Need help? Ask the community or hire an expert.
Go to Avira Answers
Alias:W32.Mydoom.AM@mm
Type:Worm 
Size:32.768 bytes 
Origin: 
Date:01-25-2005 
Damage:Spreading potential: medium 
VDF Version:6.29.00.77 
Danger:Low 
Distribution:Low 

General DescriptionAffected platforms:
* Windows 95
* Windows 98
* Windows ME
* Windows NT
* Windows 2000
* Windows XP
* Windows Server 2003

DistributionWorm/MyDoom.A spreads itself using two different spreading methods. First, the email sending using its own SMTP engine and second, the spreading over P2P (Peer-To-Peer) networks. For this, the worm copies itself in the shared folders from Kazaa, Morpheus, eDonkey, iMesh or LimeWire with the following names:

porno
NeroBROM6.3.1.27
avpprokey
Ad-awareref01R349
winxp_patch
adultpasswds
dcom_patches
K-LiteCodecPack2.34a
activation_crack
icq2004-final
winamp5

The file extensions are randomly chosen from: .BAT, .COM, .EXE or .SCR.

At the sending of the emails Worm/MyDoom makes up the emails of particular parts of sentence, so that the subject, the email body and also the attachment always can have a different appearance.

-Sender(FROM): The email sender is made up of the following names and domain names:

Angela
Anthony
Barbara
Betty
Charles
Christopher
Cissi
Cynthia
Daniel
David
Donald
Dorothy
Edward
Elizabeth
Emily
Ethan
Hans
Harris
Helen
James
Jennifer
John
Josefine
Karen
Kevin
Lee
Len
Linda
Mark
Martin
Melissa
Michael
Nancy
Nicholas
Olivia
Patricia
Paul
Richard
Robert
Sandra
Susan
Thomas
William

One of the following domain names will be added at the sender's name:

compuserve.com
juno.com
earthlink.net
yahoo.co.uk
hotmail.com
yahoo.com
msn.com
aol.com


-SUBJECT: One of the following subjects will be chosen for the virulent email:

Attention!!!
Do not reply to this email
Error
Good day
hello
Mail Delivery System
Mail Transaction Failed
Server Report
Status

-The email text (BODY): One of the following text lines will also be chosen for the email:

-The message contains Unicode characters and has been sent as a binary attachment.

-The message cannot be represented in 7-bit ASCII encoding and has been sent as a binary attachment.

-Mail transaction failed. Partial message is available.

-Thank you for registering at WORLDXXXPASS.COM
All your payment info, login and password you can find in the attachment file.
It's a real good choise to go to WORLDXXXPASS.COM

-Attention! New self-spreading virus!
Be careful, a new self-spreading virus called "RTSW.Smash" spreading very fast via e-mail and P2P networks. It's about two million people infected and it will be more.
To avoid your infection by this virus and to stop it we provide you with full information how to protect yourself against it and also including free remover. Your can find it in the attachment.
c 2004 Networks Associates Technology, Inc. All Rights Reserved

-New terms and conditions for credit card holders
Here a new terms and conditions for credit card holders using a credit cards for making purchase in the Internet in the attachment. Please, read it carefully. If you are not agree with new terms and conditions do not use your credit card in the World Wide Web.
Thank you,
The World Bank Group
c 2004 The World Bank Group, All Rights Reserved

-Attention! Your IP was logged by The Internet Fraud Complaint Center
Your IP was logged by The Internet Fraud Complaint Center. There was a fraud attempt logged by The Internet Fraud Complaint Center from your IP. This is a serious crime, so all records was sent to the FBI. All information you can find in the attachment. Your IP was flagged and if there will be anover attemption you will be busted.
This message is brought to you by the Federal Bureau of Investigation and the National White Collar Crime Center.


-ATTACHMENT: The filenames of the attachment are composed of: names + extensions:

body
message
docs
data
file
rules
doc
readme
document

followed by one of the following file extensions:

.bat
.cmd
.exe
.pif
.scr
.zip

Technical DetailsIf the MyDoom.AM is executed, it creates the following files:

-%SystemDIR%\lsasrv.exe

-\%SystemDIR%\hserv.sys

-\%WindowsTemp%\Mes#wtelw

The worm creates the following entries in the Windows Registry:
-[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft \Windows\CurrentVersion\Run]
"lsass"="\%SystemDIR%\lsasrv.exe"

-[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft \Windows NT\CurrentVersion\Winlogon]
"Shell"="explorer.exe \%SystemDIR%\lsasrv.exe"

The Worm/MyDoom.AM searches on the infected system for files with the following extensions, containing email addresses,where it can later send itself using its own SMTP engine:
-.wab
-.pl
-.adb
-.tbb
-.dbx
-.asp
-.php
-.sht
-.htm
-.txt

Should one of the following processees active be, these would be terminated from Mydoom.AM:

-i11r54n4.exe
-d3dupdate.exe
-rate.exe
-ssate.exe
-winsys.exe
-winupd.exe
-SysMonXP.exe
-bbeagle.exe
-Penis32.exe
-teekids.exe
-MSBLAST.exe
-mscvb32.exe
-sysinfo.exe
-PandaAVEngine.exe
-taskmon.exe
-wincfg32.exe
-outpost.exe
-zonealarm.exe
-navapw32.exe
-navw32.exe
-zapro.exe
-msblast.exe
-netstat.exe

Worm/MyDoom.AM installs the trojan 'TR/MadTol.A' on the infected system. In order to do this, it downloads the following files and stores them in the Windows system directory:

-%SystemDIR%\sczmyfwq.exerqqueh.exe

-%SystemDIR%\sczmyfwq.exe

Would one of these files be executed, the trojan installs itself on the system. For this, the following files are created by the trojan:

-%SystemDIR%\<%variabler Dateiname%>.exe

-%SystemDIR%\iexplore.dll

-%SystemDIR%\explorer.dll

The trojan 'TR/MadTol.A' has already been detected by AVIRA since 12/2003 .
Description inserted by Crony Walker on Tuesday, June 15, 2004

Back . . . .