virus-stoned empire monkeys.b


Recommended Posts

sorry...i did not see the forum this should go to...hoping that from here someone would place it for me.

dell dimension 4600

intel 2.8 ghz - 2.5 gb

win-xp home sp 2

avg virus - comodo fireware pro - spybot search & destroy - ad aware 2007

evening,

i would like to find out just what the "stoned empire monkey.b" wanted from the user's computer. i have learned (from internet forums) that it went to and moved the mbr record on the harddrive. does the virus try to get the passwords and such and then use email to send to off to another address. i have learned that it is a old virus but can not seem to find out just what is was suppose to do the the computer.

i was working/playing with an old computer with a small 325.46M (341090304 bytes) harddrive. i think the drive is less than a gm. in any case, i think i got the virus when i was trying to make a bootdisk off the drive to use once i had fdisk and formated the drive. i was going to reuse that diskette and so placed it into my dell machine to format and the avg picked up the virus, stoned empire monkey.b.....

i ran my virus, spybot and ad aware.........all came back clean. i still worry that the boot record was moved and that it (the virus) is just not seen.

please, any help.

tazpaige

Link to comment
Share on other sites

NASTY...

As the name indicates, Monkey is a distant relative of Stoned. Its technical properties make it quite a remarkable virus, however. The virus infects the Master Boot Records of hard disks and the DOS boot records of diskettes, just like Stoned. Monkey spreads only through diskettes.

Monkey does not let the original partition table remain in its proper place in the Master Boot Record, as Stoned does. Instead it moves the whole Master Boot Record to the hard disk's third sector, and replaces it with its own code. The hard disk is inaccesible after a diskette boot, since the operating system cannot find valid partition data in the Master Boot Record - attempts to use the hard disk result in the DOS error message "Invalid drive specification".

When the computer is booted from the hard disk, the virus is executed first, and the hard disk can thereafter be used normally. The virus is not, therefore, easily noticeable, unless the computer is booted from a diskette.

The fact that Monkey encrypts the Master Boot Record besides relocating it on the disk makes the virus still more difficult to remove. The changes to the Master Boot Record cannot be detected while the virus is active, since it rerouts the BIOS-level disk calls through its own code. Upon inspection, the hard disk seems to be in its original shape.

The relocation and encryption of the partition table render two often-used disinfection procedures unviable. One of these is the MS-DOS command FDISK /MBR, capable of removing most viruses that infect Master Boot Records. The other is using a disk editor to restore the Master Boot Record back on the zero track. Although both of these procedures destroy the actual virus code, the computer cannot be booted from the hard disk afterwards.

There are five different ways to remove the Monkey virus:

1. The original Master Boot Record and partition table can be restored from a backup taken before the infection. Such a backup can be made by using, for example, the MIRROR /PARTN command of MS-DOS 5.

2. The hard disk can be repartitioned by using the FDISK program, after which the logical disks must be formatted. All data on the hard disk will consequently be lost, however.

3. The virus code can be overwritten by using FDISK/MBR, and the partition table restored manually. In this case, the partition values of the hard disk must be calculated and inserted in the partition table with the help of a disk editor. The method requires expert knowledge of the disk structure, and its success is doubtful.

4. It is possible to exploit Monkey's stealth capabilities by taking a copy of the zero track while the virus is active. Since the virus hides the changes it has made, this copy will actually contain the original Master Boot Record. This method is not recommendable, because the diskettes used in the copying may well get infected.

5. The original zero track can be located, decrypted and moved back to its proper place. As a result, the hard disk is restored to its exact original state. F-Secure anti-virus products use this method to disinfect the Monkey virus.

It is difficult to spot the virus, since it does not activate in any way. A one-kilobyte reduction in DOS memory is the only obvious sign of its presence. The memory can be checked with, for instance, DOS's CHKDSK and MEM programs. However, even if MEM reports that the computer has 639 kilobytes of basic memory instead of the more common 640 kilobytes, it does not necessarily mean that the computer is infected. In many computers, the BIOS allocates one kilobyte of basic memory for its own use.

The Monkey virus is quite compatible with different diskette types. It carries a table containing data for the most common diskettes. Using this table, the virus is able to move a diskette's original boot record and a part of its own code to a safe area on the diskette. Monkey does not recognize 2.88 megabyte ED diskettes, however, and partly overwrites their File Allocation Tables.

Note: When disinfecting Monkey with F-PROT after a floppy boot, use the command F-PROT /HARD /DISINF instead of using F-PROT C:, or just run F-PROT in interactive mode and scan 'Hard disk' with disinfection option on. After disinfection, error message 'No hard disk found' is normal: just reboot after the disinfection is done and you should see your hard drive again.

Link to comment
Share on other sites

This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.