Classification

Category :

Malware

Type :

Worm

Aliases :

Gibe.D, I-Worm.Gibe.D, Gibe_D

Summary

Gibe.d worm first appeared in the end of March 2003. The worm spreads itself via email, IRC, local network and P2P (peer-to-peer) networks. The worm pretends to be an update from Microsoft when it spreads via email.

Removal

Based on the settings of your F-Secure security product, it will either move the file to the quarantine where it cannot spread or cause harm, or remove it.

A False Positive is when a file is incorrectly detected as harmful, usually because its code or behavior resembles known harmful programs. A False Positive will usually be fixed in a subsequent database update without any action needed on your part. If you wish, you may also:

  • Check for the latest database updates

    First check if your F-Secure security program is using the latest updates, then try scanning the file again.

  • Submit a sample

    After checking, if you still believe the file is incorrectly detected, you can submit a sample of it for re-analysis.

    Note: If the file was moved to quarantine, you need to collect the file from quarantine before you can submit it.

  • Exclude a file from further scanning

    If you are certain that the file is safe and want to continue using it, you can exclude it from further scanning by the F-Secure security product.

    Note: You need administrative rights to change the settings.

Technical Details

The file that spreads via emails is a dropper. It is a 167-kilobyte file written in Visual Basic. It is a dropper that contains a few compressed files in its body.

Technically the .D variant is not much different from .B variant of the worm. You can find the description of .B variant here:

https://www.europe.f-secure.com/v-descs/gibe_b.shtml

There are a few differences comparing to earlier versions:

1. The dropper now uses randomly generated key name to hold its settings:

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion
 \Internet Settings\[random_name]]

2. The dropper has an extended list of names that it uses to drop itself to Kazaa shared folders:

IEPatch
KaZaA upload
Porn
Sex
XboX Emulator
PS2 Emulator
XP update
XXX Video
Sick Joke
Free XXX Pictures
My naked sister
Hallucinogenic Screensaver
Cooking with Cannabis
Magic Mushrooms Growing
Worm_Gibe.C Cleaner
ICQ upgrade
KaZaA spyware patch
BillGates
WinZip
Download Accelerator
Hackers Guide
Psycho

3. The dropper copies itself as xx.DLL (where 'xx' are random characters) to Windows folder on a local computer. It also copies itself to Windows folder with a randomly generated name, for example UPDATE263.EXE.

4. The dropper creates the main worm component with a random name (for example FEBKI.EXE) in Windows folder and changes EXE, BAT, COM, PIF, REG, SCR files startup key to load that file every time a user runs files with those extensions. Also the dropper creates a startup key for this file in the Registry:

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run]
"random_name" = "%windir%\[random_name] 

5. The worm extracts the list of SMTP servers into SWEN.LST file.

6. The worm collects email addresses and writes them to FLOTSAM.BAK file.

7. The worm disables Registry editing tools.

8. The worm terminates and doesn't allow to run programs that contain the following strings in their names:

NOD32
DrWeb32
AVG
VirusScan (McAfee)
AVP
Norton