VBS/Chick.A is a worm that is not considered to be a threat as the worm sends itself only once per infected system and only to a single recipient.
Based on the settings of your F-Secure security product, it will either automatically delete , quarantine or rename the detected program or file, or ask you for a desired action.
Find the latest advice in our Community Knowledge Base.
About the product
See the manual for your F-Secure product on the Help Center.
Chat with or call an expert for help.
Submit a sample
After the worm's file is started, it copies itself with different names to different folders on a local hard drive. The file names can be semi-randomly generated or they can be any of the following:
Some of the worm's files have hidden, system, and read-only attributes. The worm can create its files with COM, EXE, and PIF extensions. Brontok worm creates multiple launch points for the copied files. Those include startup Registry keys as well as scheduled jobs. For example:
Additionally, the worm creates a few text files on a local hard disk. The file named baca bro . txt that is created in the root of the system drive has the following text:
The c.bron.tok.txt file contains the following text:
The worm keeps several copies of itself in memory.
The worm sends messages with the following subjects:
- Fotoku yg Paling Cantik
- My Best Photo
The message body text can be one of the following:
The attachment name is:
To collect email addresses to spread itself, the worm looks on drives from C: to Z for address in files with the following extensions:
The discovered addresses are checked against a rather large list of strings. If part of a discovered email address matches an entry in that list, that email address is discarded.The worm creates folders named Spread.Mail.Bro and Spread.Sent.Bro in one of its hidden subfolders. The first folder contains the list of email addresses that the worm harvested from the infected computer. Each email address is represented by a file that has the same text as the c.bron.tok.txt file (see above). When the worm sends an email to an address, the corresponding file is moved to the second folder. This is done to avoid sending the worm to the same address multiple times.
In addition to its propagation efforts, the worm has a rather old-fashioned effect. It can show the following texts in the command prompt window:
The effect is shown after the worm terminates applications that have the following text strings in their window titles:
- baca bro .
- command prompt
- computer management
- folder option
- group policy
- PROCESS EXP
- scheduled task
- system configuration
- task manager
- task view
- windows script
The worm disables Task Manager, Registry Editor, and terminates applications that have the following text strings in their window titles:
The worm modifies Windows HOSTS file to block access to the following domains: