Datom is a network worm. It replicates to shared network resources. The worm consists of 3 different files:
MSVXD.EXE MSVXD16.DLL MSVXD32.DLL
The first component, MSVXD.EXE activates the worm by loading the MSVXD16.DLL library. The MSVXD16.DLL then loads the MSVXD32.DLL component, which spreads the worm.
Once detected, the F-Secure security product will automatically disinfect the suspect file by either deleting it or renaming it.
Detailed instructions for F-Secure security products are available in the documentation found in the Downloads section of our Home - Global site.
You may also refer to the Knowledge Base on the F-Secure Community site for further assistance.
The worm searches for available network resources and tries to connect to their host computers. If the connection has been successfull, the worm then searches for a shared directory that appears to be the Windows directory: it tries the "WinNT" name, and also tries to read the "WinDir" section in the MSDOS.SYS file (if it exists and is available). Then the worm copies all its components to the remote Windows directory, and then sets MSVXD.EXE up to start with Windows automatically: if there is file called "Win.ini" in the remote Windows directory, it writes "MSVXD.EXE" string in the "Run" section of this file, otherwise it creates a link file pointing to MSVXD.exe and called "VxD Manager.lnk" in the common ("All users") Startup directory on the remote computer.
The worm searched for the presence of the ZoneAlarm firewall, and tries to terminate its active instances. It also tries to send "notification" e-mail messages to one of two different addresses that may belong to the author of the worm. These messages contain information about the infected system.
Technical Details:Kaspersky Labs; July 2002