TIP: Click on subject to list as thread! ANSI
echo: virus_info
to: ANGELO BRANCADORO
from: JEAN MORISSETTE
date: 1997-11-30 01:41:00
subject: Tentacle

  Hi Angelo.
Angelo ‚crivait … All, dans: Tentacle, ce mois #11-26-97 11:42:
AB> @MSGID: 1:141/421.0 347c516c
AB> Does anyone have any info on the tentacle virus?
       NO !!  8-)
    F-PROT anti-virus program...
Name: Tentacle
Alias: Win.Tentacle
Type: Non-resident  EXE-files
Size: 1958
This Windows-based virus was found in the wild from France and UK in
March 1996. The virus was distributed in a file called dogzcode.zip
via the alt.cracks usenet newsgroup. Tentacle infects Windows 3.1x EXE
files.
Tentacle infects files in the current and Windows directories. It does
not stay memory resident.
Occasionally, Tentacle will replace the icon in the infected EXE file
with it's own copy. This new icon has a picture of a tentacle and
the text 'Tentacle'. Tentacle also sometimes corrupts EXE files when
infecting them. Such program do not work after the infection.
The author of this virus also wrote the Shell (Tentacle II) virus.
See: Shell
Name: Tentacle_II
Alias: Shell
Size: 10634
This virus was found in the wild in June 1996 in USA, UK, Australia,
Norway and New Zealand. It has possibly been distributed over the
internet several times. A known infection happened on the 3rd of
August, 1996, when an infected screen saver called PCTRSHOW.ZIP
was posted to the following newsgroups:
 alt.sex.pictures
 alt.binaries.pictures.erotica
 alt.binaries.pictures.erotica.blondes
 alt.binaries.pictures.erotica.breasts
 alt.binaries.pictures.erotica.cheerleaders
 alt.binaries.pictures.erotica.female
 alt.binaries.pictures.erotica.lesbians
 alt.binaries.pictures.erotica.oral
 alt.binaries.pictures.erotica.orientals
 alt.binaries.pictures.erotica.redheads
 alt.binaries.pictures.erotica.teen
 alt.binaries.pictures.erotica.teen.female
 alt.binaries.pictures.erotica.voyeurism
 alt.binaries.pictures.erotica.young
 alt.binaries.pictures.groupsex
 alt.binaries.pictures.erotica.latina
 alt.binaries.pictures.celebrities
 alt.binaries.pictures.girls
Do note that there are also clean copies of PCTRSHOW in circulation.
The virus infect only Windows 3.x executables (NE), and it does it
without changing the executable entry point. This is an unusual infection
method and was first introduced in this virus.
When executed, Tentacle_II searches the directory tree for suitable
files to infect. Only EXE and SCR (screen saver) files can get
infected.
Also 32bit Win95 and WinNT executables can be infected by the virus,
but these files are unable to spread the infection further.
Tentacle_II does not stay resident in memory.
This virus activates by dropping a GIF file, which contains a picture
of a Tentacle and text:
 I'm the Tentacle Virus!
The author of this virus also wrote the original Tentacle virus,
which is technically quite different from this virus.
See: Tentacle
Description: Mikko Hypponen, Data Fellows Ltd's F-PROT Pro Support
=== end of F-PROT descriptions ==========
 These are good ones !!
 F-PROT, same competance as Querterdeck !!
AB> ! Origin: Kefka's Lair 203-255-3908. HOME OF FINAL FANTASY!
AB> (1:141/421)
... From a guy, near Montreal, Quebec, Canada.
---
 ž Blue Wave/QWK v2.12 ž
---------------
* Origin: [F] -=Lions BBS=- Lemoyne, Qc (514)923-7925 (1:167/580)

SOURCE: echomail via exec-pc

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.