This type of worm is embedded in an e-mail attachment, and spreads using the infected computer's e-mailing networks.
Disinfection & Removal
Special Disinfection Tool
F-Secure has developed a special disinfection tool for this worm. The tool will detect and remove an active Mydoom infection from the computer. The Mydoom removal tool can be downloaded in a ZIP file from:
The unpacked version is available from:
Manual disinfection of Mydoom consists of the following steps: 1. Delete the registry value and restart the computer:
2. Delete the worm from the Windows System Directory:
and its backdoor component from:
3. To enable access again to the sites blocked by Mydoom.B, it is necessary to locate the file "hosts" and delete all the lines referring to Anti-Virus vendors and other commercial sites. The lines added by the worm are listed later in this page.
Email-Worm:W32/Mydoom.B is an e-mail worm that is capable of launching attacks against two websites, www.sco.comand www.microsoft.com. The worm also prevents infected machines from accessing anti-virus sites, including www.f-secure.com.
Mydoom.B is a variant of the Mydoom worm. It uses the same scrambling technique as the previous variant, ROT13, and shares most of its features.
The worm contains this message, which is never displayed:
- (sync-1.01; andy; I'm just doing my job, nothing personal, sorry)
The following picture briefly shows the structure of the Mydoom.B worm, which can be appreciated in full detail in the PDF graph available here.
Mydoom.B, was found spreading on January 28th, 2005. The worm has a limited lifespan: it is coded to exit immediately when run after 1st of March 2004 at 03:18:42 (UTC)
It will copy itself to the following location:
And will add the following registry entries:
- [HKLM\Software\Microsoft\Windows\CurrentVersion\Run] "Explorer" = %sysdir%\explorer.exe
or, if it fails:
- [HKCU\Software\Microsoft\Windows\CurrentVersion\Run] "Explorer" = %sysdir%\explorer.exe
It drops its backdoor component, encoded in its body and packed with UPX as:
This is loaded under Explorer from this registry key:
The worm will create a mutex with the name "sync-v1.01__ipcmtx0" to ensure only one instance of itself is running at the same time.
Once run it will look for the previous variant, Mydoom.A, and will terminate its process and delete "shimgapi.dll".
The worm has the ability of sending itself to already infected computers. It will do so by first finding them through a network scan, where IP addresses will be randomly forged (skipping some invalid ranges). Then a connection attempt is made to port 3127 (opened by previous variant's backdoor), if the machine is found infected then the worm transfers itself and will be executed immediately, thereby updating the infected computers to the new version without the need for the user to receive the worm through e-mail. Additionally, the worm will request the infected computer's hostname through gethostbyname(), resolve its IP and scan for other infected computers in the same range. The worm will perform a Distributed Denial of Service (DDoS) attack against www.microsoft.com on 3rd of February 2004 at 13:09:18 (UTC) and www.sco.com on 1st of February 2004 at 16:09:18 (UTC). The DDoS attack launches 8 threads against www.sco.com every 1024 milliseconds. The other DDoS attack launches 14 threads against www.microsoft.com every 1024 milliseconds. The hosts file in the infected machines will be modified so that domains belonging to Anti-Virus companies and other commercial sites are resolved to the IP address 0.0.0.0, rendering them inaccessible. The file is encrypted within the worms code and contain the following:
- 0.0.0.0 engine.awaps.net awaps.net www.awaps.net ad.doubleclick.net
- 0.0.0.0 spd.atdmt.com atdmt.com click.atdmt.com clicks.atdmt.com
- 0.0.0.0 media.fastclick.net fastclick.net www.fastclick.net ad.fastclick.net
- 0.0.0.0 ads.fastclick.net banner.fastclick.net banners.fastclick.net
- 0.0.0.0 www.sophos.com sophos.com ftp.sophos.com f-secure.com www.f-secure.com
- 0.0.0.0 ftp.f-secure.com securityresponse.symantec.com
- 0.0.0.0 www.symantec.com symantec.com service1.symantec.com
- 0.0.0.0 liveupdate.symantec.com update.symantec.com updates.symantec.com
- 0.0.0.0 support.microsoft.com downloads.microsoft.com
- 0.0.0.0 download.microsoft.com windowsupdate.microsoft.com
- 0.0.0.0 office.microsoft.com msdn.microsoft.com go.microsoft.com
- 0.0.0.0 nai.com www.nai.com vil.nai.com secure.nai.com www.networkassociates.com
- 0.0.0.0 networkassociates.com avp.ru www.avp.ru www.kaspersky.ru
- 0.0.0.0 www.viruslist.ru viruslist.ru avp.ch www.avp.ch www.avp.com
- 0.0.0.0 avp.com us.mcafee.com mcafee.com www.mcafee.com dispatch.mcafee.com
- 0.0.0.0 download.mcafee.com mast.mcafee.com www.trendmicro.com
- 0.0.0.0 www3.ca.com ca.com www.ca.com www.my-etrust.com
- 0.0.0.0 my-etrust.com ar.atwola.com phx.corporate-ir.net
An additional line is added before the the date when attack against Microsoft begins:
- 0.0.0.0 www.microsoft.com
Which will make the site inaccessible. The 3rd of February the entry will be removed so the attack can be performed, which will probably cause some difficulties reaching it, if the DDoS is successful. The modifications in the hosts file are probably targeted so that customers of the most widespread Anti-Virus products can't download new updates to disinfect the worm.
The following filenames are used in this variant when copying itself to Kazaa
And extensions chosen from:
The e-mail messages sent by the worm have the following characteristics: Subjects can be any of the following:
- Delivery Error
- Mail Delivery System
- Server Report
- Returned mail
The body text can be one of the following:
- The message cannot be represented in 7-bit ASCII encoding and has been sent as a binary attachment.
- sendmail daemon reported: Error #804 occured during SMTP session. Partial message has been received.
- The message contains Unicode characters and has been sent as a binary attachment.
- The message contains MIME-encoded graphics and has been sent as a binary attachment.
- Mail transaction failed. Partial message is available.
Attachments are composed combining the following names:
with the following extensions:
As with older Mydoom variants, Mydoom.B collects addresses from Windows' Address Book and from files with extension:
It will try to avoid anti-spam tricks used by people to obfuscate e-mails addresses in webpages.
Once an address is chosen from the list of harvested addresses, the worm will send an e-mail to addresses in the same domain but to accounts like:
It will avoid sending itself to e-mail addresses containing the following account names: