Skip Over Navigation Links
Center for Information TechnologyAntivirus
Antivirus Home Page
Contact Us
Questions or Comments
Disclaimers

Software
Current client downloads:
 VScan Engine/Dat (SuperDat) -4.3.20/4.0.4399
 VirusScan Enterprise 8.0i - Windows NT/2000/XP/2003
 VirusScan Enterprise 7.1 - Windows NT/2000/XP/2003
 Version 4.5.1 (install Service Pack 1) - Windows 9x/ME
 Virex (OS X) Engine/Def - 7.2(v1.1)/041013
 Virex (OS 9.x) Engine/Def - 6.2/041001
 Linux & Solaris Engine/Dat - 4.3.20/4.0.4399
 Symantec Antivirus - 9.0
 Ad-aware - 6.0
 Clean Boot 1.0
 Stinger v2.4.0 virus removal tool (Updated 9/28/04, 3:22am)
 Microsoft Patch Library
Current server downloads:
 VirusScan Enterprise 7.1
 NetShield NetWare - 4.6.2
 NetShield NetWare Engine Update - 4.3.20
 ePO agent for NetWare
 Sybari Antigen - 528/966
 TrendMicro - 6.810/200
 ScanMail eManager - 3.0
 Microsoft Patch Library

Information
 Configuration Tips
 VirusScan FAQs
 Ad-aware FAQs
 Central EMail Status
 VirusScan Instructions
 Additional Resources
 ePO 3.0/VirusScan 7.0 Presentation

Archives
 List of Viruses

Virus Archives

W32/SoBig.C Last Updated 06/02/03 12:00pm

The w32/SoBig.C email virus is spreading in the wild. w32/SoBig.C is a mass mailing worm that also spreads through open network shares. The worm spoofs the address of the sender with a random address and uses its own SMTP engine to send mail from the infected client.

The subject of the email may be one of the following:

  • Approved
  • Re: 45443-343556
  • Re: Application
  • Re: Approved
  • Re: Movie
  • Re: Screensaver
  • Re: Submited (004756-3463)
  • Re: Your application

The attachment name is created at random and is known to have a .PIF or .PI extension.

The body of the message is: Please see the attached file.

When the attachment is run, the following files are dropped in the default Windows (typically C:\Windows, C:\WINNT) directory:

  • "mscvb32.exe" (approx 50kB) (a copy of itself)
  • "msddr.dat" (configuration file)

W32/SoBig.C creates the following registry keys to load itself at system startup:

  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run "System MScvb" = %WinDir%\mscvb32.exe
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run "System MScvb" = %WinDir%\mscvb32.exe

On Windows NT4/2000/XP systems w32/SoBig.C creates a service named mscvb32.exe.

The current 4268 Dat/SuperDat released by NAI will detect and remove w32/SoBig.C.

The definitions released 6-1-2003 and later by Symantec detect and remove w32/SoBig.C. The definitions are available through the LiveUpdate feature of Norton Antivirus.

For more information see:

http://vil.nai.com/vil/content/v_100343.htm from NAI regarding w32/SoBig.C.

http://securityresponse.symantec.com/avcenter/venc/data/w32.sobig.c@mm.html from Symantec regarding w32/SoBig.C.

This archive is not intended to be comprehensive. For a more complete virus library, please visit NAI's Virus Information Library at http://vil.nai.com.

Contact TASC for assistance or call
301.59.Go.CIT (V) 301.496.8294 (TDD)

National Institutes of HealthCenter for Information Technology
National Institutes of Health
Bethesda, Maryland 20892

Questions or Comments | Disclaimers

Department of Health and Human ServicesHealth and Human Services
Washington, D.C. 20201
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -