Threat Description

Gibe.D

Details

Aliases: Gibe.D, I-Worm.Gibe.D, Gibe_D
Category: Malware
Type: Worm
Platform: W32

Summary


Gibe.d worm first appeared in the end of March 2003. The worm spreads itself via e-mail, IRC, local network and P2P (peer-to-peer) networks. The worm pretends to be an update from Microsoft when it spreads via e-mail.



Removal


Automatic action

Once detected, the F-Secure security product will automatically disinfect the suspect file by either deleting it or renaming it.

More

Detailed instructions for F-Secure security products are available in the documentation found in the Downloads section of our Home - Global site.

You may also refer to the Knowledge Base on the F-Secure Community site for further assistance.



Technical Details


The file that spreads via e-mails is a dropper. It is a 167-kilobyte file written in Visual Basic. It is a dropper that contains a few compressed files in its body.

Technically the .D variant is not much different from .B variant of the worm. You can find the description of .B variant here:

https://www.europe.f-secure.com/v-descs/gibe_b.shtml

There are a few differences comparing to earlier versions:

1. The dropper now uses randomly generated key name to hold its settings:

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion   \Internet Settings\[random_name]]  

2. The dropper has an extended list of names that it uses to drop itself to Kazaa shared folders:

IEPatch  KaZaA upload  Porn  Sex  XboX Emulator  PS2 Emulator  XP update  XXX Video  Sick Joke  Free XXX Pictures  My naked sister  Hallucinogenic Screensaver  Cooking with Cannabis  Magic Mushrooms Growing  Worm_Gibe.C Cleaner  ICQ upgrade  KaZaA spyware patch  BillGates  WinZip  Download Accelerator  Hackers Guide  Psycho  

3. The dropper copies itself as xx.DLL (where 'xx' are random characters) to Windows folder on a local computer. It also copies itself to Windows folder with a randomly generated name, for example UPDATE263.EXE.

4. The dropper creates the main worm component with a random name (for example FEBKI.EXE) in Windows folder and changes EXE, BAT, COM, PIF, REG, SCR files startup key to load that file every time a user runs files with those extensions. Also the dropper creates a startup key for this file in the Registry:

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run]  "random_name" = "%windir%\[random_name] 

5. The worm extracts the list of SMTP servers into SWEN.LST file.

6. The worm collects e-mail addresses and writes them to FLOTSAM.BAK file.

7. The worm disables Registry editing tools.

8. The worm terminates and doesn't allow to run programs that contain the following strings in their names:

NOD32  DrWeb32  AVG  VirusScan (McAfee)  AVP  Norton  


Detection


Detection for Gibe.d was added in the folowing updates:

Detection Type: PC
Database: 2003-03-24_03



Technical Details:Alexey Podrezov; F-Secure Corp; March 25th, 2003


SUBMIT A SAMPLE

Suspect a file or URL was wrongly detected? Submit a sample to our Labs for analysis

Submit Now

Disinfect your PC

F-Secure Anti-Virus will disinfect your PC and remove all harmful files

Learn More