Symantec United States
global sites
products
purchase
service and support
security updates
downloads
about symantec
search
feedback


©1995-2014 Symantec Corporation.
All rights reserved.

Legal Notices
Privacy Policy

security updates

W32.Naked@mm

Category 2
Discovered on: March 06, 2001
Last Updated on: January 22, 2004 05:08:21 PM

W32.Naked@mm is a mass mailing worm that disguises itself as flash movie. The attachment is named NakedWife.exe. This worm, after it has attempted to email everyone in the Microsoft Outlook address book, will attempt to delete several system files. This will leave the system unusable, requiring a re-install.

NOTE: This worm was previously detected as W32.HLLW.JibJab@mm.

Also Known As: W32.HLLW.JibJab@mm, I-Worm.Naked [Kaspersky], W32/Naked@MM [McAfee], WORM_NAKED.A [Trend], W32/Naked [Sophos], Win32.Naked [Computer Associates]
Type: Trojan Horse, Worm
Infection Length: 73,728 bytes
Systems Affected: Windows 2000, Windows 95, Windows 98, Windows Me, Windows NT, Windows XP
Systems Not Affected: DOS, Linux, Macintosh, OS/2, UNIX, Windows 3.x

protection
  • Virus Definitions (LiveUpdate™ Weekly)
  • March 06, 2001

  • Virus Definitions (Intelligent Updater)
  • March 06, 2001

    threat assessment

    Wild

    Threat Metrics

    Low High Medium

    Wild:
    Low

    Damage:
    High

    Distribution:
    Medium

    Damage

    Distribution

    technical details

    When first executed, W32.Naked@mm displays a window that appears to be loading a Flash movie. The window will display the words "JibJab."



    If you click the "Help > About Windows" menu, the following message will be displayed:

    You're are now F***ED. (c) 2001 by BGK (Bill Gates Killer)

    In the background, while the flash movie is "loading", this worm attempts to send itself to everyone in the Microsoft Outlook address book. The message that this worm sends is as follows:

    Subject:

    Naked Wife

    Message:

    My wife never look like that! ;-)
    Best Regards,
    [UserName]

    where [UserName] is the user name that was used when registering Microsoft Outlook.

    After the worm has attempted to mass-mail itself, it will attempt to delete all files from the \Windows and \Windows\System folders that have any of the following extensions:
    • .ini
    • .log
    • .dll
    • .exe
    • .com
    • .bmp

    If this payload is executed, the only way to get the system back to an operational state is to reinstall it.

    SARC has also received several corrupted samples. The corrupted variant of this worm will be detected as W32.Naked.dam. The corrupted variant cannot cause any damage to the system. However, if found, it should be deleted.

    recommendations

    Symantec Security Response encourages all users and administrators to adhere to the following basic security "best practices":

    • Turn off and remove unneeded services. By default, many operating systems install auxiliary services that are not critical, such as an FTP server, telnet, and a Web server. These services are avenues of attack. If they are removed, blended threats have less avenues of attack and you have fewer services to maintain through patch updates.
    • If a blended threat exploits one or more network services, disable, or block access to, those services until a patch is applied.
    • Always keep your patch levels up-to-date, especially on computers that host public services and are accessible through the firewall, such as HTTP, FTP, mail, and DNS services (for example, all Windows-based computers should have the current Service Pack installed.). Additionally, please apply any security updates that are mentioned in this writeup, in trusted Security Bulletins, or on vendor Web sites.
    • Enforce a password policy. Complex passwords make it difficult to crack password files on compromised computers. This helps to prevent or limit damage when a computer is compromised.
    • Configure your email server to block or remove email that contains file attachments that are commonly used to spread viruses, such as .vbs, .bat, .exe, .pif and .scr files.
    • Isolate infected computers quickly to prevent further compromising your organization. Perform a forensic analysis and restore the computers using trusted media.
    • Train employees not to open attachments unless they are expecting them. Also, do not execute software that is downloaded from the Internet unless it has been scanned for viruses. Simply visiting a compromised Web site can cause infection if certain browser vulnerabilities are not patched.

    removal instructions

    To remove this worm:

    1. Run LiveUpdate to make sure that you have the most recent virus definitions.
    2. Start Norton AntiVirus (NAV), and then run a full system scan, making sure that NAV is set to scan all files.
    3. Delete any files detected as W32.Naked@mm or W32.Naked.dam.

    If the worm has been executed, it is very likely that you will have to reinstall Windows.

    Additional information:

    Security Response believes that this worm originated in Brazil.

    Revision History:

    April 4, 2002: Downgraded to Category 2.


    Write-up by: Andre Post and Neal Hindocha