W32.Sonic.Worm


Aliases: I-Worm.Sonic.a, W32/Sonic@MM, Win32.HLLW.Sonic, W32/Sonic, Win32/Sonic.A@mm,
Variants: WORM_SONIC.A, Worm/Sonic.A.1, Win32:Sonic-G, I-Worm/Sonic, Win32.Sonic.A@mm,

Classification: Malware
Category: Computer Worm

Status: Active & Spreading
Spreading: Fast
Geographical info: Europe
Removal: Hard
Platform: W32
Discovered: 09 Oct 2000
Damage: Medium

Characteristics: The W32.Sonic.Worm program is a type of email worm. It sends itself to contacts in the W23 address book. Once opened, the worm tries to get additional files, as well as commercial .dll that give emailing routines and a modernized version of the worm.

More details about W32.Sonic.Worm

The W32.Sonic.Worm program is an email worm that shows to have been created in France. The worm sends itself to addresses in the W23 address book. Once opened, the worm tries to download additional files, including commercial .dll files that give emailing routines and a modernized version of the worm. W32.Sonic.Worm is a UPX PE executable file that comes as an email message attachment w/ the subject: “Choose your poison”. When the worm is opened, a message shows indicating that the file isn’t a valid Win32 .exe file. The message could be in English or French language. The worm reaches “RegisterServiceProcess”, enabling it to run after you log out; it only closes when Windows is turned off. The worm duplicates itself to the folder of “\Windows\System” as “Gdi32.exe”.

Worms like the W32.Sonic.Worm spreads its application even without the client’s prerogative. They are likely in comparison with viruses in which they can self-regenerate. However, worms can spread itself without attachment and infection towards different programs and files. This type of malware travels within your system via security holes on numerous vulnerable computers that are connected to a LAN or the World Wide Web. Worms consume a vast amount of your system resources resulting to a sluggish and noticeably unreliable machine. With the W32.Sonic.Worm installed on to your system, it is equal to identity theft, spousal spying, file corruption, loss of vital data and intolerable slow computer performance.