A new variant of MyDoom worm - Mydoom.S, was found on August 16th, 2004. The worm spreads like its previous variants.
Once detected, the F-Secure security product will automatically disinfect the suspect file by either deleting it or renaming it.
More scanning & removal options
More information on scanning or removal options is available in the documentation for your F-Secure security product on the Downloads section of our Home - Global site.
You may also refer to the Knowledge Base on the F-Secure Community site for further assistance.
Eliminating a Local Network Outbreak
If the infection is in a local network, please follow the instructions on this webpage:
The worm's file is a PE executable 27136 bytes long packed with UPX file compressor. The unpacked worm's size is about 53 KiB.
The worm will attempt to download an executable from four different URLs stored within its body, such URLs point to two different sites (www.richcolour.com and zenandjuice.com). These sites were shut down by 18th of August, 2004.
Mydoom copies itself as "winpsd.exe" file to Windows System directory and creates a startup key for the copied file in Windows Registry:
- [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run] "winpsd.exe" = "%WinSysDir%\winlibs.exe"
where %WinSysDir% represents Windows System folder. As a result, the worm's file is started every time Windows starts.
The worm creates a mutex named '43jfds93872'.
Spreading in e-mails
The email-spreading function will expire on August 20th, 2004. After this the worm should not send emails any more.
The worm spreads in e-mails. Before spreading it collects e-mail addresses from an infected computer. The worm reads Windows Address Book file, reads files in Temporary Internet Files folders and Windows System folder. Files with the following extensions are checked:
The worm doesn't send itself to e-mail addresses that contain any of the following substrings:
The worm spreads in emails as follows:
- Subject: photos
- Body: LOL!;))))
- Attachment: photos_arc.exe
The worm fakes the sender's e-mail address. It uses the following user names for the fake e-mail address:
The worm alters the infected computer's hosts file in order to prevent the local user and applications from reaching the Anti-Virus vendors' websites, including f-secure.com and www.f-secure.com.