This window is encrypted for your security.
Need help? Ask the community or hire an expert.
Go to Avira Answers
In the wild:
Medium to high
Methods of propagation:
• Local network
• Mcafee: W32/Mytob.gen@MM
• Kaspersky: Net-Worm.Win32.Mytob.c
• Sophos: W32/Mytob-C
• Grisoft: I-Worm/Mytob.C
• VirusBuster: I-Worm.Mytob.V
• Eset: Win32/Mytob.D
• Bitdefender: Win32.Worm.Mytob.C
Platforms / OS:
• Windows 95
• Windows 98
• Windows 98 SE
• Windows NT
• Windows ME
• Windows 2000
• Windows XP
• Windows 2003
• Uses its own Email engine
• Registry modification
• Makes use of software vulnerability
• Third party control
It copies itself to the following location:
The following registry keys are added in order to run the processes after reboot:
The following registry keys are added:
It contains an integrated SMTP engine in order to send emails. A direct connection with the destination server will be established. The characteristics are described in the following:
The sender address is spoofed.
Generated addresses. Please do not assume that it was the sender's intention to send this email to you. He might not know about his infection or might not even be infected at all. Furthermore it is possible that you will receive bounced emails telling you that you are infected. This might also not be the case.
– Email addresses found in specific files on the system.
– Email addresses gathered from WAB (Windows Address Book)
One of the following:
• Server Report
• Mail Transaction Failed
• Mail Delivery System
In some cases the subject might also be empty.
Furthermore the subject line could contain random letters.
– In some cases it may be empty.
The body of the email is one of the lines:
• Mail transaction failed. Partial message is available.
• The message contains Unicode characters and has been sent as a binary attachment.
• The message cannot be represented in 7-bit ASCII encoding and has been sent as a binary attachment.
The filenames of the attachments is constructed out of the following:
– It starts with one of the following:
The file extension is one of the following:
The attachment is a copy of the malware itself.
The attachment is an archive containing a copy of the malware itself.
The email looks like the following:
It searches the following files for email addresses:
Address generation for TO and FROM fields:
To generate addresses it uses the following strings:
%random character string%
; sandra; linda; julie; jimmy; jerry;
helen; debby; claudia; brenda; anna; alice; brent; adam; ted; fred;
jack; bill; stan; smith; steve; matt; dave; dan; joe; jane; bob;
robert; peter; tom; ray; mary; serg; brian; jim; maria; leo; jose;
andrew; sam; george; david; kevin; mike; james; michael; alex; john
It combines this with domains from the following list or from addresses found in files on the system
The domain is one of the following:
It does not send emails to addresses containing one of the following strings:
• .edu; .gov; .mil; abuse; accoun; acketst; admin; anyone; arin.; avp;
be_loyal:; berkeley; borlan; bsd; bugs; certific; contact; example;
feste; fido; foo.; fsf.; gnu; gold-certs; google; gov.; help; hotmail;
iana; ibm.com; icrosof; icrosoft; ietf; info; inpris; isc.o; isi.e;
kernel; linux; listserv; math; mit.e; mozilla; msn.; mydomai; nobody;
nodomai; noone; not; nothing; ntivi; page; panda; pgp; postmaster;
privacy; rating; rfc-ed; ripe.; root; ruslis; samples; secur;
sendmail; service; site; soft; somebody; someone; sopho; submit;
support; syma; tanford.e; the.bat; unix; usenet; utgers.ed; webmaster;
www; you; your
Prepend MX strings:
In order to get the IP address of the mail server it has the ability to prepend the following strings to the domain name:
In order to ensure its propagation the malware attemps to connect to other machines as described below.
It makes use of the following Exploit:
Creates an FTP script on the compromised machine in order to download the malware to the remote location.
To deliver system information and to provide remote control it connects to the following IRC Server:
%random character string%
– This malware has the ability to collect and send information such as:
• Malware uptime
• Information about the network
– Furthermore it has the ability to perform actions such as:
• Download file
• Execute file
• Send emails
• Start spreading routine
• Updates itself
The following port is opened:
\wfdmgr.exe on a random TCP port in order to provide an FTP server.
It creates the following Mutex:
The malware program was written in MS Visual C++.
In order to aggravate detection and reduce size of the file it is packed with a runtime packer.
Description inserted by Irina Boldea on Tuesday, February 28, 2006
Description updated by Irina Boldea on Thursday, March 16, 2006
Get in touch
Questions? We are happy to help you.
1 800 403 7019
Start a chat
Send an email
Find a solution in our Avira Answers community
Send an email
Case Record Type