Email-Worm:W32/Mimail.K

Classification

Category :

Malware

Type :

Email-Worm

Aliases :

Mimail.K, W32/Mimail.K@mm, I-Worm.Mimail.k, I-Worm.Mimail.gen

Summary

Mimail.K worm was found on 26th of November, 2003. It is a minor variant of Mimail.E worm. The description of Mimail.E worm variant can be found here:

https://www.europe.f-secure.com/v-descs/mimail_e.shtml

Removal

Based on the settings of your F-Secure security product, it will either move the file to the quarantine where it cannot spread or cause harm, or remove it.

A False Positive is when a file is incorrectly detected as harmful, usually because its code or behavior resembles known harmful programs. A False Positive will usually be fixed in a subsequent database update without any action needed on your part. If you wish, you may also:

  • Check for the latest database updates

    First check if your F-Secure security program is using the latest updates, then try scanning the file again.

  • Submit a sample

    After checking, if you still believe the file is incorrectly detected, you can submit a sample of it for re-analysis.

    Note: If the file was moved to quarantine, you need to collect the file from quarantine before you can submit it.

  • Exclude a file from further scanning

    If you are certain that the file is safe and want to continue using it, you can exclude it from further scanning by the F-Secure security product.

    Note: You need administrative rights to change the settings.

Technical Details

The Mimail.K worm is a minor variant of Mimail.E worm. The differences between these 2 versions are as follows:

1. The worm installs itself to Windows folder as SYSLOAD32.EXE file and creates a startup key in the Registry:

[HKLM\Software\Microsoft\Windows\CurrentVersion\Run]
"SystemLoad32" = "%windir\sysload32.exe"
 

where %windir% is a Windows directory name.

2. The worm performs a DoS (Denial of Service) attack on the following sites:

darkprofits.cc
darkprofits.ws
www.darkprofits.cc
www.darkprofits.ws
 

Like Mimail.E, this worm variant spreads itself in the messages that look like that:

From: john@[domain of the recipient] Subject:
 don't be late!

 [some random characters]
Body:
 Will meet tonight as we agreed, because on Wednesday I don't think I'll make it,
 so don't be late. And yes, by the way here is the file you asked for.
It's all written there. See you.
 [some random characters]
Attachment: readnow.zip

The attachment is a ZIP archive that contains the worm's executable file with READNOW.DOC.SCR name.

F-Secure Anti-Virus already detects this worm generically as 'I-Worm.Mimail.gen'.