A new variant of MyDoom worm - Mydoom.F was found on February 20th, 2004 It is functionally similar to the original variant but it does not attack www.sco.com. Mydoom.F tries to perform a Distributed Denial-of-Service attack on www.microsoft.com and also www.riaa.com. Mydoom.A description is available at Novarg; the Mydoom.B description is available at Mydoom.B.
Based on the settings of your F-Secure security product, it will either move the file to the quarantine where it cannot spread or cause harm, or remove it.
A False Positive is when a file is incorrectly detected as harmful, usually because its code or behavior resembles known harmful programs. A False Positive will usually be fixed in a subsequent database update without any action needed on your part. If you wish, you may also:
Check for the latest database updates
First check if your F-Secure security program is using the latest updates, then try scanning the file again.
Submit a sample
After checking, if you still believe the file is incorrectly detected, you can submit a sample of it for re-analysis.
Note: If the file was moved to quarantine, you need to collect the file from quarantine before you can submit it.
Exclude a file from further scanning
If you are certain that the file is safe and want to continue using it, you can exclude it from further scanning by the F-Secure security product.
Note: You need administrative rights to change the settings.
When copying itself, the worm will overwrite part of its executable with random data. Starting from 28000 bytes from its beginning it will write a 1 kB chunk of random data, making the file seem variable.
Some of the strings are scrambled using the same method as in the original Mydoom, ROT13.
It will add an entry in the registry in:
or, if failed in
containing: = %sysdir%\.exe
The worm will compose emails with the following characteristics.
Subjects from the list:
(Some of these are also used by the Sober.C worm)
Message body is selected from:
Attachment names will be chosen from:
And one of the following extensions will be appended:
In addition to the Distributed Denial-of-Service attack the worm tries to delete several file types from the victim's hard drive such as pictures, movies and MS Office documents.
The worm's code in charge of that is the same that harvests email addresses. It will check every drive from 'C' to 'Z', and for each of the folders on those, it will go through each file, performing the following actions:
The worm will delete the files with a given probability, so only a given percentage of the occasions certain types of files will be deleted. The following table gives those percentages:
Once the scan of the machine and its drives is finished, it will sleep for 32 seconds and start again.
This variant, as the previous ones, also drops a backdoor listening in port 1080.
F-Secure Total is a security suite that protects all your phones and computers in real time, 24/7 and with award-winning accuracy. Read more about Total and try it free for 30 days, no credit card required.