Bibliothèque
Ma bibliothèque

+ Ajouter à la bibliothèque

Contacter-nous !
Support 24/24 | Rules regarding submitting

Nous téléphoner

0 825 300 230

Forum

Vos requêtes

  • Toutes : -
  • Non clôturées : -
  • Dernière : le -

Nous téléphoner

0 825 300 230

Profil

Win32.HLLM.MyDoom.44544

Added to the Dr.Web virus database: 2004-04-18

Virus description added:

Description

Win32.HLLM.MyDoom.44544 is a mass-mailing worm which affects computers running under Windows 95/98/Me/NT/2000/XP operating systems/ Its executable module is packed with UPX. The packed size of the worm is 44, 544 bytes.

Launching

To secure its automatic execution at every Windows startup the worm modifies the registry key:
HKEY_CURRENT_USER\Software\Microsft\Windows\CurrentVersion\Run
"SVHOST" = "%SysDir%\SVHOST.EXE"

Spreading

the worm mass disseminates via e-mail using its own SMTP engine. It retrieves addresses from files with the following extensions:

     adb
     asp
     dbx
     htm
     php
     sht
     tbb
     wab       
The mail message infected with the worm may look as follows:
    The sender’s name contains a proper name written with small letter and may be, for example, alex, john or sam
    Subject:
        
         test 
         hi 
         hello 
         Mail Delivery System 
         Mail Transaction Failed 
         Server Report 
         Status 
         Error
                
    Message body:
         test
         Mail transaction failed. Partial message is available. 
         The message contains Unicode characters and has been sent as a binary attachment. 
         The message cannot be represented in 7-bit ASCII encoding and has 
    been sent as a binary attachment.
    The attachment may have two extensions, the first of which is .doc, .htm or .txt, and the second is .cmd, .exe, .pif , .scr or .zip.
    Its name is chosen from the following list:
         body 
         data 
         doc 
         document 
         file 
         message 
         readme 
         test 
         text
         
                     

Action

Being executed, the worm runs application NotePad and opens a file called Message, created in the Temp folder. The file contains a random garbage.
The worm copies itself to the WindowSystem folder (in Windows 9x/ME it’s C:\Windows\System, in Windows NT/2000 it’s C:\WINNT\System32, in Windows XP it’s C:\Windows\System32) as SVHOST.EXE.

The worm deletes the value TaskMon from the key:
HKLM\Software\Microsoft\Windows\CurrentVersion\Run\