W32.Gase.intd


Aliases: N/A
Variants: N/A

Classification: Malware
Category: Computer Worm

Status: Dormant
Spreading: Slow
Geographical info: Europe, North and South America, and some parts of Asia and Australia
Removal: Easy
Platform: W32
Discovered: 30 Dec 2003
Damage: Low

Characteristics: W32.Gase.intd is mass-mailing worm. It uses emails to send itself to all contacts in the Microsoft Outlook Address Book and collects files from the compromised computer. The worm automatically sends itself to the email addresses it gathers from the files on an infected computer. You may see an attachment containing.exe, .scr, or .zip file extension. The format of the message it automatically sends contains “Mirosoft Alert” on its subject. The email's body contains the message “Hello dear user. We have descovered a new type of the Blaster Worm, Then you know what we are talking about. For you not too get this worm that comes with e-mail, and can come when you update your pc at Windows Update. So Install the installremover program that came with the e-mail. Have a Nice Day.”

More details about W32.Gase.intd

These are found in the windows directory, system, start menu, fonts, and history folders. Another visible symptom of this virus is that, it shows a string known as “The Gagse Worm Rules.” This indicates the name of the worm and is acknowledging its presence. Removing this virus from your system must be taken seriously for any wrong deletion may result into further damaging your computer. As such, you need to browse for Windows system directories because these are the directories this worm usually infiltrates. There may also be several copies of this virus in different locations.

The W32.Gase.intd worm is specifically designed to allow an intruder to remotely manipulate and control the infected system from a remote location. Reports claim that it may exhibit the functionalities of other types of malicious programs. Reports claim that this worm creates a backdoor utility through which the hacker may gain access to the computer. Once the backdoor has been created, the hacker can have unlimited access over the computer’s functions and saved data. It has been said that this worm allows the hacker to perform various actions on the computer such as modify the configurations of the PC and change the system registry so it can be launched whenever the Windows start.