Mimail.K worm was found on 26th of November, 2003. It is a minor variant of Mimail.E worm. The description of Mimail.E worm variant can be found here:
Disinfection & Removal
The Mimail.K worm is a minor variant of Mimail.E worm. The differences between these 2 versions are as follows:
1. The worm installs itself to Windows folder as SYSLOAD32.EXE file and creates a startup key in the Registry:
[HKLM\Software\Microsoft\Windows\CurrentVersion\Run] "SystemLoad32" = "%windir\sysload32.exe"
where %windir% is a Windows directory name.
2. The worm performs a DoS (Denial of Service) attack on the following sites:
darkprofits.cc darkprofits.ws www.darkprofits.cc www.darkprofits.ws
Like Mimail.E, this worm variant spreads itself in the messages that look like that:
From: john@<domain of the recipient> Subject: don't be late! <some random characters> Body: Will meet tonight as we agreed, because on Wednesday I don't think I'll make it, so don't be late. And yes, by the way here is the file you asked for. It's all written there. See you. <some random characters> Attachment: readnow.zip
The attachment is a ZIP archive that contains the worm's executable file with READNOW.DOC.SCR name.
F-Secure Anti-Virus already detects this worm generically as 'I-Worm.Mimail.gen'.
Technical Details: Alexey Podrezov, November 26th, 2003