Virus Profile: VBS/Bhong

Threat Search
Virus Profile information details
Risk Assessment: Home Low | Corporate Low
Date Discovered: 12/14/1999
Date Added: 1/2/2000
Origin: N/A
Length: N/A
Type: Virus
Subtype: VbScript
DAT Required: 4059
Removal Instructions


This is a virus detection. Viruses are programs that self-replicate recursively, meaning that infected systems spread the virus to other systems, which then propagate the virus further. While many viruses contain a destructive payload, it's quite common for viruses to do nothing more than spread from one system to another.

Indication of Infection

Existence of file BHONG VBS file as mentioned above, deletion file on the 1st of the month as mentioned above. Sending the BHONG VBS file when connecting to mIRC servers.

Methods of Infection

Running the BHONG VBS file will directly install to the local system and further propagate via mIRC if it is installed.



Virus Characteristics

This is a VBScript and mIRC worm. When run, this worm overwrites c:\mirc\script.ini and c:\mirc\mirc.ini, copies a part of itself to the C:\WINDOWS\SYSTEM folder under the name BHONG[number].VBS, and sets it to run via the Run key of the registry. The actual number in the VBS name is randomly generated.

This worm has a dangerous payload which is date activated. When the computer clock's day reports the first of the month, it creates a file called temp.bat to attempt to delete all the files on drive C:. The script.ini file will spread the worm to other people as they join the channel, and joins the channel #bhong as they connect to IRC.

All Users :
Script,Batch,Macro and non memory-resident:
Use current engine and DAT files for detection and removal.

PE,Trojan,Internet Worm and memory resident :
Use specified engine and DAT files for detection. To remove, boot to MS-DOS mode or use a boot diskette and use the command line scanner:


Additional Windows ME/XP removal considerations

Users should not trust file icons, particularly when receiving files from others via P2P clients, IRC, email or other mediums where users can share files.

AVERT Recommended Updates :

* Office2000 Updates

* Malformed Word Document Could Enable Macro to Run Automatically (Information/Patch )

* scriptlet.typelib/Eyedog vulnerability patch

* Outlook as an email attachment security update

* Exchange 5.5 post SP3 Information Store Patch 5.5.2652.42 - this patch corrects detection issues with GroupShield

For a list of attachments blocked by the Outlook patch and a general FAQ, visit this link .
Additionally, Network Administrators can configure this update using an available tool - visit this link for more information .

It is very common for macro viruses to disable options within Office applications for example in Word, the macro protection warning commonly is disabled. After cleaning macro viruses, ensure that your previously set options are again enabled.


PC Infected? Get Expert Help

Virus Removal Service

Connect to one of our Security Experts by phone. Have your PC fixed remotely - while you watch!