When the worm's file is started, it copies itself to Windows System folder as BGLR32.EXE and modifies SHELL= variable in SYSTEM.INI file or System Registry (depending on Windows version) to be always run with Windows.
Then the worm starts to scan all files on a C: drive. If it finds files with the following extensions:
.TXT .MHT .HTM .HTML .EML .JSE .ASP
the worm will look for e-mail addresses inside those files.
The worm gets information about user's SMTP server address from the Registry. If this information is unavailable, the worm tries to use the following SMTP server:
E-mail messages sent by the worm look like that:
For World of Peace!
Saddam Hussien has been captured but Osama Bin Laden still have a power and US will never captured this person until somebody captured Bush. God Bless You!!
The worm uses IFrame exploit that allows the infected attachment
to start automatically on older and unpatched versions of certain
Detection was published on December 18th, 2003 in the following FSAV updates:
Technical Details: Alexey Podrezov, December 19th, 2003;