|VIRUS NAME: W32/Gibe@MM
Internet Worm Characteristics
To date, more than 50% of the W32/Gibe samples received are damaged. The file header is corrupt. Therefore, the files do not run or infect. The 4190 DATs include detection of these corrupted files as W32/Gibe.dam.
This mass-mailing worm masquerades as a Microsoft Security Update patch (named Q216309.EXE) in order to dupe users into executing it.
The worm is intended to be able to mail itself using both Microsoft Outlook and the default SMTP server for the victim machine. However, in testing the worm was buggy, and did not successfully use Outlook to spread.
Once executed, the worm retrieves the default Internet Account details from the Registry, and creates the following keys, writing this data there:
HKEY_LOCAL_MACHINE\Software\AVTech\Settings "Default Address"
(default SMTP email address)
HKEY_LOCAL_MACHINE\Software\AVTech\Settings "Default Server"
(default SMTP server)
= ...by Begbie
The WINNETW.EXE component of the worm queries two Internet-based email address directories. It parses email addresses from the returned data, writing them to 02_N803.DAT (repeatedly).
The following two Registry keys are set in order to run the worm components:
3dfx Acc" = %windir\GFXACC.EXE
"LoadDBackup" = %windir\BCTOOL.EXE
Upon restarting the machine, BCTOOL.EXE runs, mailing the worm to all the email addresses listed in 02_N803.DAT, using the default SMTP server.
The final component of this worm, GFXACC.EXE, is a backdoor Trojan, opening port 12378 on the infected machine. This component is detected as BackDoor-ABJ by the indicated DATs.
1. Presence of the following files:
%windir%\BCTOOL.EXE (32,768 bytes)
%windir%\WINNETW.EXE (20,480 bytes)
%windir%\Q216309.EXE (122,880 bytes)
%windir%\VTNMSCCD.DLL (122,880 bytes)
%windir%\GFXACC.EXE (20,480 bytes)
2. Port 12378 open.
3. Existence of the following Registry key:
Method Of Infection
This virus spreads via email masquerading as a Microsoft security update file Q216309.EXE. Executing this file infects the local machine:
The following files are dropped:
Modifications to the Registry are made in order to execute the virus components (BCTOOL.EXE and GFXACC.EXE) at system startup.