At the time of writing, F-Secure has received no report about this worm from the field.
Once detected, the F-Secure security product will automatically disinfect the suspect file by either deleting it or renaming it.
More scanning & removal options
More information on scanning or removal options is available in the documentation for your F-Secure security product on the Downloads section of our Home - Global site.
You may also refer to the Knowledge Base on the F-Secure Community site for more information.
Variant:Gigger.A (Gigger.A@mm, JS_GIGGER.A,JS/Gigger.a@MM, JS.Gigger.A, JS/Gigger-A)
When executed, the worm first creates two files into the root of the C: drive: "b.htm" and "bla.hta".
Next Gigger checks an infection marker from the registry, and if it is not present, it is created. The registry key is:
The worm goes all mapped network drives from "C" to "M". If possible, it creates a copy of itself into file
for each drive. It also copies itself to
"Windows\Help\mmsn_offline.htm" and "Windows\Samples\WSH\chart.js".
Spreading via Outlook Express
The worm executes its slow mass-mailing routine. It changes Outlook Express settings so that every message sent from an infected machine is in HTML format and contains a copy of the worm, by embedding the file "mmsn_offline.htm" into the message. On that way the worm will activate when next recipient open or view such infected message.
Spreading via Outlook
The fast mass mailing part of the worm collects email addresses from both Outlook contacts folder and from the Windows Address Book. The worm sends itself to each address collected with the following characteristics:
Subject: Outlook Express Update Body: MSNSoftware Co. Attachment: mmsn_offline.htm
The worm also sends a message to firstname.lastname@example.org, which propably belongs to the virus writer. The message contains a list of all email addresses where the worm was sent.
If the worm fails in the above section to access Outlook, or it fails to create files that it needs, it adds a line to the "c:\autoexec.bat" that attempts to format the C: drive. However, this payload is able to activate only in Windows 9x, and it may not work in localized versions.
//29.10.2001, 10/29/01 This worm is donation from all Bulgarians!CopyR2001McB
Gigger also drops "Windows\Help\Charts.vbs", which contains another fast mass-mailer, and runs it. It also adds it to the registry, so it will be executed in the each system startup by using the following registry key:
The worm again collects email addresses from Outlook Contacts folder, and sends the following message to each recipient:
Subject: (email address of the recipient) Body: Microsoft Outlook 98 Attachment: mmsn_offline.htm
The attachment name is set to "Reports", which is the reason why some email clients may show the attachment as "Reports" instead of "mmsn_offline.htm".
The worm also goes through all hard and mapped network drives, appending the worm code to each file that has extension ".htm", ".html" or ".asp".
Further, if the directory contains any files with either ".ini" or ".hlp" extensions, a file "script.ini" is created as well. Therefore, if the user has IRC client mIRC installed into system, the worm will replace the default "script.ini" with its own. After that the worm sends itself to each user that joins the same IRC channel where the infected user is.
If the day of the month is 1st, 5th, 10th, 15th or 20th, the worm replaces all files from all drives with a zero byte files, destroying their original content.
F-Secure Anti Virus detects Gigger worm by heuristics and generic detection.
Description Details: Katrin Tocheva and Sami Rautiainen, F-Secure Corp.; January 11th, 2002