A new variant of MyDoom worm - Mydoom.G was found on March 3rd, 2004. Mydoom. A description is available at: Novarg.
Once detected, the F-Secure security product will automatically disinfect the suspect file by either deleting it or renaming it.
More scanning & removal options
More information on scanning and removal options available in your F-Secure product can be found in the Help Center.
You may also refer to the Knowledge Base on the F-Secure Community site for further assistance.
Eliminating a Local Network Outbreak
If the infection is in a local network, please follow the instructions on this webpage:
Mydoom.G is functionally similar to the original variant but it contains this hidden message: to netsky's creator(s): imho, skynet is a decentralized peer-to-peer neural network. we have seen P2P in Slapper in Sinit only. They may be called skynets, but not your shitty application.
Apparently, the author of Mydoom wanted to send a message to the authors of the Netsky worm:
The executable is packed with unmodified UPX, and a minority of the strings are scrambled as in the first variants of the worm, using the old fashioned ROT13.
The emails sent by Mydoom.G will contain one of the following subjects:
- For your eyes only
- micro$oft must die. support us!
- some stuff
- Your profile
- just some stuff
- See you soon
- Address verification
- Your account is about to be expired
- Your account is expired
- Expired account
- Bank information
- Registration rejected
- excuse me
- my photos
- i can tell you the future
- your chance
- please read
- we're unable to process your request
- i need you
- we're experiencing technical problems
- Automatic notification
- dear friend!
- price list
- how are you?
- hello! :)
- hi! :)
- Email verification
- see you
- You have been successfully registered
- Please, confirm the registration
- Your details
- Your account details
- your website
- your text
- your music
- your letter
- your archive
- thank you
- your document
- my details
- here is the document
- Your request
- do you still love me
- do you love me
- hello my friend
- account details
- your account
- from me
- Daily Report
It might additionally contain any of the following:
- Returned mail:
to the subject.
Message bodies are chosen from:
- Here it is
- Please, read and let me know what do you feel
- Full message is in the attached document
- Open the document
- Here is the document
- Please, reply
- See you
- Look at the attached file
- Look at the document
- Read this
- See the attached document
- See the attached message
- See attachment
- See attachemnt
- Read the document
- Details are in the attached document
- Hi! Check the attachment for details
- Your file is attached
- Your document is attached
- See the attached file for details
- Please read the attached file
- Please have a look at the attached file
- Here is the file
The attachment filename will be composed from combining the any of the following filenames:
and the following extensions:
The worm will go through all the machines' drives and folder on them and performing the following actions on the found files.
Mydoom will harvest email addresses from files with the extensions:
If a file with extension PIF is found, it will overwrite 8 out of 10 times.
If the 'target' file has an extension among:
With a probability of 95% it will copy itself to a filename with the same name as the 'target' file, plus an the extension 'EXE' 8 out of 10 times and 'SCR' otherwise.
Mydoom.G will attempt to launch a DDoS attack against Symantec. When performing the attack, it will try to connect to either symantec.com or www.symantec.com. It will launch from 8 up to 77 of threads, requesting Symantec's main page.