alphabeth redundances (and has some evolutionary advantages, too). I may write about further updates on the <a href="ArtEvol.html">ArtEvol-subpage</a>.<br><br> <a href="http://eof-project.net/">EOF</a> will release their 3rd issue of the magazine at 27.07.2011, so contribute your best things to them! I offer a small prize to the two most creative contributes to that magazine, read more <a href="http://forum.vxheavens.com/viewtopic.php?pid=5535#p5535">here</a>. :-)<br><br><br>
</font><a href=02042011></a><b>02.04.2011:</b><font size="2"> My <a href="ArtEvol.html">Artificial Evolution worm Evoris</a> has been described in Virus Bulletin 03.2011, the text can be seen here: <a href="flibi.pdf">Flibi night</a>. It seems that there will be a follow-up article about Evoris called "Flibi: Evolution" in Virus Bulletin 05.2011 - according to <a href="http://pferrie.tripod.com/">Peter Ferrie's latest news</a>.<br><br> </font><a href=05032011></a><b>05.03.2011:</b><font size="2"><br> I have just finished the worlds first virus for <a href="http://en.wikipedia.org/wiki/Mathematica">Wolfram Mathematica</a>. Therefore I added an article called <a href="mathematica.txt">Infecting Mathematica Notebook files</a> and the example virus called <a href="mathematica.prometheus.rar">Mathematica.Prometheus</a>.<br><br>It was a small project, yet it needed some tricks. It seems like Wolfram has predicted some sort of malware for Mathematica long ago as they have set some <a href="http://www.wolfram.com/technology/nb/">security structures</a> in the Notebook interpreter. Obviously I'm happy that now I could satisfy their prediction! :-)<br><br><br> </font><a href=25022011></a><b>25.02.2011:</b><font size="2"><br> I've finished my latest project: <a href="Matlab.MicrophoneFever.rar">Matlab.MicrophoneFever</a>. It is a polymorphic Matlab M-File inserter that takes use of complex functions and algorithm provided by Matlab. It aims to combine tau-obfuscation and multi-branching at the regeneration of the virus body.<br><br>Three days before the release, I have sent three infected samples to F-Secure and to Sophos. Using <a href="http://virusscan.jotti.org/de/scanresult/dd505a07f24a9094d81d8232e47482edf24bfe10">Jotti Malewarescanner</a>, one can see that Sophos has added the three files to their database (as MLB/Camel-B) - but does NOT detect the virus itself, they fail to detect any other sample of the virus. OK - and F-Secure? They did not detect anything, not even the three infected samples - even they verified receiving. Some days ago, they proudly announced the <a href="http://www.f-secure.com/weblog/archives/00002091.html">winning of some AV award</a>. Now I wonder whether Poika is proud of that result? :-)<br><br><br> </font><a name=10022011></a><b>10.02.2011:</b><font size="2"><br> My latest kitty is finished soon - probably this weekend (it is a combination of tau-obfuscation and multi-branch construction of the viral body - written in a language that perfectly fitts the requirements), more informations about it when it's released.<br><br>Somehow old news, in the days of twitter, however: Mikko Hypponen has released a nice video called <a href="http://www.youtube.com/watch?v=d8Bpl-BUp0g">From Brain to Stuxnet: 25 Years of Computer Viruses</a>.<br><br>Just saw that my <a href="ArtEvol.html">Artificial Evolution <i>Evoris</i> Worm</a> will be described in VirusBulletin March 2011, the text is called "Flibi Night" (at least the first generation is detected by MMPC as Worm:W32/Flibi.a - it would be interesting to test later generations. I will do that one day and post the results).<br><br><br> </font><a name=18012011></a><b>18.01.2011:</b><font size="2"><br> I've read two very interesting papers recently:<br>First one by Mark Stamp called <a href="http://vx.netlux.org/lib/pdf/Hunting%20for%20undetectable%20metamorphic%20viruses.pdf">Hunting for undetectable metamorphic viruses</a>, which deals with a methode about how to defeat the statistically detection technique Hidden-Markov-Model. The authors developed a technique to manipulate the <i>closeness</i> of two virus samples by including instructions and subfunction of "normal" files. <br><br>The second paper was written by Eric Filiol called <a href="http://vx.netlux.org/lib/pdf/Formalisation%20and%20implementation%20aspects%20of%20K%20-ary%20%28malicious%29%20codes.pdf">Formalisation and implementation aspects of K-ary (malicious) code</a>. K-ary viruses do not stay in one single file but are splitted to multiple files, a very similar technique I have explained in <a href="overfile.txt">Over-File Splitting</a> in 2005 and used in <a href="ArchiveTiger.rar">ArchiveTiger</a> in 2006. The text formalizes the concepts and explaines the implementation of it. I wonder how one could possible create a Class 1-B K-ary virus ("No part is referring to another one. Detecting one part does not endanger the other one").<br>Both texts can be found in <a href="http://www.springer.com/computer/journal/11416">Journal in Computer Virology</a> or at <a href="http://vx.netlux.org/lib/pdf/">VX Heavens PDF page</a>.<br><br>F-Secure will co-operate a course about <a href="http://www.f-secure.com/weblog/archives/00002084.html">Malware Analysis and Antivirus Technologies</a> this year, the lecture notes will be presented <a href="https://noppa.tkk.fi/noppa/kurssi/t-110.6220/uutiset">here</a>, I guess that could be interesting.<br><br><br> </font><a name=09012011></a><b>09.01.2011:</b><font size="2"> I have a new host - thanks a lot to <a href="http://www.vxheavens.com/herm1t/">herm1t</a>. You can also use the redirection <a href="http://www.spth.de.vu/">www.spth.de.vu</a>, which will always point to my current website - just as last nine years.<br><br> </font><a name=01012011></a><b>01.01.2011:</b><font size="2"> hh86 has released <a href="http://vx.netlux.org/hh86/">Virus-writing Bulletin 2011</a>. Go and get it! As I have contributed some things, I uploaded them at my page: <a href="evoris.rar">Evoris</a> (a worm that takes use of the <a href="ArtEvol.html">Artificial Evolution</a> technique I have descriped recently), an article called <a href="CvB.txt">Code Mutations via Behaviour Analysis</a> and the worm <a href="mimic.rar">Mimic</a>, which use this technique.<br><br> </font><a name=30122010></a><b>30.12.2010:</b><font size="2"> A very interesting talk about <a href="http://c3.ex23.de/saal1-2010-12-27_22-52-01.wmv">Stuxnet vulnerabilities by Bruce Dang</a> was held at the 27c3 (the research was done in cooperation with Peter Ferrie, but he got hit by a car recently, so preferes to stay in hospital rather than at the CCC; hope he gets well soon and continues his interesting researches). Mikko Hypponen <a href="http://twitter.com/#!/mikkohypponen/status/20054969944121344">twittered</a> about the interview with hh86 - it's good to see that avers enjoy reading our stuff. ... More to come in two days, hopefully.<br><br> </font><a name=25122010></a><b>25.12.2010:</b><font size="2"> Added an <a href="interviewhh86.txt">interview with hh86</a>, released in <a href="http://vx.netlux.org/dl/mag/dcm3.zip">DarK CodeZ #3</a>. More to come in a few days...<br><br> </font><a name=01112010></a><b>01.11.2010:</b><font size="2"> Added some pictures about the <a href="ArtEvol.html">Time evolution of the Hamming Distance</a> for this Meta-Language approach.<br><br> </font><a name=26102010></a><b>26.10.2010:</b><font size="2"> Added a very short article called <a href="ArtEvol.html">Mutational Robustness in x86 systems</a>.<br><br> </font><a name=18102010></a><b>18.10.2010:</b><font size="2"> Added an article called <a href="ArtEvol.html">Taking the redpill: Artificial Evolution in native x86 systems</a>.<br><br> </font><a name=14072009></a><b>14.07.2009:</b><font size="2"> Added an article called <a href="matrix.txt">Hiding your virus in the matrix</a>.<br><br> </font><a name=28022009></a><b>28.02.2009:</b><font size="2"> Added a virus called <a href="eicART.rar">eicART</a>.<br><br> </font><a name=29102008></a><b>29.10.2008:</b><font size="2"> Added an article called <a href="chomsky.txt">Chomsky Hierarchy and the Word Problem in Code Mutation</a>.<br><br> </font><a name=26072008></a><b>26.07.2008:</b><font size="2"> The <a href="http://www.rrlf.de.vu/">Ready Rangers Liberation Front</a> has commited suicide. I'm looking forward to the Farewell-Party!<br><br> </font><a name=08022007></a><b>08.02.2007:</b><font size="2"> My decision: I'm going to sleep for a number of years. Spending much time for such a hobby is not possible anymore - that has also been my reason for leaving the rRlf. The only way to do this hobby effectivly is to spend much time for it - everything else is crap. As I have worked for about five years with computerviruses, I hope that other virus writers will continue our little subculture - hopefully somebody will continue our discoverments and techniques. Hopefully viruses with new techniques, for new platforms will be written. Hopefully people will continue working together in groups, release e-magazines with great content. Hopefully, everything last 20 years has been created will continue for many many years... Hopefully, somebody will create an artificial evolving beast, which can not be stopped. I've tried to help as much as I can, but this time is over now. Anyway - who knows - maybe one day: Second Part To Hell sedet ad dexteram Patris, et iterum venturus est cum gloria.<br><br> </font><a name=28012007></a><b>28.01.2007:</b><font size="2"> <a href="http://www.youtube.com/watch?v=XMucQRAQTqQ&amp;NR">Think about it...</a><br><br> </font><a name=02012007></a><b>02.01.2007:</b><font size="2"> <a href="http://www.eof-project.net/" target="_blank">EOF#1</a> has been released yesterday - it's really worth to download; nice stuff in there... I've also contributed to it and uploaded the article <a href="h4e.txt">Hashes for Encryption</a>.<br><br> </font><a name=18122006></a><b>18.12.2006:</b><font size="3" color="#000000"><b> After 50 months, I'm leaving the Ready Rangers Liberation Front.</b><br><br> </font><a name=01122006></a><b>01.12.2006:</b><font size="2"> Peter Ferrie has released his article <a href="http://pferrie.tripod.com/vb/bounds.pdf">Leaps and Bounds</a> (about roy g biv's Win32 and Win64.Bound). In the conclusion he wrote: "So imagine you're a virus writer, someone who specialises in one-of-a-kind viruses, and you want to do something that's really new and different. What should it be? How about quitting?" - This are probably the most motivating sentences I've ever read by a antivirus person. Thanks!<br><br> </font><a name=12112006></a><b>12.11.2006:</b><font size="2"> As you can see, I'm taking a break of viruswriting currently - but I presume I'll back sooner or later. Well - what I want to express: Recently I've searched and read several stuff about Dark Avenger - one of the most well-known viruswriter ever. My question: Does anybody know some facts what has happened with him the last ten years? Send me an email! Something else: roy g biv seems to be the most active POC viruswriter currently. With his two latest beasts (W64.Bound - polymorphic Win64 virus; <a href="http://vx.netlux.org/lib/vrg01.html" target="_blank">OSX/Macarena</a>) he rocked the virus-writing scene again: Well done - keep on working on such great stuff! Late last news: <a href="http://www.rrlf.de.vu/" target="_blank">rRlf</a>'s new member has a homepage, too: <a href="http://maniac89.host.sk/" target="_blank">mANiAC89</a>. Next time I'll try to post brand-new stuff :-)<br><br>
</font><a name=25092006></a><b>25.09.2006:</b><font size="2"> Germany's law in connection to "computer-crime" is getting stricter. 5 days ago the BMJ has released a <a href="http://www.bmj.bund.de/enid/34119f01491ae33b1a6c022ec5a9f773,792f74707265737365617274696b656c5f6964092d0932353638093a096d795f79656172092d0932303036093a096d795f6d6f6e7468092d093039093a095f7472636964092d0932353638/Presse/Pressemitteilungen_58.html" target="_blank">text</a> to descripe the change of the <a href="http://www.bmj.bund.de/media/archive/1317.pdf" target="_blank">"computer-crime" law</a>. Mainly, these changes effect real criminals, but some parts (especially p202c) could also effect proof-of-concept authors, as creation and release of malicious codes are prohibited now. My suggestion for all german virus-writers: Read <a href="http://www.freeinfosociety.com/pdfs/misc/anarchistcookbook2000.pdf">this</a> and <a href="http://www.gunbroker.com/">buy a gun</a>. (Thanks to DiA for finding that story)<br><br>
</font><a name=09092006></a><b>09.09.2006:</b><font size="2"> Sex sells: <a href="http://vx.nexpa.de/include/misc/GC2006/BitDefenderBabe1.jpg">Reason #1</a> and <a href="http://vx.nexpa.de/include/misc/GC2006/BitDefenderBabe2.jpg">Reason #2</a>. No comment, but embarrassing! (Thanks to <a href="http://vx.nexpa.de/">Radiation</a> for the pics)<br><br> </font><a name=08092006></a><b>08.09.2006:</b><font size="2"> I've written an article called "Hashes for Encryption". I've contributed to <a href="http://www.group.xero.de.vu/" target="_blank">EOF</a> and I hope it will be released at 01.01.2007.<br><br> </font><a name=01092006></a><b>01.09.2006:</b><font size="2"> I've written and added an article: <a href="morphology.txt">Thoughts about Morphology in viruses</a>.<br><br> </font><a name=25082006></a><b>25.08.2006:</b><font size="2"> Today somebody calling himself SysSpider contact me, and we've started to talk about computer virus techniques at a more or less advanced level (which is quite unusual in IRC). SysSpider seems have advanced knowlegde in networks and Windows-programming, so it's worth to look at his Homepage: <a href="http://sysspider.vectorstar.net/index.php" target="_blank">SysSpider</a>. A very interesting article by him is <a href="http://sysspider.vectorstar.net/papers/afti.pdf" target="_blank">Viral Propagation Hooking WinSock</a>. I have never heared about that idea, neighter I have thought of it - but it seems to be a good practice-orientated technique.<br><br> </font><a name=23082006></a><b>23.08.2006:</b><font size="2"> It's the end of the world as we know it... And it is true: VirusBuster, well known as the 29a-magazine-editor and member for long time, has left the group at 18th of august (5 days ago). Also vecna left the group some time ago (not officially announced) and roy g biv does not sign his viruses and articles with '29A' anymore, but with 'defjam' (see <a href="http://www.rrlf-zine.de.vu" target="_blank">rRlf#7</a>). Now, the "group" has three members: GriYo (who has not done virus-related stuff for long time), Z0MBiE (who does not write viruses anymore) and vallez. You will see an official announcement for VirusBuster's and Vecna's leaving soon at <a href="http://vx.netlux.org/29a/main.html" target="_blank">29A's site</a>. In my opinion, it can be considered as dead - hard to believe...<br><br> </font><a name=16082006></a><b>16.08.2006:</b><font size="2"> Just found a funny posting by Peter Ferrie at Symantec's Weblog called <a href="http://www.symantec.com/enterprise/security_response/weblog/2006/08/i_didnt_c_it.html" target="_blank">We Could Almost See it Coming</a>. Interpretation without a context of information. Whatever the reason was to not release the source of Gattaca - it was not the reason that he wildcatted. I don't use any Anti-Virus Program, I just check my viruses sometimes at <a href="http://virusscan.jotti.org/" target="_blank">Jotti's virusscan</a> to know the AV names. I don't think that Peter Ferrie really believes what he wrote - he is believed to be a wise guy - I presume it was just a silly marketing-posting. But two positive aspects of the posting: They seems to visite my page very regularily and they try to put as much effort as possible in our proof-of-concept stuff.<br><br> </font><a name=14082006></a><b>14.08.2006:</b><font size="2"> Just returned from germany, rRlf meeting 06 (80%) with DiA and philet0ast3r and some hours disk0rdia! It was really heavy - 4 days of real much alcohol (probably I've never ever drunk that much alcohol in 4 days before), weed, and so on - a great fun :-) Good descriped at <a href="http://vx.netlux.org/dia/2006/08/13/naaaaabekka-biar-naaaberkar-biar-des-is-as-besta-biar/" target="_blank">DiA's blog-entry</a>. Uhhm, i need much sleep now - over and out!<br><br> </font><a name=08082006></a><b>08.08.2006:</b><font size="2"> As you may have seen, our latest magazin does also contain a PowerShell (Formally <a href="http://spth.host.sk/monad.txt">Monad</a>) Worm written by <a href="http://www.sk0r-czybik.de.vu/" target="_blank">sk0r alias Czybik</a>. Several sources have already written about it - and now also Microsoft has posted about it: <a href="http://blogs.msdn.com/powershell/archive/2006/08/03/687838.aspx" target="_blank">Windows PowerShell and the "PowerShell Worm"</a>. This is very strange in my opinion - I don't see a reason why they defend their shell-application that much - just because of some proof-of-concept viruswriters.<br><br> </font><a name=05082006></a><b>05.08.2006:</b><font size="2"> Finally I had time to upload my contributes to rRlf #7 at my page. Uploaded 3 viruses, 4 articles and 3 interviews. Currently I'm creating the concept of my next malware (some sheets are already infront of me, and look nice). It should become a connection beween artificial life, artificial evolution and something that I have written 2 years ago - but more advanced and better ideat. In case you are interested in these topics, it would be of some value to read the <a href="ivtomray.txt">Interview with Tom Ray</a>, who is the creator of <a href="http://en.wikipedia.org/wiki/Tierra_%28computer_simulation%29" target="_blank">Tierra</a> - a system for artificial life.<br><br> </font><a name=02082006></a><b>02.08.2006:</b><font size="2"> Ivan by Trend Micro weblog-team has written the best comment about the VX-Scene that I have ever read. Read it here: <a href="http://extracare.trendmicro-europe.com/tm/core/en/frame4public/diary/?selectReleaseDate=2006-07-23" target="_blank">E-Zine Releases New Virus Technologies</a>. Thanks a lot for that, Ivan!<br><br> </font><a name=21072006></a><b>21.07.2006:</b><font size="2"> The <a href="http://www.rrlf-zine.de.vu/">rRlf-magazine issue #7</a> has been released! Nothing more to say than "Get It!".<br><br> </font><a name=13072006></a><b>13.07.2006:</b><font size="2"> I've decided to suggest you interesting articles about the virus-scene in unregular intervals. I'm thinking about short texts, which explains our motivation, our ideas of all the stuff we're doing. Please take the 15 Minutes, print the text (good idea for spending the boring way to school, university, job, ...), read and think about it. Well - the first text is <a href="http://vx.netlux.org/lib/vmn01.html" target="_blank">'Why I write viruses (and how not to stop me)' by MidNyte</a>. I've really liked to read it - I wish you the same! By the way: Our magazine will be released in one week - in case you want to do a last-minute-contribute, hurry up and send your stuff to DiA_hates_machine@gmx.de.<br><br>
</font><a name=06072006></a><b>06.07.2006:</b><font size="2"> I've finished a virus article about a very new, very unusual language developed by Microsoft over the last 2 years. Because of the reason of curiousity, I will not tell you the name of the language. This is now probably the last stuff I'll contribute to rRlf#7 - I'm just at creating a very new idea of self-morphing (by useing parts of evolution and other uncalculateable techniques) - but this will be another very big project, not to be finished within 3 weeks, of course.<br><br> </font><a name=04072006></a><b>04.07.2006:</b><font size="2"> GATTACA will not be released.<br><br> </font><a name=16062006></a><b>16.06.2006:</b><font size="2"> The <a href="http://www.f-secure.com/weblog/archives/FSWT.jpg" target="_blak">new picture of F-Secure's cooperators</a> at their <a href="http://www.f-secure.com/weblog/" target="_blank">weblog</a> is very nice. The black heaven in the background makes the whole team very sympathic in my opinion (probably that is not too wise for a professional company, anyway). Together with <a href="http://www.hypponen.com/fsmcs/" target="_blank">Mikko H. Hypponen's finnish rap-band FSMC</a> this team is really unusual and funny :-)<br><br> </font><a name=13062006></a><b>13.06.2006:</b><font size="2"> A new virus-group has been formed by three very talented viruswriters: <a href="http://www.doomriderz.com/" target="_blank">Doom Riderz</a>. I think this is a very positive trend in the virus-writing scene - I haven't seen that much activity for long time. I'm sure these new coders and groups will have a bright future.<br><br> </font><a name=12062006></a><b>12.06.2006:</b><font size="2"> Look at this video and think about it: <a href="http://blog.outer-court.com/videos/epic-2015.html" target="_blank">Google EPIC</a> or <a href="http://media.aperto.de/google_epic2015_de.html" target="_blank">Google EPIC (german)</a>. Between sleeping and being drunken this weekend I found some time to work on my latest project. I've finished two more viruses and one polymorpic engine. I won't tell you which langauge it is before 21.07.2006.<br><br> </font><a name=06062006></a><b>06.06.06:</b><font size="2"> I just want to say "<b>HELL</b>o" to everybody on the day of The Lord... Something informative? Let me think... Yes: I've done two more interviews with very great and intelligent persons, secret who it is, more in rRlf#7 - I'm already really looking forward to it - I (only) saw the index: great! Last days I've also written a virus for a so-far uninfected, and very unusual Platform of Microsoft. Guess where you will see it :-)<br><br> </font><a name=03062006></a><b>03.06.2006:</b><font size="2"> <a href="http://www.group.xero.de.vu/" target="_blank">XERO</a> wants to create an e-magazine, and release it arround end of the year. If you want to contribute, send your stuff to <a href="mailto:sky_out@gmx.net">Sky Out</a>. Some more interesting links I've found recently: <a href="http://f13.host.sk/">F13-Labs</a> is a new virus-group, too. And a nice homepage of a coder called <a href="http://www.vx13d.net/vx13d/">free0n</a> - the homepage has also RSS-feeds.<br><br>
</font><a name=01062006></a><b>01.06.2006:</b><font size="2"> Today I've found a great page: <a href="http://www.genarts.com/karl/" target="_blank">Karl Sims</a>. Look at his videos about evolution in connection with art and get inspired - his articles are also highly interesting. Advice: Check it out!<br><br> </font><a name=30052006></a><b>30.05.2006:</b><font size="2"> I've done an interview with a very well-known person - in connection with computer viruses. No comment who it is - you will see in rRlf#7.<br><br> </font><a name=21052006></a><b>21.05.2006:</b><font size="2"> Last few days I have coded a <a href="wikiworm.rar">wikipedia-worm</a>. You will find the source and the article about wikipedia in rRLf#7.<br><br> </font><a name=08052006></a><b>08.05.2006:</b><font size="2"> This time I want to give you the link to two new Virus-Writing groups: <a href="http://www.freewebs.com/purgatory-vx/Home.htm" target="_blank">Purgatory Virus Team</a> and <a href="http://www.group.xero.de.vu/">XERO</a>. Both group seems to be quite active - some of the members I know are very nice and smart persons. Hopefully they continue improving their knowlegde and rock the house soon. :-)<br><br> </font><a name=07052006></a><b>07.05.2006:</b><font size="2"> I'm really happy that I can present you now my latest artwork: <a href="sample.rar">ArchiveTiger</a>! It is a highly morphic worm, which spreads to .rar archives (current directory - POC). The special thing are the two kind of morphism - but you will see. I don't want to write anything about the technique now, you will see the source+description in rRlf#7.<br><br> </font><a name=30042006></a><b>30.04.2006:</b><font size="2"> Today another stupid bug upload for you. It seems like cmd.exe has an error at function "copy" (with and without parameter "-b") when coping files with 0x1A-Bytes. The bug leads to overwriting content in the destination file. In the example a .bat file copies an 11 byte + 6 byte file - result: 11 byte or 10 byte (with -b parameter)! Download and see the <a href="copy_bug.rar">CMD.exe copy bug</a> by yourself.<br><br> </font><a name=21042006></a><b>21.04.2006:</b><font size="2"> I've uploaded the <a href="DoS_Winlogon.zip">Winlogon DoS file</a>. I'm curious about some comments, so just send me an e-mail when you've tested it.<br><br> </font><a name=18042006></a><b>18.04.2006:</b><font size="2"> I'm sorry for not writing anything for that long time - I wanted to write when I've finished something new, but unfortunately my current project is not near to finish so far. So far its two out of three morphing engines are finished. It is not polymorphism or metamorphism, but something different, something strange - you will see. I have started to create the concept of that malware in summer 2005, and improved it several times. :-) Beside of coding I've read a lot about neural networks, generic algorithm, artificial life, creation of structurs, ect (for instance at <a href="http://www.dkriesel.com/" target="_blank">David Kriesel</a>'s highly interesting page) In some delirium recently I've got fragment of new ideas - I'll try to sort them and hopefully make something useful... About rRlf#7: DiA told me that the quality AND quantity of the contributes are very good so far, anyway: We would like you to sent stuff too: <a href="mailto:DiA_hates_machine@gmx.de">DiA's mail account</a> waits - thank you (these times, as 29A does not release and may retire, it's very important that we help together creating good output. Not only for rRlf, but for you and for me - for the whole viruswriting community - and WE will do it :-))! Something else: I want to say thanks to the 30-35 people who visit my page every day even without news! :-)<br><br> </font><a name=27032006></a><b>27.03.2006:</b><font size="2"> I'm four years in the virus-scene now. As a present for you and for me, i've updated my picture at subsite 'contact'. Today I was able to fix some stupid bugs in a running project, now this one can continue again :-)<br><br> </font><a name=13032006></a><b>13.03.2006:</b><font size="2"> Congratulations goes to GriYo for coding <a href="http://www.viruslist.com/en/viruses/encyclopedia?virusid=20455" target="_blank">Virus.Win32.CTX</a> (see the source in some 29a-magazine) - its highly polymorphism and other techniques leaded <a href="http://it.slashdot.org/article.pl?sid=06/03/13/1322215&amp;from=rss" target="_blank">McAfee to produce a lot of dangerous false positives</a>.<br><br> </font><a name=07032006></a><b>07.03.2006:</b><font size="2"> First: I've updated the <a href="iCab.rar">iCab.rar-archive</a> - with the bug-fix :-). The source, the exactly explanation of the virus and of Infopath secrets, and infected .XSN files will be in rRlf#7. Something else: Today I've got an eMail by herm1t and I want to copy the body here: "Hello, I just want to inform you that due to problems with the hosting vx.netlux.org is down again. I hope that solving these problems will not take too long and site and hosted sites will be up soon, though I cannot say exactly when. Sorry for inconvenience."<br><br> </font><a name=06032006></a><b>06.03.2006:</b><font size="2"> I've found two reports about my Infopath virus. One by <a href="http://de.trendmicro-europe.com/enterprise/vinfo/encyclopedia.php?VName=PE_ICABDI.A" target="_blank">Trend Micro</a> and one by <a href="http://securityresponse.symantec.com/avcenter/venc/data/w32.icabdi.a.html" target="_blank">Symantec</a>. Symantec's report has been written by Costin Ionescu, a guy who has already written virus reports about very important viruses in the past (Nimda, Klez, first MacOS X Virus, ect) - which is quite nice. Both reports mention that the virus contains a bug. This is highly problably because of a problem with debug.exe. I've tested the virus on 4 different OSes (WinXP, WinXP @ VMware, Win2000 and Win2003), and only one time it did not work. I'll fix this bug for the release of rRlf#7.<br><br> </font><a name=04032006></a><b>04.03.2006:</b><font size="2"> Finally, my second running project has been finished. It is a binary InfoPath macro virus - the first virus which can infect <a href="http://en.wikipedia.org/wiki/Microsoft_InfoPath" target="_blank">Microsoft Office Infopath</a> files. The source has more than 900 lines - and will be released in rRlf#7. You can download the <a href="iCab.rar">binary of InfoPath.iCab</a>. Now my primary artwork will be continued.<br><br> </font><a name=27022006></a><b>27.02.2006:</b><font size="2"> I think I found out when the Winlogon DoS happens: When you use the debug.exe and give an input file; the input file contains a line, which's output should be quite big (i've done it with 100Bytes), WINLOGON.EXE starts using 100% of CPU-speed. If anybody else tests that, I would be happy to hear about the result.<br><br> </font><a name=26022006></a><b>26.02.2006:</b><font size="2"> While trying to finish my second project, I've discovered a bug at a fully patched Windows XP SP2 - exactly a WINLOGON DoS. When you try to create a binary file via debug.exe, via a external file, and you write "e 0000 4D 5A 80 00 " (ect.), WINLOGON.EXE starts to use 100% of CPU-speed and the PC speaker starts to make very strange noise. This alone is not dangerous, but annoying, as you can not restart WINLOGON.exe. Maybe this could used for code injection or some other dangerous stuff too, I dont know so far (but I know that the created binary contains strange data). If you want a malicious dump file for testing that problem by yourself, send me an eMail. About my nearly finished second project: SlageHammer has helped me today very much, and now I know that it will be finished very soon (I think this week). So watch out for updates.<br><br> </font><a name=16022006></a><b>16.02.2006:</b><font size="2"> Congratulations goes to the currently still unknown hero, who has written the <a href="http://www.macrumors.com/pages/2006/02/20060216005401.shtml" target="_blank">first virus for MacOS X</a>! Somehow very strange: I wanted to do exactly the same thing and release it at 23.03.2006 - one day before "5 years without a virus" :-) (already downloaded VMware + MacOS X - but per fortuna I have not started already)... OK, back to the other in-progress artworks :-)<br><br> </font><a name=13022006></a><b>13.02.2006:</b><font size="2"> I still have no contact to darkman (I've done the co-op project with him) - hope we get in touch before July - for making a last review before the release (in rRlf#7). In case you read this: contact me! About my latest project: So far so good - 300 lines are done and now I'm looking forward to code one of the four main engines. Just for remembering: rRlf#7 will be released at 21.07.2006 - if you want to contribute, send <a href="mailto:DiA_hates_machine@gmx.de">DiA</a> an eMail.<br><br> </font><a name=07022006></a><b>07.02.2006:</b><font size="2"> <a href="http://business.timesonline.co.uk/article/0,,19149-2012784,00.html" target="_blank">Die</a>, please!!! That's simply a new kind of <a href="http://en.wikipedia.org/wiki/Fahrenheit_451">Fahrenheit 451</a>. Reason: All about buisness, the fat market in china and money. : (<br><br> </font><a name=04022006></a><b>04.02.2006:</b><font size="2"> More and more papers become filled with new ideas and more advanced techniqual tricks for my new project. I've already 250 code lines written - somehow I feel this will be something very good (at least, it is 100% unusual) :-) Hope I did not missed any weakness in the concept.<br><br> </font><a name=03022006></a><b>03.02.2006:</b><font size="2"> Today I've re-organized my homepage - as you may have already seen. I've deleted the "news" from 2005; you can see them on the bottom of the page at "archiv". I've also deleted the subpages BWG and JSG; the latest version of the program can be downloaded at subsite 'programs' now. I've made the page HTML 4.0 validated. And, the feature I'm most proud of: I've added RSS-Feeds :-). And now about viruses: I've started to code on my new project. This one has 13 parts, counted WITHOUT spreading-functionality. Five out of these 13 parts are very hard to code I think. Nevertheless, I've already finished the first small part. Next step: 2 more easy/small parts. Maybe I'll finish them this weekend - I can tell you, it was a nice feeling to use FASM again :-)<br><br> </font><a name=01022006></a><b>01.02.2006:</b><font size="2"> My latest project has been finished, but as it's a co-op - and I do not have contact to the second coder at the moment, I can not tell you too much about it. What I can say is: It is highly polymorphic, EPO and ~ 2.500 lines Assembler. (source will be released in rRlf #7 - at 21.07.2006 - you can contribute to it by sending your stuff to <a href="mailto:DiA_hates_machine@gmx.de">DiA</a>). Now I will take a beer and then starting the project, which's idea I'm creating since automn. I've some brain-storming papers infront of me, showing the exactly structure of it. If I can do it as I think - this will be much fun (for me as coder and - when it's finished - for AVers). :-)<br><br> </font><a name=16012006></a><b>16.01.2006:</b><font size="2"> I've restarted the project (a co-operation work) which I've done in autumn 2005. I had some big successes recently, and I hope that I can finish it very soon. So far it is still secret. I'll tell you more when it is done - it will be released in rRlf#7. What I can tell you: It is done in assembler, and the source is >2500 lines so far :-).<br><br> </font><a name=09012006></a><b>09.01.2006:</b><font size="2"> As some people asked me about my latest news: This does not mean in any way that I stop coding viruses or that I'll leave rRlf - moreover it means that I stop the contact to all loosers arround the virus-writing-scene :-). Uhm, yes: I also thought that stop writing news at this homepage has no sense, so I do not do it... If you are bored, read this <a href="http://neworder.box.sk/newsread.php?newsid=14332" target="_blank">this</a>. (<a href="http://retro.host.sk" target="_blank">Retro</a> found it - and it is VERY true!)<br><br> </font><a name=03012006></a><b>03.01.2006:</b><font size="2"> I'm totally pissed of all shit that happens currently... And this time I do not talk about anything else but the virus writing scene. ([{Nearly}]) Nobody creates anything useful, goddamn stupid malware with commercial purpose ONLY fuck people out there, no more interesting stuff (as the lead-warriours, pioneers and forefathers of vxing did)... Yes, 29A did not released anything this new-year-day - and seems to retire. <a href="http://www.rrlf.de.vu" target="_blank">W</a><a href="http://www.rrlf-zine.de.vu/" target="_blank">e</a> seems to be the last existing group (only vx-magazine last 12 months) - that's more than sad. Newbys disappear because THIS is nothing interesting anymore. Shit all over the internet - I need a break of all that now - no more emails-reading, no more IRC and no news here for a while... (real good friends here know how to contact me) I'm just bored - Hope some day (soon or far-away future?) some cool stuff will wake me up again...<br><br> </font><b>28.12.2005:</b><font size="2"> <a href="http://lowlevel.brainsware.org/index.php?pagename=tutorials&amp;showtut_id=71" target="_blank">LowLevel#8</a> has been released, and with it a (german) article by me called "Einige Optimierungstricks". You can view it also at my subsite articles.<br><br> </font><b>26.12.2005:</b><font size="2"> Real bad news today - REAL bad one: I've just talked to VirusBuster, and he made it true what he mentioned some weeks ago: <a href="http://vx.netlux.org/29a/" target="_blank">29A</a>#9 will not be released at 1.1.2006, and there is no other date for it (so far???). Reason: Too few contributes by 29a-members. So we can not do anything against it - even if many of us have tried it... As I wanted to contribute my two articles in that magazine, I've desided to send it to <a href="mailto:DiA_hates_machine@gmx.de">DiA</a> for <a href="http://www.rrlf.de.vu/" target="_blank">rRlf</a>#7.<br><br> </font><b>23.12.2005:</b><font size="2"> I've just seen <a href="http://pferrie.tripod.com/" target="_blank">Peter Ferrie</a>'s Homepage's news: "December 14: coming in January: VBScript/JScript exploit article". Somehow i feel he has contributed that article to 29A#9 - why else shouldn't he release it now? :-)<br><br> </font><b>22.12.2005:</b><font size="2"> Currently I'm reading alot about Neural-Computer-Science (like Neural Networks), Artificial Intelligence, Artificial Life, ect. Maybe I can use some of that ideas in my latest project. I really hope so. In case you know german, see <a href="http://www.dkriesel.com/content/studium/neuronetzefiles/neuronalenetze.pdf" target="_blank">this</a> article. It's really interesting, but hard to understand. The owner of that page, <a href="http://www.dkriesel.com/content/studium/frameset.htm" target="_blank">David Kriesel</a>, has several other related artikels about that topic on his page. Highly interesting topic, and maybe gives us some ideas for our future projects.<br><br> </font><b>11.12.2005:</b><font size="2"> Mikko Hypponen and his team has done an interesting <a href="http://www.f-secure.com/2005/2/f-secure_2005_wrapup.zip">video</a> about the virus situation in 2005, and about several techniques which are not seen so far - I would suggest that you download it, it's worth the time.<br><br> </font><b>10.12.2005:</b><font size="2"> Finally I have found the quote for my last sub-page (BWG): It's by <a href="http://en.wikipedia.org/wiki/Subcomandante_Marcos" target="_blank">Subcomandante Marcos</a>, a mexicans anarchistic-social revolutionary.<br><br> </font><b>09.12.2005:</b><font size="2"> Today again: If anybody is interested in my latest project, check it out:<a href="http://spth.host.sk/vistavirus.txt">http://spth.host.sk/vistavirus.txt</a>.<br><br> </font><b>09.12.2005:</b><font size="2"> Sorry, but i think i have to give up writing viruses because I am fully stressed with <a href="http://www.viruslist.com/en/weblog?discuss=174904405&amp;return=1" target="_blank">playing computergames</a>... Well, of course, that was just a joke :-) Just wanted to comment on Eugene's stupid ideas of today's young persons! Recently I've found a very interesting computer language - highly complex, very useful for special virus technology (polymorphism, maybe even metamorphism, and who knows - maybe even good for AI), script and binary in one langauge. It has no connection to any other language I already know (and I know several languages +g+), and it is very new and will become quite popular. If you know what I mean, send me an e-Mail :-) I'll try to learn that language quite good (not just the roots of it) and do some stuff with it in the next future. More to come soon.<br><br> </font><b>27.11.2005:</b><font size="2"> While reading the weblog at viruslist.com I got a strange idea for malware - no techniqual one, but maybe a good one anyway. The root: A malware program is detected by AVs when they get a sample of it. They have to analyse it and write a detection routine for it. This process uses (in a very good case) at least 10minutes. Now imagine: We would have a tool which morphes a .EXE file (maybe randomly [like the technique Code Evolution] or via packers/cryptors), that there is no connection between each file. It does not matter if the .EXE file still work or not. Now, our bad tool sends the morphed .EXE file to several email adresses like newvirus@kaspersky.com, peter_ferrie@hotmail.com, alexander.gostev@kaspersky.com (yes, to that n00b too :D) and eMail adresses of other AVers too. The Subject and the body has to be different, but with the same sense (like Subject: "newvirus", "maybe new malware", ect). The filename has to be different (taking a name from a file on the HD). When the tool sent the file, it morphes the .EXE again, and sends it again to several email adresses. What would happen? The analyser has to download the file, open it and analyse it for some time. Result: We waste the worthy time of our friends, and they have less time for working on real stuff. We could also use pseudo-beagle/sober/[insert virus here] body/subject. If they would ignore the incomming files, they will ignore real malware 100%, too. Somehow i have the feeling that this would make their work way harder :-) <br><br> </font><b>24.11.2005:</b><font size="2"> Just finished an article called "Wikipedia: Using free knowlegde for bad stuff". It's about an idea how a computer virus could spread via wikipedia. The negative side-effect (and the reason why I've thought about deleting it again) is, that it's also very easy to destroy big parts of the <a href="http://en.wikipedia.org/" target="_blank">free encyclopedia</a>. Even I've written it (i HAD TO write it) - i hope it never comes true or that all my positive test were not real!<br><br> </font><b>17.11.2005:</b><font size="2"> I've just finished my latest project: An article called 'ASP.NET Virus Writing Guide' - which will be released soon I think. Finally one thing away from my to-do list :-) Now let's start or continue another project. I've also written two articles for <a href="http://lowlevel.brainsware.org/" target="_blank">LowLevel</a>#8 (a german OS develope magazine) some time ago. Titles: 'Einige Optimierungstricks' and 'Ein OS auf einer CD-ROM'. The OS-dev magazine should be released soon, too.<br><br> </font><b>03.11.2005:</b><font size="2"> <a href="http://mail.fsfeurope.org/pipermail/press-release/2005q4/000120.html" target="_blank">Well Done!</a> For any virus writers without an idea: Look <a href="http://msdn.microsoft.com/subscriptions/" target="_blank">here</a> and choose one project :-) Everything could be found on eMule or BitTorrent. I'm currently working alot (on viruses) - but it's too soon to give you more information about it - sorry...<br><br> </font><b>30.10.2005:</b><font size="2"> Happy Birthday Bill Gates! Thanks for the good and interesting software you have created in your 1/2 century! I hope you and your company will put more effort into creating software and less into making patents and bounty for malware creators. Thanks & cheers :-)))<br><br> </font><b>24.10.2005:</b><font size="2"> Well, as you can see in last news, i did not code really much for the last 2-3 months, as i had some real life problem. The reason why I'm writing this now: All these problems are solved, and I feel free again - that feeling that makes you very motivated for fucking the world again :-) My to-do list is again growing (not because I'm lazy, but because I was again able to create new ideas and think about new techniques). I know i'm also going to code and write alot again. Often I read that phrase: "See you in better times" - I think that better times just started again...<br><br> </font><b>13.10.2005:</b><font size="2"> From <a href="http://www.rrlf.de.vu/">rRlf.de.vu</a>: 13.10.2005 :: In the name of Peter Kropotkin, Retro has finally done it: The first virus for Microsoft Windows Vista (Beta 1 Build 5112) has been finished, tested and it's binary released: Idoneus! Well done, dude! The source will be released in rRlf#7!<br><br> </font><b>06.10.2005:</b><font size="2"> Due to dav's effort, I update my news-section. Hmm, nothing important to write - I'm still waiting for the News "First real Vista virus/worm discovered" or "Office12, which will be shipped end of 2006, infected"... I hope you do your best! I'm also working hard, but not Vista-realted, but other stuff. Well, contact me if you are working on these things (Vista and related tools, Office12 macro virus, ect) something new, something "Fuck you, M$".<br><br> </font><b>22.09.2005:</b><font size="2"> I just retruned from germany, where I have met cyneox. He is very cool, I can tell you. Unfortunatly the trip was very short - next time I hope it to be longer.<br><br> </font><b>11.09.2005:</b><font size="2"> Sorry for the long time of no news. I just had no internet connection where i could change the site. Well, currently I'm working on my new project - which will be quite nice I think. But I have very little time until mid of october - so dont wait for some breaking news until then.<br><br> </font><b>24.08.2005:</b><font size="2"> I've added a quote at subsite "links" - with special greets to the government of USA, EU (especially Great Britan and Austria) and every other fucking country who wants to fully control their citizen!<br><br> </font><b>19.08.2005:</b><font size="2"> I am very sorry, but I just recognized that I have forgot to upload the maybe most important text by me in rRlf#6: "<a href="surrealism.txt" target="_blank">Surrealism in viruswriting: How to create new ideas</a>". The article is not about a certain technique, but how to create ideas for new techniques. I think it's time again to get a new idea :-)<br><br> </font><b>11.08.2005:</b><font size="2"> Recently I've seen 100s of web-pages about the Monad-project. There were alot of things which bother me, but the most fucking thing: Nearly 3 out of 4 articles mention that I'm from Austria. Who the hell cares? For that reason I've rewrite profile at subsite 'contact' - to give a better view of my ideas. Oh well, <a href="http://dav.hacksector.de/" target="_blank">dav</a> has written a MSH-VCK -> <a href="http://vx.netlux.org/vx.php?id=tm13">Msh(Monad) Virus Kit</a>.<br><br> </font><b>05.08.2005:</b><font size="2"> As the rrlf-zine.de.vu site ran out of memory, here are some more souces for downloading the rRlf#6 magazine: <a href="http://dav.php5.sk/RRLF_issue_6.rar">dav's 1st mirror</a>, <a href="http://www.freepornxxx.de/rrlf_6.rar">dav's 2nd mirror</a> and <a href="http://vx.netlux.org/vx.php?id=zr06">herm1t's mirror</a>.<br><br> </font><b>04.08.2005:</b><font size="2"> Yesterday I've sent my five Monad viruses to several AVs, and I got a nice answere by <a href="http://www.viruslist.com/en/imagesen/vlweblog/gostev.jpg" target="_blank">Aleks Gostev</a>: "It's funny but Vista do not include MSH :)". See <a href="http://en.wikipedia.org/wiki/Windows_Vista#Other_features" target="_blank">here</a> or <a href="http://en.wikipedia.org/wiki/MSH_%28shell%29" target="_blank">here</a> that our friend (well known from the text <a href="kav.txt">How BigBrother wants to get us down!</a>) is wrong. Nevermind, I've also uploaded these five Monad Viruses from the article <a href="monad.txt">Monad: Microsoft Command Shell - Infection Tutorial</a> separatly (see virii-subsite or download <a href="monad.zip">here</a>). A very nice quote I've found: VISTA = Virus Infection Spyware Trojans and Adware! Let's do our best that this becomes true! :-)<br><br> </font><b>23.07.2005:</b><font size="2"> I've uploaded everything released in rRlf #6 by me. That means: 5 articles, 3 other texts, 2 viruses and 2 engines (sub-site programs). I hope you like them - I do ;-)<br><br> </font><b>21.07.2005:</b><font size="2"> Finally, <a href="http://www.rrlf-zine.de.vu/">rRlf #6</a> has been released! DOWNLOAD IT!!! :-) I'll update my page next few days - no chance to do it now. Now it's time for a beer...<br><br> </font><b>02.07.2005:</b><font size="2"> I've just finished an article called "Monad: Microsoft Command Shell - Infection Tutorial". The article is about the infection of the new command shell of Microsoft Windows Longhorn (or Windows 2006 - if you prefer that). The first beta-version of that command-line has been released ~1 month ago - and there are already 5 viruses for it (overwriter, prepender, appender, EPO, cross infector). :D The article will be released in rRlf#6.<br><br> </font><b>28.06.2005:</b><font size="2"> Due to several reasons the rRlf#6 release date is now the 21.07.2005.<br><br> </font><b>07.06.2005:</b><font size="2"> Oh fuck, school sucks that much! Well, I've finished a project called "File Splitting Engine" and an article called "Surrealism in viruswriting: How to create new ideas". They will be released in rRlf#6.<br><br> </font><b>27.05.2005:</b><font size="2"> I've finished my latest project, the "Code Evolution" idea. The result is a code named "Gloeobacter violaceus". It is neighter a real virus nor a real engine. I would descripe it as a (very?) primitive artificial life form. I tried to emulate nature's evolution with it - the rest is secret until rRlf#6 will be released. Now I'm trieng to bring the other idea to reality ("Overfile-Splitting") - hope I can finish it also that fast (<1 month) - but i dont really think so. Nevermind...<br><br> </font><b>17.05.2005:</b><font size="2"> My current project is, as I've already thought, bringing the idea of "Code Evolution"-article (which you have not read so far as it's not released :D) to reality. I've already finished all mutation-functions, made a semi-good pseudo-RNG and so on. As blueowl helped me today with a stupid problem (thank you alot), I can continue now and maybe finish it all very soon. What needs alot of time is the testing of the mutated output, it's behaviour and opcode. But I really like it, it's fun to look at a program which morphs itself in a way you dont know. And you dont know if it works new generation, how it will behave... ;-) Wait for rRlf#6 to see it!<br><br> </font><b>12.05.2005:</b><font size="2"> According to an AV-insider, many AVs have hard problems with a packer called <a href="http://www.anticracking.sk/">"SVK-Protector"</a>. This has been written in wilders-forum, but deleted soon after the posting by the Administrator. Just try to use it in your future maleware!<br><br> </font><b>11.05.2005:</b><font size="2"> I've written an very short article for LowLevel#8, called 'Einige Optimierungstricks'. It will be uploaded, when <a href="http://lowlevel.brainsware.org/">LowLevel #8</a> will be released.<br><br> </font><b>09.05.2005:</b><font size="2"> After testing FireFox for some hours (I have not found any way to write to the HD), I became bored of JS. That was the reason to start by new project: Bringing the idea of Code Evolution-article to reality. I've already had some success (pseudo-RND, ect...), even this is my first real Win32 asm project. So far I have not got a name for the project, so if you have some nice ideas, write a mail to spth@priest.com. :-) I've also translated the interview with cyneox (about 2.000 words) to english that everyone can read it in rRlf#6. Ohhh, I wonder if ANYBODY reads this, as my counter says that last week there were zero (!!!) visitors +gg+. But maybe it's just a bug (at least I hope so, of course!).<br><br> </font><b>30.04.2005:</b><font size="2"> I've finally finished the articel "New era of boosectorviruses #2: El Torito ISO infection at FAT32" (which will be released in rRlf#6), and withit I've finished my step into the OS and bootsector development (for now, maybe I'll return some day). I thought about a new project and two things came into my mind: Bringing the idea of 'Code Evolution' to reality. Second idea was, the day after the 50 milionth download of Firefox, searching for ways of spreading, connection of scripts and Firefox and related stuff. Unfortunatly time is very expensive currently, as I'm on the way to finish school next 2 months, but I'll try to invest as much as I can! After these two months I've alot of freetime (at least I hope so), which I'll definitivly use for coding again! :-) Anyway: I'll do whatever I can to produce high-quality (hehe) stuff!<br><br> </font><b>17.04.2005:</b><font size="2"> Today, <a href="http://lowlevel.brainsware.org/index.php?pagename=tutorials&amp;showtut_id=42">Lowlevel#7</a> was released (a OS-developer mag in german), and with it the FAT12 tutorial, which has already been uploaded some months ago. WHat is funny: See the impressum: my real name is SPerl THomas... ;-)<br><br> </font><b>12.04.2005:</b><font size="2"> First: Sorry for the long time of no news, but i had nothing important to say ;-) I've finally finished my SPTH-OS 2.0! It is the very first CD-ROM Bootsector infector. Unfortunatly the direcory changing does not work, but that does not matter alot, as this is just a prove-of-concept virus. You will find it in rRlf#6. I'm also going to write an article about FAT32 and ISO infection. Next project: I dont really know. Maybe bringing one of my two already-written-but-not-released-so-far ideas into reality or making a BOOTP virus (network-boot virus). Or maybe something totally different - who knows?! Something different: I've done a interview with SnakeByte for rRlf#6. I think it's quite interesting, so just wait for it.<br><br> </font><b>21.03.2005:</b><font size="2"> After several hours of coding I finished a major step for my project: The virus is now able to search/infect files in all directories on the partition. And: The article and the virus, which i wanted to use for xine #6, will be released in rRlf#6, as I thought this serial should be in one magazine.<br><br> </font><b>19.03.2005:</b><font size="2"> Finally, my 18th birthday! And I've also been in the scene for 3 years. Juppi duppi... ;-) Now let's continue drinking!<br><br> </font><b>12.03.2005:</b><font size="2"> I have finished IMG infection at FAT32 harddisks with my bootsectorvirus. It works really good (tested on 2 computers), I'll add .ISO and .NRB infection too as soon as possible. ISO format is much more difficult than IMG (of course), so it could use some more weeks (as i have alot to do for real life too currently). But dont worry, I'll finish that virus 100%! And it will be released in rRlf#6. Something else: I've read an EPOC virus article by Retro some days ago, which will be released in rRlf#6 too! The article is really great, I'm sure you will like it... If you want to contribute to our ezine, write a mail to <a href="mailto:DiA_hates_machine@gmx.de">DiA</a>!<br><br> </font><b>27.02.2005:</b><font size="2"> I've written an interesting article called 'Code Evolution: Follow nature's example'. The article will be released in rRlf#6. My Project: I solved the next (and i hope last) major problem. I hope to release it soon.<br><br> </font><b>20.02.2005:</b><font size="2"> I've done an interview with Cyneox about Linux Viruses for an 30 pages article for school. The interview is german, but highly interesting. It will be released in rRlf#6. Something else: My discoverment of FAT32 and the whole shit with it has been finished. It was really difficult to get real information about that. Well, now coding phase has been started. I've already had big success. If you don't know what I'm talking about: About a CD-ROM Bootsector virus. :-)<br><br> </font><b>13.02.2005:</b><font size="2"> Finally, <a href="http://www.rrlf.de.vu">www.rrlf.de.vu</a> is uploaded. I need some more days to get access to upload. Anyway, it's in the net :).<br><br> </font><b>09.02.2005:</b><font size="2"> As rrlf.host.sk is down now, we have desided to move our site to helith, as it's one of the last places where vxers can do what they want. We also made a redirection URL called http://www.rrlf.de.vu. This URL will stay our URL, even if we get kicked by hosts. Well, the site, as far as helith-network agree (we think so :D), will be uploaded as soon as possible.<br><br> </font><b>01.02.2005:</b><font size="2"> I've finished an text called 'rRlf's bloody weekend', which will be released in rRlf#6. It's a text about the weekend, when philet0ast3r, DiA and rastafarie came to me. Currently rrlf.host.sk is down, for some days. I really hope it will return - we will wait for some more time, and if it don't return, we'll search a new host. I've also removed the old news from 2004. You can see a summary of the last year at the bottom of the page. I really had 100% no time for more coding last 1-2 weeks because this year I want to finish school=much to do. But I'll try to do my best as soon as possible.<br><br> </font><b>25.01.2005:</b><font size="2"> This weekend philet0ast3r, DiA and rastafarie visited me for two days. It was totally cool, drunken, bloody, whatever - it was a great fun. You may see some pics and texts of it in rRlf#6.<br><br> </font><b>16.01.2005:</b><font size="2"> Today I've finished an article called 'Over-File Splitting'. It's a new technique to fuck AVs. The article will be released in rRlf #6. And I've sent my unreleased article 'New era of bootsectorviruses #1: FAT12 IMG infection at Disks' and SPTH-OS 1.0 to <a href="mailto:lifewire@mail.ru">Lifewire</a> and they will be released iKx's xine #6.<br><br> </font><b>08.01.2005:</b><font size="2"> Yesterday I've talked with Vorgon, and he told me that iKx finally wants to make/release xine#6. Well, that 'rumous' has often spread you may say. But this time I really think/hope that it's true. Vorgon and lifewire are both active, and a new member called 'ch4r_' joined recently. They started two weeks ago and want to release it in March 2005. I cross fingers for you! Something else: I've finally finished an article called 'New era of bootsectorviruses #1: FAT12 IMG infection at Disks'. The article is a full explanation of SPTH-OS 1.0 and also explaines all basic about that topic. #2 and maybe even #3 will also be written (i really hope soon), about improved techniques of that one. I dont know when they will be released, because I dont know where. But I try to do it as soon as possible!<br><br> </font><b>04.01.2005:</b><font size="2"> Today I've finished the first version of my latest project: SPTH-OS 1.0. It's a bootsectorvirus, which infects the bootsector of FAT12 .IMG files in the Root_Directory of the current (infected) Disk. Executeable file uploaded (projects), source of this or a following version will be in rRlf#6! Of course, now let's go on with this project - 1.0 is just the very first finished version - more will come definitivly!<br><br> </font><b>01.01.2005:</b><font size="2"> Again today: While checking out the 29a articles I was kind of shocked: I found an article called 'BOOT CD INFECTION' by a virus writer called LiTlLe VxW. LiTlLe VxW had 100% the same idea as me - writing a CD-ROM Boot infector. :-) Strange, hmm? (Just to make sure: He did not used any idea by me as I did not make it public [to avoid anybody writing the same as me :-D]) Now you also know what my latest project is. Ironically LiTlLe VxW has even sent 'thanks' to me in his article. (Answere: Yes, of course, it is nice :D) I could not find any virus for that so far, so LiTlLe VxW: Let's make a compedition, who can make the first CD Boot Infector? ;-) I've worked on that topic for quite long time (let's say, 2-3 month) and I've already had some success. As there was no contact: In case if you read this - please send me a mail!<br><br> </font><b>01.01.2005:</b><font size="2"> Happy New Year! New year could not begin better: <a href="http://vx.netlux.org/29a/29a-8.rar">29A #8</a> has been released today (juppi!!! :D), and with it two articles by me: 'RUBY Virus Writing Guide' and 'Server -> Client Communication for Preprocessor languages (PHP)'. Therefore I've uploaded these two articles at my site. Something else: I've written an articles called 'FAT12 Dateizugriff' for the german online magzine <a href="http://lowlevel.brainsware.org/">LowLevel</a>. The article will be released in LowLevel#7.<br><br> </font><b>21.12.2004:</b><font size="2"> I've uploaded Anti Virus for MenuetOS 1.1. Now the scanner also detects Menuet.Tristesse. It was not hard to code, but I nearly forgot about that program. Well, I did not have alot of time lately, therefore I have not continued my project. But as next week my holidays begin, I'll definitivly continue, and then I can also finally tell you, what my project is about. By the way: My two unreleased articles will be published in 29A#8 (I've asked VirusBuster and he said that they are accepted and will be published). Official release date should be 1st or 2nd january 2005.<br><br> </font><b>15.12.2004:</b><font size="2"> I've collected alot of inforation about AVs and their bad behaviour, and I've written an text about that: <a href="kav.txt">How BigBrother wants to get us down!</a>. After reading you think different in some ways - I promise you! Please spread these infromations as hard as you can! Thank you!<br><br> </font><b>12.12.2004:</b><font size="2"> The rumous that KAV has something to do with the latest 'actions' against virus writers is no more a rumous: It's true! Once Aleks Gostev (KAV) wrote a letter to netlux.org for shutting down vx.netlux.org (over the head of herm1t). But as herm1t belongs to the netlux-team, the letter has been sent to him immediately. Also recent actions against whale have been forced by I. Sumenko (virus analyst), S. Shevchenko (head of department of anti-virus research) and N. Kaspersky (CEO).<br><br> </font><b>11.12.2004:</b><font size="2"> As host.sk is down again I had no homepage, but now, thanks to <a href="http://vx.netlux.org/">herm1t</a>, I have one again. If I would believe in god, i would say "God save you herm1t"! ;-) Much thanks for hosting me!!! I've found very first AV-report by Menuet.Tristesse. It's not very detailed, but it's true what the author (Crescencio Reyes) writes. The report can be found <a href="http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=MENUETVIR">here</a>. Well done, Trend Micro! I'm currently working on something never seen and really interesting, but it will take much more time - it's a quite big project, which is totally secret so far! :-) News about will come soon! I've also remved most of the BWG and JSG versions, because the old once are really uninteresting.<br><br> </font><b>30.11.2004:</b><font size="2"> <a href="http://www.viruslist.com/en/weblog">Viruslist: Benny, Ratter questioned</a>. I have talked to Benny about that statement, and he told me that he had NO connection with Slammer (so he will get no trouble - police got his software/hardware). And about Ratter, ValleZ and dis69 he said that he (and just he) had contact with police. Anyway, dis69 left <a href="http://29a.host.sk/">29A</a>. Well, the group is still active he said. Then, let's wait for first days in January 2005 for 29A#8! :-)<br><br> </font><b>24.11.2004:</b><font size="2"> KAV detects RUBY.Paradoxon as Ruby.Pydoxon.a. It's the first Ruby virus in their database. And a very late av-name-news: BatXP.Nihilist will be detected as VirTool.Bat.Nihi.a. Nice! But they still don't detect Menuet/COM.Tristesse, even they have the binary and the explained source! Shame on you! Well, I've also uploaded a new picture by me as the old one has been done about 10 months ago. I hope you like it :-).<br><br> </font><b>22.11.2004:</b><font size="2"> I have finished an article called 'Server -> Client Communication for Preprocessor Languages (PHP)'. Well, I think the title says everything. It will be released soon!<br><br> </font><b>13.11.2004:</b><font size="2"> <a href="http://rrlf.host.sk/rrlf5.zip">rRlf #5</a> is out! Just download it, it's great! :-) Therefore I've uploaded 3 viruses and 4 articles. Just look at the subsites! Well, as KAV was not able to detect JS.Cassandra.b - or maybe they did, i don't care - wanted to uploaded version C, which spreads very fast! But I did not because of three reasons: 1.) I don't want to get troubles. 2.) I don't want anybody spreading a virus. 3.) I don't like JavaScript anymore, so coding it would be very boring. Sorry!<br><br> </font><b>04.11.2004:</b><font size="2"> I've finished my latest project: The very first virus infecting Ruby-files. It's a prepender virus whithout a payload. I've sent the files to Kaspersky, looking for a new update with the virus 'Ruby.Paradoxon' :-). It will be released in rRlf#5. Now I'm going to write a tutorial and an advanced Ruby virus.<br><br> </font><b>03.11.2004:</b><font size="2"> I've left my old host vx.helith.net, because many persons could not contact my site. Now i'm hosted by philet0ast3r's at host.sk. Much thanks to philet0ast3r for let me put my stuff at your domain, and thanks to vh for having hosted my for long time! Thank you!<br><br> </font><b>01.11.2004:</b><font size="2"> I've added a new <a href="js.cassandra.b-col.zip">collection</a> of JS.cassandra.b. 21 generations (generation 1-21), because of <a href="mailto:alexander.gostev@kaspersky.com">Aleks Gostev</a>'s nice email ("Your crap dont work at 2nd generation"). I think this is a prove that you are false, my little friend! :-) I will upload JS.Cassandra.c at 13th november 2004, if KAV dont detect at least 99% of all generations (not just from that collection) until that date. The new version will contain mass-mail-routine, IRC-routine, P2P-routine, and will be at least as polymorph and encrypted as JS.Cassandra.b! A undetected (and maybe not real detectable) high-speed spreading worm. Just look at this site again in 2 weeks, and you will see what has changed :-)!<br><br> </font><b>13.10.2004:</b><font size="2"> Today an article called 'Todeskusse' by Kathrin Wesely came out in the german magazine STERN extra (Campus & Karriere). It's mainly about DiA and me, and there is also a picture of each one. The article is quite good beside of one thing: I do NOT listen to the music the author wrote (If you want, look at 'contact' to find out the music I like)!<br><br> </font><b>09.10.2004:</b><font size="2"> Yeahh, finally <a href="http://web105.essen082.server4free.de/lowlevel/doc/lowlevel-6.html">LowLevel#6</a> is out, and therefore I've uploaded 'Interview with Mike Hibbett' and 'MenuetOS - Der Weg zum Erfolg mit Assembler'. Have fun while reading, it's not virus related, anyway interesting I think.<br><br> </font><b>07.10.2004:</b><font size="2"> Finally, after about 5 month, rRlf's new page (<a href="http://rrlf.host.sk/">rrlf.host.sk</a>) is up again. Just look at it!<br><br> </font><b>06.10.2004:</b><font size="2"> <a href="http://www.dca-vx.go.ro/zine.html">DCA#1</a> is out. There are also some things by rRlf members (DiA, BlueOwl). So just get it. About rRlf: Philie has no time, and therefor he asked DiA, if he wants to be the new zine editor (he agreed) and me if i want to be the new webmaster (agreed too). Well, i haven't got the PWs so far, but as soon as I get it, I'll update the new site!<br><br> </font><b>18.09.2004:</b><font size="2"> I wrote an article for the german OS-development magazine <a href="http://web105.essen082.server4free.de/lowlevel/doc/index.html">LowLevel</a> called 'MenuetOS - Der Weg zum Erfolg mit Assembler'. The article contains some general parts from my 'MenuetOS infection' article, but also a coding example. The article doesn't contain any virus-related infos, just coding examples and infos. It will be released in LowLevel#6, and I hope the magazine is out soon. Currently I'm working on my probalby last MenuetOS virus, a very advanced one, and I've also discover some new parts of Menuet, as last version (0.78pre3) isn't that virus-friendly as other versions were. So much work again. Something very important: You know that www.rrlf.de belongs no more to us, as the provider kicked us (now it contains a nice sex-page :D), but philie registered <a href="http://rrlf.host.sk/">rrlf.host.sk</a>, and it's up now! Just visit it!!!<br><br> </font><b>08.09.2004:</b><font size="2"> Great news today: I've finished my latest project: Menuet/COM.Tristesse, a multi-platform infector. Tristesse infects COM files via appending and MENUET files via prepending. The biggest problem while coding was, that MenuetOS is a 32bit based OS, and COM files uses 16bits. Well, the virus will be released soon.<br><br> </font><b>04.09.2004:</b><font size="2"> My old host (www.bigsitecity.com) deleted my page, so I had to search a new host, and came back to Van Helsing. Thanks guy! Another thing: I finished an article called 'Code via Behaviour', and it will be released soon I hope.<br><br> </font><b>17.08.2004:</b><font size="2"> Three news today: Firstly, I wrote a text called 'The weekend of rRlf meeting', which is, as you can see on the name, about the weekend when I met PhileT0ast3r, DiA and the other guys/girls. The text will be released in rRlf#5 and rumous tells that PhileT0ast3r will also write such a text and release it in rRlf#5 :-). And secondly: I've coded an Anti Virus Program for MenuetOS, which is available with source in sub-site 'programs'. It may also be included to the official Menuet-disk, depends on what Mike Hibbett thinks. And last thing: KAV detects my 'Menuet.Oxymoron' as 'Menuet.Xymo.a', but they just detect it at one static offset, so most infected files aren't detected. Well done, guys. :D Maybe you should install the OS at least one time and test it!<br><br> </font><b>10.08.2004:</b><font size="2"> Maybe you noticed, but www.rrlf.de has been down for some days. Today philie told me the reason: The provider kicked www.rrlf.de due to illegal content! Now philie registered rrlf.host.sk, and it will be up very soon!<br><br> </font><b>09.08.2004:</b><font size="2"> I interviewed Mike Hibbett, the new main-coder of <a href="http://www.menuetos.org">MenuetOS</a> for the german online-magazine <a href="http://web105.essen082.server4free.de/lowlevel/doc/index.html">LowLevel</a>. The interview will be released in issue #6!<br><br> </font><b>02.08.2004:</b><font size="2"> That weekend I met PhileT0ast3r/rRlf with his girlfriend (3 days), Disk0rdia/rRlf (very short), dr.g0nZo/rRlf with his girlfriend (short) and DiA/rRlf (some hours) in real life. It was totally funny, and I was most time very drunken as we started our days with a 80% KORN! ;-)<br><br> </font><b>18.07.2004:</b><font size="2"> Today, while checking out <a href="http://www.viruslist.com">KAV's site</a> I had to look twice: <a href="http://29a.host.sk">29a</a> has finished three great new proof-of-concept viruses: <a href="http://www.viruslist.com/eng/viruslist.html?id=1580242">Win64.Rugrat.a</a> by roy g biv, <a href="http://www.viruslist.com/eng/viruslist.html?id=1689517">Worm.SymbOS.Cabir.a</a> by vallez and <a href="http://www.viruslist.com/eng/viruslist.html?id=1874404">WinCE.Duts.a</a> by Ratter! Damn, these guys are great and I'm looking forward to 31.12.2004/1.1.2005 for 29a#8!<br><br> </font><b>16.07.2004:</b><font size="2"> I'm sorry to bother you again today ;-), but I've a news: <a href="http://www.blackhatbook.com">John Biggs</a> released a book and I was interviewed for that. In the book there is also a screen-shot of my BWG and the full code of PHP.RainBow with a nice explanation. It's about all kinds of the underground (hackers, crackers, phreakers, virus writers, spammers, ...)<br><br> </font><b>16.07.2004:</b><font size="2"> I added some links to AV reports of my viruses and changed some links. Currently I'm working on a real new Menuet-virus, which will be good i think ;-)! About rRlf-page: It's not updated for more than two month, but don't worry: Philie is still alive, he's just damn busy!<br><br> </font><b>29.06.2004:</b><font size="2"> Finally, today I finished my latest article: MenuetOS infection. As it's a very long and detailt article, I'm very proud that I could show it to you soon. This article will also be released in rRlf#5. Another thing: KAV released a new update, and in it a virus called 'Menuet.Xymo.a'. I really hope that you will write a report about it. :-) My next project is, of course find some other secrets in that OS. That means: much work again. <br><br> </font><b>24.06.2004:</b><font size="2"> Again today: As I thought that I should release the executeable of my new virus, I did it (in 'project'-subsite)... Source will follow in rRlf#5!<br><br> </font><b>24.06.2004:</b><font size="2"> A big news: I finished my MenuetOS virus, which is the world's very first one, and it's called Menuet.Oxymoron. I sent the executeable to some AV-reasearchers, and the source will be released in rRlf#5. Now I start to write an article about MenuetOS viruses. News about that will come soon...<br><br> </font><b>07.06.2004:</b><font size="2"> Today I found something really interesting while searching with google: www2.coderz.net is still/again available. That means, that also some VX-homepages are available. :-) Now I want to say sorry not updating my page recently, but I haven't finished anything new, but nearly... Just wait for rRlf#5! And last thing: You can contribute to 29a#8 now, just contact VirusBuster!<br><br> </font><b>20.05.2004:</b><font size="2"> Being a little bit scared about Van Helsing, I got my old host. Today I read a very strange article about him, telling that he could be a very bad guy :D.<br><br> </font><b>19.05.2004:</b><font size="2"> Maybe you have already found out: I have a new Host... <a href="http://vx.helith.net/">Van Helsing</a> hosts me for about one week and everything works great so far. Much thanks, guy.<br><br> </font><b>28.04.2004:</b><font size="2"> DvL released <a href="http://www.geocities.com/batchlab/bz5.zip">Batch Zone #5</a>, and therefor I added an article called 'Past, Present and Future of Batch' and uploaded BatXP.Nihilist, which is the first Batch EPO virus.<br><br> </font><b>22.04.2004:</b><font size="2"> Today's night I found a great WinXP command. It's called <b>lsadump2.exe</b>. Inputing that filename to cmd.exe, you will get some strange values, which I haven't foudn out what they are. But one of these value if the Password of the Local User. I have tested it on Windows XP Home Edition with FAT32 and it works. It dont work on NTFS-formated hard disk, and it also don't exist on WinXP Professional. Anyways, it is really great, and I have already collected seven Password so far :-)<br><br> </font><b>19.04.2004:</b><font size="2"> I changed my web-host now, because geocities.com sucks! Much thanks goes to <a href="http://www.bigsitecity.com">bigsitecity.com</a>! I hope this one is ok now!<br><br> </font><b>16.04.2004:</b><font size="2"> I had some problems with my host, but it seems everything is ok again. I haven't finished upload the site so far, but I'll do it as soon as possible.<br><br> </font><b>12.04.2004:</b><font size="2"> GoodWeekend, The Sydney Morning Harald Magazine's weekend special released Clive Thompson's article again, and I'm on the cover of it. Beside of media-shit i improved the site: I rewrote links-sub-site, and now every link work and I added some other links and I added information about a finished virus at sub-site 'projects'.<br><br> </font><b>28.03.2004:</b><font size="2"> Two days ago an article in the german weekly magazine "Die Zeit" called "Infiziert" by Sabine Magerl came out. The Article is mainly about PhileT0ast3r and me, and there are also pictures in it. you can find the article <a href="http://www.zeit.de/2004/14/Virenw_9frmer">here</a>. And last week there was a translated and shorted version of Clive Thompson's virus article in the german weekly magazine "<a href="http://www.weltwoche.ch/artikel/?AssetID=7248&amp;CategoryID=60">WeltWoche</a>". <br><br> </font><b>19.03.2004:</b><font size="2"> It's my birthday today and I'm 2 years in the virus-writing scene. Many things happened the last year.... I wanted to upload a gift for you (Cipher Text Generator), but i wasn't able to finish it. So you have to wait some days/weeks... <br><br> </font><b>09.03.2004:</b><font size="2"> I have a new email address: <a href="mailto:spth@priest.com">spth@priest.com</a>. Every mail you sent last few days, please send it again, because the old one didn't work.<br><br> </font><b>07.03.2004:</b><font size="2"> I uploaded a picture of myself, because the other one sucked :-). You can find it in sub-site 'contact'...<br><br> </font><b>04.03.2004:</b><font size="2"> As KAV still don't detect my JS.Cassandra.b and <a href="mailto:alexander.gostev@kaspersky.com">Alexander Gostev</a> (a KAV researcher) making jokes about it, I decided to upload a collection of different generation of the virus. You can find it <a href="js.cassandra.b-col.zip">here</a>. I'm still discovering the MenuteOS Kernel and i've already found some very interesting things. You just have to wait some time...<br><br> </font><b>01.03.2004:</b><font size="2"> <a href="http://29a.host.sk/">29A issue #7</a> came out and with it an article by me called 'PHP Virus Writing Guide'. So I added this article. In the eZine there is a letter by Benny, who wrote that he leaves the virus-writing scene due to some reasons. One of the reasons is darkman's (a.k.a. johnlw) behavior in IRC #virus. He banned several people who are in the New York Times Magazine article like Benny, Vorgon, PhileT0ast3r and me. I don't want to write my opinion of that act here. Another news: <a href="http://vx.netlux.org">vx.netlux.org</a> is up again, but as it seems, no more a host for VX sites.<br><br> </font><b>26.02.2004:</b><font size="2"> I added JSG 1.16, because KAV added a very lame detection routine, so I also encrypted the standart code and fixed 8 bugs. To Alex: Try to work more on the Crypt.JSG, not on a standart-detetion because i can change the standart-code every time, and you can't rest in peace! :-)<br><br> </font><b>18.02.2004:</b><font size="2"> I found my source of JSG again, and so I finished the latest version and released it: Added dIRC/Xircon- Hard ay/Xircon - (More) Silence Way spreading, Added an extern encryption and improved the stardart encryption very much. And <a href="http://www.geocities.com/batch_zone/bz4.zip"> Batch Zone #4</a> is released.<br><br> </font><b>17.02.2004:</b><font size="2"> Gigabyte was arrested due to the fact, that she is virus writer. Now also coderz.net is down, which was a host for about 20 virus writer's homepages. Read the full article <a href="http://antivirus.about.com/b/a/2004_02_13.htm">here</a>. And now something much better: 29A magazine #7 will be released at 28th february 2004! And FormatC magazine #1 will be released at the beginning of March 2004. Let's hope that they will be good :-)<br><br> </font><b>08.02.2004:</b><font size="2"> Today The New York Times Magazine released an article by Clive Thompson called '<a href="http://www.nytimes.com/2004/02/08/magazine/08WORMS.html">The Virus Underground</a>'. It's really interesting, so go and read it. (I also became interviewed for the article in real life)<br><br> </font><b>03.02.2004:</b><font size="2"> KAV improved the detection of PHP.RainBow. Now they detect ~68%. Sorry, but that's not really enougth. :-) JS.Cassandra.a/b are still nearly undetect (that means up to generaton 3 there is nothing detect). Damn, what's up with you KAV? Well, you really increased the PHP.RaBow detection with 1200%, but that's still not enougth. And JS.Cassandra.a/b are more or less undetected (for a few month)...<br><br> </font><b>26.01.2004:</b><font size="2"> Added the second version of JS.Cassandra, which is definitivly my last script-virus. Well, JS.Cassandra.b is a 5-times polymorph, sometimes encrypt and very complex JS-virus. I wish the AVs much fun with detecting this virus! :-)<br><br> </font><b>14.01.2004:</b><font size="2"> I added a new article I made last 2 month. It's name is 'New IRC spreading' and it's about 2 new IRC-programs, which you can use to spread your worms.<br><br> </font><b>13.01.2004:</b><font size="2"> I removed the news from the year 2003. Now you can see them in the archiv, where you can also find a shourt resume of that year.<br><br> </font><b>06.01.2004:</b><font size="2"> New year begins with a very good news: It seems, some vx-people are still very interested. First thing is, that a group called BlackGate have a <a href="http://blackgate.us/">forum</a> where everybody can discuss about VX related topics and new techniques and whatever. Second cool thing is, that <a href="http://the-formatc.org/">formatC</a> (a group founded by Knowdeth) has a homepage and also hosts VX-sites. They also want to release a eZine with old 16-bit asm stuff (Back to the roots!). Well, let's hope that you can read more good news soon. Another thing: I added a motto at my homepage. Even this sentence is very old (middle of 70s), it's very good for our time: "Let the bells of freedom ring!" (Magician's Birthday by Uriah Heep)...<br><br> </font><b>24.12.2003:</b><font size="2"> Well, Kaspersky worked hard and tried to detect my viruses. Result of the hard work: JS.Cassandra (1.300 Files tested): 2nd Generation-Detection: ~5,8% | 3rd Generation-Detection: ~0%, PHP.RainBow (100 Files tested): 2nd Generation-Detection: ~5%! :D Well, I hope they haven't stopped to work on these problems.<br><br> </font><b>23.12.2003:</b><font size="2"> AArrrggghh... I hate christmas! Why I tell you this? well, just for fun :-)! OK, a little news: I met Arzy in real life at 20th december and another guy, but so far I won't tell you who it is. You will see in January 2004 :-).<br><br> </font><b>11.12.2003:</b><font size="2"> Added a small article about a problem with WindowsXP's NotePad (Microsoft Editor Version 5.1).<br><br> </font><b>06.12.2003:</b><font size="2"> As I said, <a href="http://www.rrlf.de/rrlf4.zip">rRlf#4</a> is out since today. Therefore I uploaded five viruses (PHP.RainBow, JS.Cassandra, JS.Sinope, BatXP.Palindrom.b, HTML.Umbriel) and 4 articles (Exotic Morphing Techniques In JavaScript, Polymorphism in JavaScript, Cross Infection in JavaScript, Useful things in JavaScript). Well, these are the things I did last few month. I hope you like it!<br><br> </font><b>01.12.2003:</b><font size="2"> Well, I've a news for you: rRlf #4 will be released at 6.12.2003 if everything works as it should work. I've already seen a member pre-view version and it's cool. OK, I also uploaded a new pic by me, since the other one is about 1 year old and now i'm looking little different (of course: I have long hairs now :D).<br><br> </font><b>20.11.2003:</b><font size="2"> BATch Zone #3 is out since today, and available <a href="http://www.geocities.com/ratty_dvl/BATch/bz3.zip">here</a>. Therefor I also uploaded a virus called BAT.Lorelei.<br><br> </font><b>16.11.2003:</b><font size="2"> Maybe you know it, but vx.netlux.org is down. I wrote some mails to herm1t, but haven't got an answere (so far??). Therefor I have a new host. I hope, herm1t's page will be up again, since he's one of the few sites, who's osting vx-related stuff. <br><br> </font><b>17.10.2003:</b><font size="2"> From Vorgon's site: "IKX Xine #6 in the works! Its been a long time since we released our last xine, but now were pulling together to release the best issue yet. Were looking for contributions from experienced vxers. Show us your lastest virii, worms, tuts and articles. Send all contributions to: vorgon_ikx@programmer.net.". Hope you have success :-)<br><br> </font><b>05.10.2003:</b><font size="2"> OK, Whackerz ezine #1 is out, and because of PakBrain's problems with his host, available <a href="whackerz1.zip">here</a>. Go and get it!<br><br> </font><b>01.10.2003:</b><font size="2"> First I want to say sorry for the long time of no news. OK, let's start: I found out, that KAV isn't able to detect the overwriter generated by my 'Simple Win32ASM Overwriter Generator', which I uploaded 3 month ago, and they also don't detect any output of my 'Random Silly Batch Generator', which became released 2,5 month ago. Seems they gave up the game... :D! Something else: rRlf#4 will be out soon, so if you want to contribute something useful go and drop <a href="mailto:philet0ast3r@rRlf.de">phileT0ast3r</a> a mail. Maybe you wonder, why I haven't uploaded anything recently, but my things will be released in zines, and these zines aren't out so far, as you may know. OK, what I'm doing now: I'm working on some cool JavaScript techniques and on some ideas jackie gave me. Thanks again! :-)<br><br> </font><b>09.09.2003:</b><font size="2"> As you know, I had to pass two exams these days, I have the resuls: I passed both, and now I'm really back, less quantity but more quality! :-) OK, I also uploaded an email by a TV security specialist, who tried to explain, why we talked shit. If you're bored, read it! It's a german text.<br><br> </font><b>06.09.2003:</b><font size="2"> A pure VX news again (I hope, somebody likes to read that, if not: mail me :D ): CoKe, member of the old and well-known VX group VLAD (dead), came back to the VX-scene again after a 8-year-pause. He said, that he wants to write viruses again and maybe reactiv VLAD again! Anyway, I wish you much success with your future projects!<br><br> </font><b>05.09.2003:</b><font size="2"> A pure VX news today: Yesterday I had a talk with Knowdeth, and it seems like Metaphase is dead, because most of the members were really lazy. And as you know, they wanted to release Metaphase#3, the zine will probably never released. But now some guys reactived <a href="http://vx.netlux.org/~slam/">SLAM</a> virus group, with new members (CyberYoda, veedee, Jackie, Lys Kovick and Knowdeth [hope I didn't forget anybody]), and they want to release SLAM#5. To contribute the zine, give CyberYode a mail, due he's the editor.<br><br> </font><b>16.08.2003:</b><font size="2"> I didn't upload anything this time, but I have a great news: AlcoPaul is back in the scene, and because of that, Brigada Ocho is also back! Now they are planning Brigada Ocho Zine #3. If you want to contribute, write an <a href="mailto:brigadaocho@digitelone.com">e-mail</a>. Also <a href="http://www.geocities.com/ratty_dvl/BATch/main.htm"> DvL </a> wants to release the <a href="http://www.geocities.com/ratty_dvl/BATch/main_files/bz.htm">BATch zine #3</a>. If you want to contribute him any batch stuff, drop him a <a href="mailto:dvl2003ro@yahoo.co.uk">mail</a>. Now about my site: I added some project-infos.<br><br> </font><b>20.07.2003:</b><font size="2"> <a href="http://www.velasco.com.br/"> Marcos Velasco </a> made a program called 'Anti-BAT', and I guess it's the very best Batch detection tool ever. You will find the program <a href="http://www.velasco.com.br/projetos.htm"> here</a>.<br><br> </font><b>17.07.2003:</b><font size="2"> DvL released his <a href="http://www.geocities.com/ratty_dvl/BATch/main_files/bz2.zip"> BATch Zine #2</a>. It contains one generator named 'Random Silly Batch Generator' and the 'Bat|BatXP.Iaafe', which I did together with philet0ast3r. Because of that I also uploaded these things at my homepage. <br><br> </font><b>02.07.2003:</b><font size="2"> There is a big problem, and I think, you should know it: I missed two subjects in school and i have to learn in holidays (next nine weeks). Maybe I'll do nothing next time. If I'll pass the exams in sebtember, I'll be back, else it could be that I'll be away forever. Chance is 50/50! I hope, that you understand my oppinion. Let's see, what future brings. <br><br> </font><b>30.06.2003:</b><font size="2"> I added the 'Simple Win32ASM Overwriter Generator'. Philet0ast3r and me thought, that it should not be in rRlf #4. Anybody sent the beta-version of the tool to KAV, but this is the real version. Currently the viruses aren't detect (and I hope, they will not be detect for long time :p). Something else: I deleted most of my viruses at the page just because of one reason: the are lame. In future I'll just upload viruses with some special features.<br><br> </font><b>14.06.2003:</b><font size="2"> In the Virus Bulletin of June 2003 is a article about one of my BWG-worms. The reason is, that this BAT.BWG.a@mm use the EICAR-file to avoid AV detection, and it seems, much AVs have problems with that. Therefore the definition of the EICAR-testfile became changed. I think, that's one of the biggest success of a batch-malware ever :-). More infos <a href="http://www.virusbtn.com/magazine/archives/200306/"> here</a>. Special Thanks goes once more to <a href="http://www.virustrading.com/doctorrave/"> Doctor Rave</a> for giving me the idea.<br><br> </font><b>09.06.2003:</b><font size="2"> Yesterday DvL released his zine. Download it <a href="http://www.geocities.com/ratty_dvl/BATch/main_files/bz1.zip"> here</a>. Because of that I added my second Interview, the Batch Encrypter 2.0 and one Batch Article. Somthing else: About 1h ago Philet0ast3r and Disk0rdia left. It was a genial time :-)<br><br> </font><b>08.06.2003:</b><font size="2"> Yesterday PhileT0ast3r and Disk0rdia arrived at my house! wow, i was so drunken and stoned yesterday. Because of that don't wait for some breaking new things from me in the next days :-) <br><br> </font><b>26.05.2003:</b><font size="2"> <a href="mailto:dvl2003ro@yahoo.co.uk">DvL</a> wants to release a Batch-only zine. If you want to contribute, please write him a mail. <br><br> </font><b>25.05.2003:</b><font size="2"> Added Batch Encrypter version 1.3. (Added trash including).<br><br> </font><b>25.05.2003:</b><font size="2"> I finished the the changed at site "viriis", "projects" and "programs". Now there are (better) explanation of the things.<br><br> </font><b>19.05.2003:</b><font size="2"> Today I got a mail by Kefi telling me, that a person named <a href="http://trax.to/sevenC"> SevenC </a> ripped my whole BWG! He haven't changed anything in he code, just the infos are changed. Also KAV detect it as Constructor.BAT.BWG.501, and the output is detect as I-Worm.BWG.d. You will find it <a href="BWGripped.zip"> here</a>. Thanks lamer!<br><br> </font><b>14.05.2003:</b><font size="2"> Maybe you saw it: I removed sub-site "bombs" and added "projects". Here you'll find all no released or not finished viruses.<br><br> </font><b>11.05.2003:</b><font size="2"> <a href="http://www2.coderz.net/coderz3.zip">coderz.net#3</a> is out, and there are some things from me. I also uploaded them at my page: "How To Crypt JavaScript" and "Polymorphism in BatXP".<br><br> </font><b>22.04.2003:</b><font size="2"> I fixed a totally silly and little bug in the JSG 1.14: Upoaded the JavaScriptGenerator 1.14 (fixed) <br><br> </font><b>21.04.2003:</b><font size="2"> I added a new JavaScriptGenerator: version 1.14: It's able to overwrite the autorun.inf, deleting AV programs and better encryption.<br><br> </font><b>21.04.2003:</b><font size="2"> Maybe you want it, maybe not: The password of the old JavaScript-Generator sources. It's <i> dnoces </i>!<br><br> </font><b>11.04.2003:</b><font size="2"> JavaScriptGenerator 1.13: I made the whole fake-variable parts new, and now they are much more variable, I think. And as you can see, I didn't added any new freature. If you know something useful to add in next version, please send me an eMail! Much Thanks!!<br><br> </font><b>10.04.2003:</b><font size="2"> Uploaded JSG 1.12! No new freatures, just killed KAV alarm! But you can expect something new in the next version!<br><br> </font><b>06.04.2003:</b><font size="2"> I made a new Win32 asm virus: Win32.Supertoys. It's another overwriter, which infects EXE, PIF, SCR, BAT, CMD and COM files!<br><br> </font><b>05.04.2003:</b><font size="2"> rRlf makes a contest (A polymorphic Bat and BatXP virus with 5.5KB). More information <a href="http://www.rrlf.de/countertest.html"> here </a>.<br><br> </font><b>05.04.2003:</b><font size="2"> Added the binary of Win32.Mood because I got about 15 mail asking for the Binary!<br><br> </font><b>03.04.2003:</b><font size="2"> Uploaded the JavaScript Generator version 1.11. Killed the "JS.Spthgen" by KAV. It was very easy, because the detection routine is very lame. I hope, they will work harder this days. Otherwise I've to think, that they loose the game "JSG versus KAV"! ;-) <br><br> </font><b>01.04.2003:</b><font size="2"> Added a Win32asm Virus: Win32.Mood <-- Infecting EXE by overwriting, hooks BAT, CMD, JS, VBS and HTM <br><br> </font><b>27.03.2003:</b><font size="2"> I uploaded another polymorphic BatXP virus: BatXP.Palindrom! It's changing its encryption variables. And with this virus I'm leaving the land of batch-malware! <br><br> </font><b>19.03.2003:</b><font size="2"> Today I've birthday: I'm 16! ;-) An other thing: I have been one full year in scene. Now: Let's have a party... <br><br> </font><b>17.03.2003:</b><font size="2"> I uploaded my very first Win32 ASM virus: Win32.Reiop (@austrian visitors: read it from behind :D )<br><br> </font><b>16.03.2003:</b><font size="2"> Uploaded a new JS worm: JS.NeptunMoon. You will find more information in the code.<br><br> </font><b>09.03.2003:</b><font size="2"> JSG version 1.10: Added HTM-dropping and improved other things.<br><br> </font><b>04.03.2003:</b><font size="2"> JavaScript Generator version 1.09 added fake variables and return to the start-vars and mixed up the letter variables.<br><br> </font><b>02.03.2003:</b><font size="2"> A new version of JavaScript-Generator is uploaded: version 1.08!<br><br> </font><b>27.02.2003:</b><font size="2"> I added a string-encrypter. you can use it to encrypt your secret messages. Don't know, if it have some sence, but I think, it's cool ;-)<br><br> </font><b>27.02.2003:</b><font size="2"> KAV detected the viriis from JSG! now it's a much better encryption: JSG 1.07 <br><br> </font><b>24.02.2003:</b><font size="2"> You can see a link above. I think, the name says everything! Please look at it!<br><br> </font><b>23.02.2003:</b><font size="2"> JS-Generator v 1.06: Added 2 new P2P spreading ways. JSG1.06 is the first program which infects these 2 programs!! Have Fun!<br><br> </font><b>22.02.2003:</b><font size="2"> I uninstalled FrontPage and wrote the whole HomePage new. Only with Notepad! ;-) It's really cool!<br><br> </font><b>21.02.2003:</b><font size="2"> JSG 1.05 is released. The worms are able to copie itself to all start-ups, not just german and english one. It can write a registry-key! and u can choose, when using eMail-spreading, that the worm shall make a crypt vbs-file to spead with it.<br><br> </font><b>19.02.2003:</b><font size="2"> KAV detect the virus "I-Worm.Spth.Jsg.c". It's a worm of my JSG! But, i cann't find it :-(! If you has it, pls send it to me. I'm going to send the first ppl the Constructor.BAT.Mchit.10 and Constructor.BAT.Mchit.21! These are 2 no released old VCKs. Just for collectors ;-) OK, pls search for it! thx!<br><br> </font><b>16.02.2003:</b><font size="2"> Perhabs you can remember the Batch Worm Generator. A program, generating Batch worms and viriis! This program has a new version! ;-) OK: Batch Worm Generator 5.03 is uploaded! Also the source of it!<br><br> </font><b>16.02.2003:</b><font size="2"> I uploaded the new version of the Batch Encrypter, which I'm coding since Tim Strazzere have no time. Some new things. I hope, you like it<br><br> </font><b>15.02.2003:</b><font size="2"> I uploaded a virus, which works as batch-file and as JS-file. The name is BAT|JS.Charon! I think it's cool! ;-)<br><br> </font><b>14.02.2003:</b><font size="2"> JavaScriptGenerator 1.04: Fixed 34 bugs! But now, everything should work, because I've tested them! But, if you find one, pls send me a mail! Thanks you!<br><br> </font><b>12.02.2003:</b><font size="2"> JSG 1.03: Added VBS dropping, much better encryption, nearly every string is encrypt, fixed a bug in vIRC<br><br> </font><b>12.02.2003:</b><font size="2"> I deleted the "news" from the year 2002. You'll find them in the archiv (and you'll find a short resume of that year too).<br><br> </font><b>10.02.2003:</b><font size="2"> JavaScriptGenerator 1.02: Fixed a bug in the P2Ps, added 3 new P2Ps and started to crypt the thing.<br><br> </font><b>04.02.2003:</b><font size="2"> The rRlf #3 zine is realised! Download it from here. Also new programs from me like "Special Format Generator v2.0"...<br><br> </font><b>04.02.2003:</b><font size="2"> Added the new version of the JSG: version 1.01! Included PIF file dropping, fixed 2 bugs and all variables and file names are randomize!<br><br> </font><b>02.02.2003:</b><font size="2"> Uploaded JSG1.00! Now it's coded with Visual Basic! ;-) No more (DOS) QBasic! Sorry, that I haven't uploaded something earlier, but I was to busy. And I'm also learning Win32 ASM! A Win32 ASM virus will be realised in the next 2 or 3 weeks [It doesn't work yet :-( ]! <br><br> </font><b>22.01.2003:</b><font size="2"> I'm hosted by vx.netlux.org. Big Thanks goes to herm1t! ;-)<br><br> </font><b>22.01.2003:</b><font size="2"> I stop to trade viruses because of two reasons: First, I waste too much time while uploading and downloading, searching for viruses. Second, my Mail-Account allows just 1,5MB, and i get every day about 5MB stuff, so the important eMails can't sent to me. Sorry about it!<br><br> </font><b>18.01.2003:</b><font size="2"> JavaScript Generator 0.07: It's realised ;-) I added BAT and CMD file dropping<br><br> </font><b>15.01.2003:</b><font size="2"> My provider is activ again ;-) yeah... if there was a error while this 3 days, pls send me your mail again. very thank ya!<br><br> </font><b>14.01.2003:</b><font size="2"> My eMail host is down since 12.01.2003! So i can't send eMails to somebody and i also can't get any mails. Sorry about it!<br><br> </font><b>12.01.2003:</b><font size="2"> Uploaded 8 very silly BatXP virus Samples. It's just for showing some things in BatXP<br><br> </font><b>12.01.2003:</b><font size="2"> Uploaded JSG 0.06: Added LNK-dropping, fixed a bug and made the P2P codes better.<br><br> </font><b>09.01.2003:</b><font size="2"> <a href="http://eikcaj.host.sk/files/copycat.txt">http://eikcaj.host.sk/files/copycat.txt</a>: I deleted the "Perfect I-Worm via JS" article, because i forgot to thank jackie and bumblebee for there JS-viriis, and now, jackie is very angry :-(!!!! Nochmal: war wirklich keine Absicht, irgendetwas von irgendjemandem zu stehlen. Ich will einfach mit jedem gut auskommen ;-)<br><br> </font><b>08.01.2003:</b><font size="2"> Bug fixed, the code is much better: JavaScriptGenerator 0.05<br><br> </font><b>07.01.2003:</b><font size="2"> Uploaded the 4th version of the JavaScriptGenerator: JSG 0.04!<br><br> </font><b>06.01.2003:</b><font size="2"> I added my Virus-Log file! I think I'll update it every day.<br><br> </font><b>06.01.2003:</b><font size="2"> I uploaded my very first ASM virus. pls don't laugh about it, it's my first one.<br><br> </font><b>01.01.2003:</b><font size="2"> The next version of my JSG --> version 0.03!<br><br> </font><b>30.12.2002:</b><font size="2"> Uploaded the new version of the JSG: JavaScript Generator 0.02! ;-)<br><br> </font><b>28.12.2002:</b><font size="2"> I made a new Constructor: JavaScript Generator 0.01! I'll made this program at least as good as my BWG! ;-)<br><br> </font><b>26.12.2002:</b><font size="2"> AV name from BatXP.Name -> BAT.Spth.Name :-( they didn't gave BatXP viriis an other name!!!<br><br> </font><b>24.12.2002:</b><font size="2"> I uploaded a silly BatXP virus, because I wanna know, how AVs name this sort of viruses... Look in some days and I'll add the AV name! I think, they won't name it BAT, because BAT works only with command.com!<br><br> </font><b>13.12.2002:</b><font size="2"> Batch Worm Generator 5.02: Fixed 3 Bugs, killed a KAV heuristic alarm and changed thecode if you don't choose poly. I'll change the whole poly-engine in one of the next versions. The result should be that the engine is smaller, better and totally batch (no more VBS). ;-)<br><br> </font><b>07.12.2002:</b><font size="2"> Uploaded a encrypt VBS-IRC spreader: VBS.CryptPirch! I hope, you'll like it!<br><br> </font><b>07.12.2002:</b><font size="2"> Added a photo of myself ;-) You can find it <a href="contact.htm">here</a><br><br> </font><b>06.12.2002:</b><font size="2"> Changed the HTML.Multi-virus. I found a really silly bug: i wrote ( if { $nick!=$me} {halt} ), so the virus wouldn't spread to any other ppl beside of the infect user... Sorry, but I was really confiused last time ;-)<br><br> </font><b>22.11.2002:</b><font size="2"> Uploaded a BatXP-Virus. Perhabs you don't know, that WinXP uses an other DOS than Win95/95/00 Home. The virus named BatXP.Saturn, spread via infecting files and mIRC. It's encrypt with special characters and polymorph without any script language. Only Batch XP. ;-) I hope you'll like it.<br><br> </font><b>18.11.2002:</b><font size="2"> Added a HTML mIRC spreader, using VBS and JS: HTML.Multi<br><br> </font><b>18.11.2002:</b><font size="2"> Changed the false Perl.Nirvana link. Now you can download it!<br><br> </font><b>15.11.2002:</b><font size="2"> Uploaded my first Perl virus: Perl.Nirvana<br><br> </font><b>12.11.2002:</b><font size="2"> Added a VBS Tutorial: The Perfect Internet Worm via VisualBasicScript<br><br> </font><b>11.11.2002:</b><font size="2"> Uploaded a program, which generates crypted Batch-Formater and it's source. I think, it's really perfect crypted ;-)<br><br> </font><b>06.11.2002:</b><font size="2"> Added a JS tutorial: The Perfect Internet Worm via JavaScript<br><br> </font><b>01.11.2002:</b><font size="2"> Yeahhh... I succed! KAV is not able to detect my viruses in the right way. They detect a definitions-name, not the payload function <-- seen in Trojan.BAT.FormatCQU.j ;-) I'm sure, I'll make a program, using this techniques, so no AV will detect these viruses...<br><br> </font><b>27.10.2002:</b><font size="2"> Added the second version of the SpecialCharacters-Trojan...<br><br> </font><b>20.10.2002:</b><font size="2"> Uploaded a new article: Special Character List for Batch Encryption<br><br> </font><b>20.10.2002:</b><font size="2"> Added a new virus: Only a FormatC Trojan, but a fuckin' good encryption ;-)<br><br> </font><b>18.10.2002:</b><font size="2"> Joined rRlf, a german virus group... <br><br> </font><b>18.10.2002:</b><font size="2"> Uploaded BAT.Snake.i  <-- crypted with Tim Strazzere's Batch Encrypt Version 1.1<br><br> </font><b>13.10.2002:</b><font size="2"> Uploaded Setman 7.0: Killed I-Worm.BWG.d <br><br> </font><b>13.10.2002:</b><font size="2"> Added BAT.Snake.h <-- more variable... +fg+ <br><br> </font><b>09.10.2002:</b><font size="2"> Today I left eBCVG because of some special reasons. Good luck and best greets to Dr.T and the rest of the eBCVG staff...<br><br> </font><b>09.10.2002:</b><font size="2"> Changed <a href="links.htm">links</a>... Added Thanks and Greets<br><br> </font><b>08.10.2002:</b><font size="2"> Added Setman 6.0: Fixed 2 bugs and killed I-Worm.BWG.d<br><br> </font><b>06.10.2002:</b><font size="2"> Uploaded my latest article: "Undetelateable direction via Batch, VBS and JS"<br><br> </font><b>06.10.2002:</b><font size="2"> Uploaded BAT.Snake.g  <-- crypted with Tim Strazzere's Batch Encrypt Version 1<br><br> </font><b>30.09.2002:</b><font size="2"> Added a new article: Perfect Internet Worm via batch v2.0<br><br> </font><b>29.09.2002:</b><font size="2"> Batch Worm Generator 5.01: Killed I-Worm.BWG.f and Trojan.BAT.KillAV.h<br><br> </font><b>29.09.2002:</b><font size="2"> Setman 5.0: Killed I-Worm.BWG.d and fixed a silly bug<br><br> </font><b>28.09.2002:</b><font size="2"> Uploaded BAT.Snake.f<br><br> </font><b>27.09.2002:</b><font size="2"> Uploaded my first Win32-Maleware: Trojan.Win32.Spitfire<br><br> </font><b>25.09.2002:</b><font size="2"> Added Batch Worm Generator 5.00!!!<br><br> </font><b>25.09.2002:</b><font size="2"> Added articles...<br><br> </font><b>15.09.2002:</b><font size="2"> Added my first JavaScript Virus...<br><br> </font><b>10.09.2002:</b><font size="2"> Batch Worm Generator 4.11 is uploaded...<br><br> </font><b>08.09.2002:</b><font size="2"> Changed <a href="links.htm">links</a>: Added some virii-groups and deleted authors (sorry, but it's impossible to write the name of every Coder)<br><br> </font><b>05.09.2002:</b><font size="2"> BAT.Snake.e is uploaded <-- little changes: KAV don't detect it yet<br><br> </font><b>02.09.2002:</b><font size="2"> Batch Worm Generator 4.10 is uploaded<br><br> </font><b>01.09.2002:</b><font size="2"> Uploaded Batch Trojan Generator 0.07: Killed Trojan.BAT.FormatCQU.f<br><br> </font><b>01.09.2002:</b><font size="2"> Uploaded Setman 4.0: Killed I-Worm.BWG.d<br><br> </font><b>01.09.2002:</b><font size="2"> BAT.Snake.d is uploaded <-- very nice encryption ;-)<br><br> </font><b>25.08.2002:</b><font size="2"> Uploaded BAT.Metamorph <-- It's the first metamorph batch virus<br><br> </font><b>19.08.2002:</b><font size="2"> New sub-site: virii<br><br> </font><b>13.08.2002:</b><font size="2"> Killed I-Worm.BWG.d <- Batch Worm Generator 4.09<br><br> </font><b>11.08.2002:</b><font size="2"> Batch Worm Generator 4.08: Fixed 2 bugs and killed 7 different viruses.<br><br> </font><b>10.08.2002:</b><font size="2"> Batch Trojan Generator 0.06: Killed Trojan.BAT.FormatCQU.f and Trojan.BAT.FormatCQ.o<br><br> </font><b>10.08.2002:</b><font size="2"> Upload a very silly Trojan.BAT.Looper - Generator: Looper Generator 1.0<br><br> </font><b>10.08.2002:</b><font size="2"> Setman 3.0 uploaded: Killed I-Worm.BWG.d<br><br> </font><b>09.08.2002:</b><font size="2"> KAZAA spreading and bug fixed: Batch Worm Generator 4.07<br><br> </font><b>08.08.2002:</b><font size="2"> Batch Trojan Generator 0.05: Fixed 16 bugs and killed Trojan.BAT.FormatCQU.f<br><br> </font><b>08.08.2002:</b><font size="2"> Batch Worm Generator 4.06: Choosing if polymorph and killed I-Worm.BWG.f<br><br> </font><b>26.07.2002:</b><font size="2"> I uploaded the Batch Trojan Generator 0.04: win.ini start and killed KAV's Trojan.BAT.BTG<br><br> </font><b>26.07.2002:</b><font size="2"> My Host don't like my HomePage! Because of that they deleted my Site and it was down!<br><br> </font><b>18.07.2002:</b><font size="2"> Batch Worm Generator 4.05: It's harder to del the worm from the system.<br><br> </font><b>11.07.2002:</b><font size="2"> Upload two versions of a silly Internet-worm Generator: Setman 1.0 and Setman 2.0<br><br> </font><b>07.07.2002:</b><font size="2"> Send Mail 2.00 is uploaded.<br><br> </font><b>06.07.2002:</b><font size="2"> Batch Trojan Generator 0.03 is uploaded.<br><br> </font><b>05.07.2002:</b><font size="2"> Added a Anti AV technique! Batch Worm Generator 4.04!<br><br> </font><b>02.07.2002:</b><font size="2"> Killed I-Worm.BWG.c and I-Worm.BWG.f! Fixed a bug and replaced the AV-Killing part: BWG 4.03!<br><br> </font><b>27.06.2002:</b><font size="2"> Batch Worm Generator 4.02: Fixed 4 bugs and killed KAV virus I-Worm.BWG.f!<br><br> </font><b>21.06.2002:</b><font size="2"> Fixed 13 silly bugs! BWG 4.01<br><br> </font><b>21.06.2002:</b><font size="2"> The first really polymorph BATCH WORM GENERATOR: version 4.00<br><br> </font><b>16.06.2002:</b><font size="2"> Batch Worm Generator 3.02 uploaded!<br><br> </font><b>10.06.2002:</b><font size="2"> Version 3.01 from Batch Worm Generator!!!<br><br> </font><b>10.06.2002:</b><font size="2"> Batch Trojan Generator 0.02: Added file overwriting<br><br> </font><b>10.06.2002:</b><font size="2"> SendSMS 2.0 uploaded (german): fixed bugs!<br><br> </font><b>07.06.2002:</b><font size="2"> New program: Batch Trojan Generator 0.01 -> totally random!<br><br> </font><b>06.06.2002:</b><font size="2"> Killed a Norton AV virus, made VBS, REG and LNK dropping random: Batch Worm Generator 2.09<br><br> </font><b>06.06.2002:</b><font size="2"> Deleted some dead links and added some new...<br><br> </font><b>02.06.2002:</b><font size="2"> Added .PIF and .LNK dropping<br><br> </font><b>31.05.2002:</b><font size="2"> BWG 2.07: Added VBS file dropping, and the BWG-Worms are harder to detect<br><br> </font><b>25.05.2002:</b><font size="2"> Virc spreading, REG file dropping, more AV programs to delete... BWG 2.06<br><br> </font><b>22.05.2002:</b><font size="2"> A lot of work, but I think it's good: Batch Worm Generator 2.05<br><br> </font><b>18.05.2002:</b><font size="2"> A really very random BWG: 2.04<br><br> </font><b>13.05.2002:</b><font size="2"> A new BWG is uploaded: version 2.03<br><br> </font><b>05.05.2002:</b><font size="2"> Batch Worm Generator 2.02 uploaded...<br><br> </font><b>27.04.2002:</b><font size="2"> KAV doesn't detect any worm: Batch Worm Generator 2.01<br><br> </font><b>16.04.2002:</b><font size="2"> Fixed five bugs! BWG 1.11<br><br> </font><b>14.04.2002:</b><font size="2"> Random file names and fixed two major bugs: BWG 1.10<br><br> </font><b>13.04.2002:</b><font size="2"> Autoupdate function and I-Worm.Pics killed: BWG 1.09<br><br> </font><b>11.04.2002:</b><font size="2"> A very random BWG is uploaded: BWG 1.08<br><br> </font><b>09.04.2002:</b><font size="2"> The new BWG is uploaded: version 1.07<br><br> </font><b>09.04.2002:</b><font size="2"> Send SMS 1.0 uploaded! (german)<br><br> </font><b>07.04.2002:</b><font size="2"> The best BWG ever is uploaded! fg Version 1.06!<br><br> </font><b>06.04.2002:</b><font size="2"> BWG 1.05 uploaded (english)! It tricks the KAV heuristic!! ;-)<br><br> </font><b>04.04.2002:</b><font size="2"> BWG 1.04 uploaded (english)<br><br> </font><b>30.03.2002:</b><font size="2"> BWG 1.03 uploaded (english)<br><br> </font><b>26.03.2002:</b><font size="2"> BWG 1.02 uploaded (english)<br><br> </font><b>24.03.2002:</b><font size="2"> English version of BWG 0.05 uploaded, german and english version of BWG 1.01 uploaded<br><br> </font><b>23.03.2002:</b><font size="2"> SendMail 1.00 uploaded (bombs), made the whole site<br><br> </font><b>22.03.2002:</b><font size="2"> BWG version 0.05 (german) uploaded<br><br> </font><b>15.03.2002:</b><font size="2"> BWG version 0.01 uploaded<br><br> </font></font>