Memas, I-Worm.Memas, W32/Memas@mm, W32.Memas@mm


Memas is a 2-component email worm. It is also capable of infecting executable files. The worm spreads itself as an executable attachment in emails that are sent to all email addresses from an infected computer's Address Book.


Automatic action

Based on the settings of your F-Secure security product, it will either move the file to the quarantine where it cannot spread or cause harm, or remove it.

Find out more

Knowledge Base

Find the latest advice in our Community Knowledge Base.

User Guide

See the user guide for your product on the Help Center.

Contact Support

Chat with or call an expert for help.

Submit a sample

Submit a file or URL for further analysis.

Technical Details

Memas worm usually arrives as an executable email attachment. When the worm's file is run, it drops a Visual Basic script file as C:\FEMAIL.VBS and activates it.

The Visual Basic Script part is the one that does the mass mailing of the worm. It first check for the presence of a Windows registry key:


and if it does not exist, it creates such key. Thus the worm will mass mail once per infected computer.

Next, it uses Outlook Application to get all addresses from the address book and mass mail a copy of the worm in messages that look as follows:

     Subject: "Hi Friend"         Body: "Please See The Attachment"         Attachment:  		  

The <worm's file name> is the name of the worm's file that depends on the name of the infected attachment that was originally run by a user.

To hide this action the Visual Basic Script deletes all sent emails.

The worm is capable of infecting executable files on an infected computer. It scans all available drives and prepends itself to all found executable files. However, the worm does not infect files in folders that have the following names:

 Subject: "Hi Friend"
 Body: "Please See The Attachment"

The worm also doesn't infect files with the following names:

 Subject: "Hi Friend"
 Body: "Please See The Attachment"

All infected files are marked by adding the 'ShohdiEmail' line to their ends. When an infected file is run, the worm takes control, extracts the original file's contents to the same folder, but with .SEL extension and runs the extracted file.

The worm can display a mixed English-Arabic message.

Date Created: -

Date Last Modified: -