Threat Description

Email-Worm: ​W32/Mimail.D

Details

Category: Malware
Type: Email-Worm
Platform: W32
Aliases: Email-Worm:​W32/Mimail.D

Summary


This type of worm is embedded in an e-mail attachment, and spreads using the infected computer's e-mailing networks.



Removal


Automatic action

Once detected, the F-Secure security product will automatically disinfect the suspect file by either deleting it or renaming it.

More scanning & removal options

More information on scanning or removal options is available in the documentation for your F-Secure security product on the Downloads section of our Home - Global site.

You may also refer to the Knowledge Base on the F-Secure Community site for more information.

Contact Support

For further assistance, F-Secure customers can request support online via the Request support or the Chat forms on our Home - Global site.



Technical Details


Email-Worm:W32/Mimail.D is a worm that propagates in infected e-mail attachments.

The worm file is a PE executable 24608 bytes long. It is not compressed.

The worm can also exploit a vulnerability to drop and execute a file. Apart from this, Mimail.D does not have a payload.

Mimail.D was found on 1 November, 2003.

Installation

The worm's file installs itself as VIDEODRV.EXE file into Windows directory and creates a startup key for its file in the Registry:

  • [HKLM\Software\Microsoft\Windows\CurrentVersion\Run] "VideoDriver" = "%windir%\videodrv.exe"

where %windir% is a Windows directory name.

Propagation

The worm spreads itself in the following message:

Subject: your account Body:   Hello there,  I would like to inform you about important information regarding your   email address. This email address will be expiring.  Please read attachment for details.  Best regards, Administrator     Attachment: message.zip   

The attachment contains message.html which, when opened in vulnerable versions of Internet Explorer (IE), will drop an executable named epo.exe and run it.

For more information on the IE MHTML vulnerability used here please see http://www.microsoft.com/technet/security/bulletin/MS03-014.asp






SUBMIT A SAMPLE

Suspect a file or URL was wrongly detected? Submit a sample to our Labs for analysis

Submit Now

Give And Get Advice

Give advice. Get advice. Share the knowledge on our free discussion forum.

Learn More