New mass email virus - W32/Mydoom@MM

BlackStorm

New member
W32/Mydoom@MM - High Outbreak

The below quote is from Mcaffe's website

This is a mass-mailing and peer-to-peer file-sharing worm that arrives in an email message as follows:

From: (spoofed email sender)
Subject: (Varies, such as)

Error
Status
Server Report
Mail Transaction Failed
Mail Delivery System
hello
hi
Body: (Varies, such as)

The message cannot be represented in 7-bit ASCII encoding and has been sent as a binary attachment.
The message contains Unicode characters and has been sent as a binary attachment.
Mail transaction failed. Partial message is available.
Attachment: (varies [.bat, .exe, .pif, .cmd, .scr] - often arrives in a ZIP archive) (22,528 bytes)

examples (common names, but can be random)
doc.bat
document.zip
message.zip
readme.zip
text.pif
hello.cmd
body.scr
test.htm.pif
data.txt.exe
file.scr
The icon used by the file tries to make it appear as if the attachment is a text file:




When this file is run, it copies itself to the WINDOWS SYSTEM directory as taskmon.exe

%SysDir%\taskmon.exe
(Where %Sysdir% is the Windows System directory, for example C:\WINDOWS\SYSTEM)


It creates the following registry entry to hook Windows startup:

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\
CurrentVersion\Run "TaskMon" = %SysDir%\taskmon.exe
The virus uses a DLL that it creates in the Windows System directory:

%SysDir%\shimgapi.dll (4,096 bytes)
This DLL is injected into the EXPLORER.EXE upon reboot via this registry key:

HKEY_CLASSES_ROOT\CLSID\{E6FB5E20-DE35-11CF-9C87-00AA005127ED}\InProcServer32 "(Default)" = %SysDir%\shimgapi.dll
Peer To Peer Propagation
The worm copies itself to the KaZaa Shared Directory with the following filenames:

nuke2004
office_crack
rootkitXP
strip-girl-2.0bdcom_patches
activation_crack
icq2004-final
winamp
Remote Access Component
The worm (this functionality is in the dropped DLL) opens a connection on TCP port 3127. If that fails it opens next available port up to port 3198. Such behaviour suggests remote access capabilities.

Denial of Service Payload
On the first system startup on February 1st or later, the worm changes its behavior from mass mailing to initiating a denial of service attack against the sco.com domain. This denial of service attack will stop on the first system startup of February 12th or later, and thereafter the worm's only behavior is to continue listening on TCP port 3127.



Indications of Infection

Upon executing the virus, Notepad is opened, filled with nonsense characters.


Existence of the files and registry entry listed above


Method of Infection

This worm tries to spread via email and by copying itself to the shared directory for Kazaa clients if they are present.

The mailing component harvests address from the local system. Files with the following extensions are targeted:

wab
adb
tbb
dbx
asp
php
sht
htm
txt
Additionally, the worm contains strings, which it uses to randomly generate, or guess, addresses. These are prepended as user names to harvested domain names:

sandra
linda
julie
jimmy
jerry
helen
debby
claudia
brenda
anna
alice
brent
adam
ted
fred
jack
bill
stan
smith
steve
matt
dave
dan
joe
jane
bob
robert
peter
tom
ray
mary
serg
brian
jim
maria
leo
jose
andrew
sam
george
david
kevin
mike
james
michael
john
alex
Finally the virus sends itself via SMTP. The worm guesses the recipient email server, prepending the target domain name with the following strings:

mx.
mail.
smtp.
mx1.
mxs.
mail1.
relay.
ns.

I just got one about 30 mins ago but luckily McAfee stopped it getting through so it didnt effect me at all :)
Keep an eye out anyway!
 
I've heard about this and apparently it's spreading quite badly

But as always, it's so simple not to get it: Dont open attachments you arent expecting! How hard can it be to check first or not run EXE files from emails?
 
And because you dont open it. When will people learn?

I mean MSBLAST that went around for ages could have been stoppped if people updated their computer but people dont bother, and dont know what they are doing
 
I got it too!
I also got "Mail delivery failed" emails saying that I tried to send infected emails, I thought I got infected but thanx God I'm not! :)
 
More undeliverable items opened than you would beleive - 'Oh why did I get that back' good plan.
 
I'll tell you what. I work for a computer service company, and we have had close to 100 calls in the past 2 days with questions revolving around this new virus.

Great money for the business :)
 
It makes you wonder if antivirus companies make viruses so they can make more money... I'm sure that's not true though ;) Just makes you wonder :)
 
hehe you never know GC, maybe they are creating them so people buy their programs ;)
This does seem to be spreading VERY quickly.
I think i have had about 5 so far but didnt get any yesterday and havent had any so far today either
 
Haha yeah, its better than Administrator ;)
My head is the right size now ;)
Im sure it will settle down soon when people update their virus scanners and more and more people becme aware of it and how to stop it
 
Good point, the one good thing about this is people learn to update their stuff and then viruses lshould get less and less as more and more people are made aware. I mean a lot of people that open viruses are beginners and ddont know what they are doing. After having a virus, you can bet they'll be updating their scanner daily ;)

Plus with Microsoft trying to help by including a basic virus scanner and things in future versions of windows, viruses should get less and less.

One last thing that people should do, a great Windows feature that isnt very well known is that you can run a program in a kind of safe mode so that it cant damage anything

Right click a program, select Run As... and select Protect my computer from unauthorized activity. A very good tip to always use when trying a program someone sent you that might be dodgy
 
This will work if all ppl got a virus scanner I know alot who don't and they tell you there PCs are 100% clean!
 
I know what that's like. A friend I knew insisted he had no viruses or anything, didnt need a firewall or a scanner. He sent me something he'd made and it was infected, he said he didnt infect it deliberately (unlikely) so I told him to get an AV. 73 different viruses, trojans etc. When he removed them all, he said his system was so much faster, and afte that he's stayed secure. Sometimes it takes a virus attack before people realise
 
Back
Top