We're gradually updating threat actor names in our reports to align with the new weather-themed taxonomy. Learn about Microsoft threat actor names
Worm:MSH/Cibyz.A
Detected by Microsoft Defender Antivirus
Aliases: P2P-Worm.MSH.Skowor.a (Kaspersky) MSH/Cibyz!p2p (McAfee) MSH.Czybroks!int (Symantec) WORM_KIBYZ.A (Trend Micro)
Summary
Worm:MSH/Cibyz.A is a proof-of-concept P2P worm written in Windows PowerShell script. The worm cannot run automatically. A user must purposely engage in several actions in order to deliberately cause the worm to run. The specific steps required to cause Worm:MSH/Cibyz.A to run are outlined here:
http://blogs.msdn.com/powershell/archive/2006/08/03/687838.aspx
http://blogs.msdn.com/powershell/archive/2006/08/03/687838.aspx
When Worm:MSH/Cibyz.A does run, it overwrites files with the following file extensions: .bat, .cmd, .log, .ini, .txt, .js, and .html extensions. Worm:MSH/Cibyz.A changes the original extension to .msh after overwriting the file. Worm:MSH/Cibyz.A also prepends its code to files which have either a .msh or .ps1 file extension. The worm also spreads by copying itself to folders used by the Kazaa file sharing application.
Manual removal is not recommended for this threat. To detect and remove this threat and other malicious software that may have been installed, run a full-system scan with an up-to-date antivirus product such as Microsoft Security Essentials, or the Microsoft Safety Scanner. For more information about using antivirus software, see http://www.microsoft.com/security/antivirus/av.aspx.