Category: Malware

Type: Worm

Aliases: Gibe.D, I-Worm.Gibe.D, Gibe_D


Gibe.d worm first appeared in the end of March 2003. The worm spreads itself via email, IRC, local network and P2P (peer-to-peer) networks. The worm pretends to be an update from Microsoft when it spreads via email.


Automatic action

Based on the settings of your F-Secure security product, it will either automatically delete, quarantine or rename the detected program or file, or ask you for a desired action.

Knowledge Base

Find the latest advice in our Community Knowledge Base.

About the product

See the manual for your F-Secure product on the Help Center.

Contact Support

Chat with or call an expert for help.

Submit a sample

Submit a file or URL for further analysis.

Technical Details

The file that spreads via emails is a dropper. It is a 167-kilobyte file written in Visual Basic. It is a dropper that contains a few compressed files in its body.

Technically the .D variant is not much different from .B variant of the worm. You can find the description of .B variant here:

There are a few differences comparing to earlier versions:

1. The dropper now uses randomly generated key name to hold its settings:

 \Internet Settings\[random_name]]

2. The dropper has an extended list of names that it uses to drop itself to Kazaa shared folders:

KaZaA upload
XboX Emulator
PS2 Emulator
XP update
XXX Video
Sick Joke
Free XXX Pictures
My naked sister
Hallucinogenic Screensaver
Cooking with Cannabis
Magic Mushrooms Growing
Worm_Gibe.C Cleaner
ICQ upgrade
KaZaA spyware patch
Download Accelerator
Hackers Guide

3. The dropper copies itself as xx.DLL (where 'xx' are random characters) to Windows folder on a local computer. It also copies itself to Windows folder with a randomly generated name, for example UPDATE263.EXE.

4. The dropper creates the main worm component with a random name (for example FEBKI.EXE) in Windows folder and changes EXE, BAT, COM, PIF, REG, SCR files startup key to load that file every time a user runs files with those extensions. Also the dropper creates a startup key for this file in the Registry:

"random_name" = "%windir%\[random_name] 

5. The worm extracts the list of SMTP servers into SWEN.LST file.

6. The worm collects email addresses and writes them to FLOTSAM.BAK file.

7. The worm disables Registry editing tools.

8. The worm terminates and doesn't allow to run programs that contain the following strings in their names:

VirusScan (McAfee)