Skip to content

roger-wetzel/TTV1

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 

Repository files navigation

The First Terrorists Virus (TTV1)

Facts

  • TTV1 was the first file-based Amiga virus
  • Its creation was a fun experiment. It was inspired by the boot block based SCA virus which had reached dubious fame due to its very successful spreading and the flaw of overwriting the boot block. Would it be possible to create a self spreading file, thus breaking out of the boot block dread?
  • Development took place between spring and fall 1988.
  • The early code name was HOUZ virus.
  • Thinking up the name we tried to find something that would sound mean and at the same time on the verge to ridiculous. The final name was inspired by a rap band called The Terrorists.
  • The virus does not harm the system. In fact, care was taken to avoid any even unintentional damage.
  • Identity of the authors was kept secret for 30 years. It was officially revealed on March 9, 2019 at the Demonights 008 event in Bern Switzerland
  • "The names have been changed to protect the innocent" shown in the message was inspired by the song Beat Dis by Bomb the Bass. They have sampled it from the Dragnet radio series.
  • The "BGS9" was in fact a clone. Its code is almost identical even including the resident name "TTV1". It got more reach and thus was regarded as the origin.

About the life of the beast

  1. TTV1 installs itself as a reset proof resident module (KickTag/ROMTag) named "TTV1"
  2. On reset the resident module (virus) is called
  3. Execution gets delayed in order to gain disk write access. Therefore Intuition's OpenWindow function is redirected.
  4. As soon as the AmigaDOS tries to open the CLI window the OpenWindow gets called the virus looks for the startup-sequence on the booted disk
  5. The virus is looking for the first command (A) in the startup-sequence
  6. File request windows (e.g. "Disk is write protected") are being temporarily disabled
  7. Virus renames A to $a0202020a02020a020a0a0. This is a combination of none breaking spaces and spaces. The idea is that the user will oversee this "invisible" file.
  8. Virus writes itself as an executable command with the name of A to the disk
  9. Eventually A gets loaded and executed with all its parameters by the virus

The next time the user will boot the disk the virus gets loaded into RAM and step 1 takes place. On reset the horizonal beam position gets evaluated. If the beam position is smaller than a certain number the screen turns black and a message in white letters appears.

Running

Use Masterseka (e.g. V1.71) to assemble/compile the source code (ttv1.s) and run the virus.

SEKA>r ttv1.s
File length=xxxxx  (=$0000xxxx)
SEKA>a
OPTIONS>
No Errors
SEKA>j

Then (soft) reset your Amiga to activate the virus.

Authors

Acknowledgments

Message Screen

The evolution of the message screen while development.

Early TTV1 message 1

Static text using the default system font.

Early TTV1 message 2

Faded text lines using the default system font.

Final TTV1 message

Final version: Faded text lines using a custom designed 8-bit font.

References on TTV1

Other related references

About

The First Terrorists Virus (TTV1)

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published