Home > Threat descriptions >



Category: Malware

Type: -

Aliases: W32/Buchon@mm, Baba, W32/NetSky.AG@mm, W32/NetSky.AH@mm


W32/Buchon@mm worm was found on October 21st, 2004. This variant is probably a hack made in South Korea.It was originally identified as Netsky, but all major Antivirus vendors realized it has not much to do with that family besides some similarities in the emails it sends. Therefore the new name is Buchon.


Automatic action

Based on the settings of your F-Secure security product, it will either automatically delete, quarantine or rename the detected program or file, or ask you for a desired action.

Knowledge Base

Find the latest advice in our Community Knowledge Base.

About the product

See the manual for your F-Secure product on the Help Center.

Contact Support

Chat with or call an expert for help.

Submit a sample

Submit a file or URL for further analysis.

Technical Details

The worm is packed with an unmodified version of UPX, once unpacked it grows to around 60 KiB. This worm contains two hidden strings: "SoonChunHyang" and "Bucheon". There's a University called SoonChunHyang in the city of Bucheon, South Korea.This virus is buggy and fails to replicate properly.Email messages W32/Buchon@mm tries to send can vary a lot. In some cases it sends somewhat personalized messages looking like this:

From: randomaddress@somewhere.com
 To: bob@acme.com
 Subject: Mail Delivery failure - bob@acme.comIf the message will not displayed automatically,
 . you cancheck original in attached message.txt
 www.acme.com/inbox/security/read.asp?sessionid-5339Attachment: "message.txtmcafee.com"

W32/Buchon@mm searches local drives for email addresses. Files with following extensions are scanned for email addresses:


The worm also drops a keylogger.