Mimail.K worm was found on 26th of November, 2003. It is a minor variant of Mimail.E worm. The description of Mimail.E worm variant can be found here:
Depending on the settings of your F-Secure security product, it will either automatically delete, quarantine or rename the suspect file, or ask you for a desired action.
More scanning & removal options
More information on the scanning and removal options available in your F-Secure product can be found in the Help Center.
You may also refer to the Knowledge Base on the F-Secure Community site for more information.
The Mimail.K worm is a minor variant of Mimail.E worm. The differences between these 2 versions are as follows:
1. The worm installs itself to Windows folder as SYSLOAD32.EXE file and creates a startup key in the Registry:
[HKLM\Software\Microsoft\Windows\CurrentVersion\Run] "SystemLoad32" = "%windir\sysload32.exe"
where %windir% is a Windows directory name.
2. The worm performs a DoS (Denial of Service) attack on the following sites:
darkprofits.cc darkprofits.ws www.darkprofits.cc www.darkprofits.ws
Like Mimail.E, this worm variant spreads itself in the messages that look like that:
From: john@[domain of the recipient] Subject: don't be late! [some random characters] Body: Will meet tonight as we agreed, because on Wednesday I don't think I'll make it, so don't be late. And yes, by the way here is the file you asked for. It's all written there. See you. [some random characters] Attachment: readnow.zip
The attachment is a ZIP archive that contains the worm's executable file with READNOW.DOC.SCR name.
F-Secure Anti-Virus already detects this worm generically as 'I-Worm.Mimail.gen'.
Technical Details: Alexey Podrezov, November 26th, 2003