Home > Threat descriptions >

Mimail.K

Classification

Category: Malware

Type: Email-Worm

Aliases: Mimail.K, W32/Mimail.K@mm, I-Worm.Mimail.k, I-Worm.Mimail.gen

Summary


Mimail.K worm was found on 26th of November, 2003. It is a minor variant of Mimail.E worm. The description of Mimail.E worm variant can be found here:

https://www.europe.f-secure.com/v-descs/mimail_e.shtml

Removal


Automatic action

Based on the settings of your F-Secure security product, it will either automatically delete, quarantine or rename the detected program or file, or ask you for a desired action.

Knowledge Base

Find the latest advice in our Community Knowledge Base.

About the product

See the manual for your F-Secure product on the Help Center.

Contact Support

Chat with or call an expert for help.

Submit a sample

Submit a file or URL for further analysis.

Technical Details


The Mimail.K worm is a minor variant of Mimail.E worm. The differences between these 2 versions are as follows:

1. The worm installs itself to Windows folder as SYSLOAD32.EXE file and creates a startup key in the Registry:

[HKLM\Software\Microsoft\Windows\CurrentVersion\Run]
"SystemLoad32" = "%windir\sysload32.exe"
 

where %windir% is a Windows directory name.

2. The worm performs a DoS (Denial of Service) attack on the following sites:

darkprofits.cc
darkprofits.ws
www.darkprofits.cc
www.darkprofits.ws
 

Like Mimail.E, this worm variant spreads itself in the messages that look like that:

From: john@[domain of the recipient] Subject:
 don't be late!

 [some random characters]
Body:
 Will meet tonight as we agreed, because on Wednesday I don't think I'll make it,
 so don't be late. And yes, by the way here is the file you asked for.
It's all written there. See you.
 [some random characters]
Attachment: readnow.zip

The attachment is a ZIP archive that contains the worm's executable file with READNOW.DOC.SCR name.

F-Secure Anti-Virus already detects this worm generically as 'I-Worm.Mimail.gen'.