Threat Description

Gibe.D

Details

Aliases:Gibe.D, I-Worm.Gibe.D, Gibe_D
Category:Malware
Type:Worm
Platform:W32

Summary



Gibe.d worm first appeared in the end of March 2003. The worm spreads itself via e-mail, IRC, local network and P2P (peer-to-peer) networks. The worm pretends to be an update from Microsoft when it spreads via e-mail.



Removal


Automatic action

Once detected, the F-Secure security product will automatically disinfect the suspect file by either deleting it or renaming it.

More

You may wish to refer to the Support Community for further assistance. You also may also refer to General Removal Instructions for a general guide on alternative disinfection actions.



Technical Details



The file that spreads via e-mails is a dropper. It is a 167-kilobyte file written in Visual Basic. It is a dropper that contains a few compressed files in its body.

Technically the .D variant is not much different from .B variant of the worm. You can find the description of .B variant here:

http://www.europe.f-secure.com/v-descs/gibe_b.shtml

There are a few differences comparing to earlier versions:

1. The dropper now uses randomly generated key name to hold its settings:

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion
  \Internet Settings\<random_name>]

2. The dropper has an extended list of names that it uses to drop itself to Kazaa shared folders:

IEPatch
 KaZaA upload
 Porn
 Sex
 XboX Emulator
 PS2 Emulator
 XP update
 XXX Video
 Sick Joke
 Free XXX Pictures
 My naked sister
 Hallucinogenic Screensaver
 Cooking with Cannabis
 Magic Mushrooms Growing
 Worm_Gibe.C Cleaner
 ICQ upgrade
 KaZaA spyware patch
 BillGates
 WinZip
 Download Accelerator
 Hackers Guide
 Psycho

3. The dropper copies itself as xx.DLL (where 'xx' are random characters) to Windows folder on a local computer. It also copies itself to Windows folder with a randomly generated name, for example UPDATE263.EXE.

4. The dropper creates the main worm component with a random name (for example FEBKI.EXE) in Windows folder and changes EXE, BAT, COM, PIF, REG, SCR files startup key to load that file every time a user runs files with those extensions. Also the dropper creates a startup key for this file in the Registry:

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run]
 "random_name" = "%windir%\<random_name>

5. The worm extracts the list of SMTP servers into SWEN.LST file.

6. The worm collects e-mail addresses and writes them to FLOTSAM.BAK file.

7. The worm disables Registry editing tools.

8. The worm terminates and doesn't allow to run programs that contain the following strings in their names:

NOD32
 DrWeb32
 AVG
 VirusScan (McAfee)
 AVP
 Norton


Detection


Detection for Gibe.d was added in the folowing updates:
Detection Type: PC
Database: 2003-03-24_03



Technical Details: Alexey Podrezov; F-Secure Corp; March 25th, 2003


SUBMIT A SAMPLE

Suspect a file or URL was wrongly detected? Submit a sample to our Labs for analysis

Submit Now

Disinfect your PC

F-Secure Anti-Virus will disinfect your PC and remove all harmful files

Learn More