The Mimail.K worm is a minor variant of Mimail.E worm. The
differences between these 2 versions are as follows:
1. The worm installs itself to Windows folder as SYSLOAD32.EXE
file and creates a startup key in the Registry:
"SystemLoad32" = "%windir\sysload32.exe"
where %windir% is a Windows directory name.
2. The worm performs a DoS (Denial of Service) attack on the
Like Mimail.E, this worm variant spreads itself in the messages
that look like that:
john@<domain of the recipient>
don't be late! <some random characters>
Will meet tonight as we agreed, because on Wednesday I don't think I'll make it,
so don't be late. And yes, by the way here is the file you asked for.
It's all written there. See you.
<some random characters>
The attachment is a ZIP archive that contains the worm's
executable file with READNOW.DOC.SCR name.
F-Secure Anti-Virus already detects this worm generically as
Alexey Podrezov, November 26th, 2003;