Threat Description



Category: Malware
Type: Worm
Platform: W32
Aliases: Gibe.D, I-Worm.Gibe.D, Gibe_D


Gibe.d worm first appeared in the end of March 2003. The worm spreads itself via e-mail, IRC, local network and P2P (peer-to-peer) networks. The worm pretends to be an update from Microsoft when it spreads via e-mail.


Automatic action

Once detected, the F-Secure security product will automatically disinfect the suspect file by either deleting it or renaming it.

More scanning & removal options

More information on scanning or removal options is available in the documentation for your F-Secure security product on the Downloads section of our Home - Global site.

You may also refer to the Knowledge Base on the F-Secure Community site for more information.

Contact Support

For further assistance, F-Secure customers can request support online via the Request support or the Chat forms on our Home - Global site.

Technical Details

The file that spreads via e-mails is a dropper. It is a 167-kilobyte file written in Visual Basic. It is a dropper that contains a few compressed files in its body.

Technically the .D variant is not much different from .B variant of the worm. You can find the description of .B variant here:

There are a few differences comparing to earlier versions:

1. The dropper now uses randomly generated key name to hold its settings:

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion   \Internet Settings\[random_name]]  

2. The dropper has an extended list of names that it uses to drop itself to Kazaa shared folders:

IEPatch  KaZaA upload  Porn  Sex  XboX Emulator  PS2 Emulator  XP update  XXX Video  Sick Joke  Free XXX Pictures  My naked sister  Hallucinogenic Screensaver  Cooking with Cannabis  Magic Mushrooms Growing  Worm_Gibe.C Cleaner  ICQ upgrade  KaZaA spyware patch  BillGates  WinZip  Download Accelerator  Hackers Guide  Psycho  

3. The dropper copies itself as xx.DLL (where 'xx' are random characters) to Windows folder on a local computer. It also copies itself to Windows folder with a randomly generated name, for example UPDATE263.EXE.

4. The dropper creates the main worm component with a random name (for example FEBKI.EXE) in Windows folder and changes EXE, BAT, COM, PIF, REG, SCR files startup key to load that file every time a user runs files with those extensions. Also the dropper creates a startup key for this file in the Registry:

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run]  "random_name" = "%windir%\[random_name] 

5. The worm extracts the list of SMTP servers into SWEN.LST file.

6. The worm collects e-mail addresses and writes them to FLOTSAM.BAK file.

7. The worm disables Registry editing tools.

8. The worm terminates and doesn't allow to run programs that contain the following strings in their names:

NOD32  DrWeb32  AVG  VirusScan (McAfee)  AVP  Norton  


Detection for Gibe.d was added in the folowing updates:

Detection Type: PC
Database: 2003-03-24_03

Technical Details:Alexey Podrezov; F-Secure Corp; March 25th, 2003


Suspect a file or URL was wrongly detected? Submit a sample to our Labs for analysis

Submit Now

Give And Get Advice

Give advice. Get advice. Share the knowledge on our free discussion forum.

Learn More