Find a Partner
This window is encrypted for your security.
Need help? Ask the community or hire an expert.
Go to Avira Answers
Spreading potential: medium
* Windows 95
* Windows 98
* Windows ME
* Windows NT
* Windows 2000
* Windows XP
* Windows Server 2003
Worm/MyDoom.A spreads itself using two different spreading methods. First, the email sending using its own SMTP engine and second, the spreading over P2P (Peer-To-Peer) networks. For this, the worm copies itself in the shared folders from Kazaa, Morpheus, eDonkey, iMesh or LimeWire with the following names:
The file extensions are randomly chosen from: .BAT, .COM, .EXE or .SCR.
At the sending of the emails Worm/MyDoom makes up the emails of particular parts of sentence, so that the subject, the email body and also the attachment always can have a different appearance.
-Sender(FROM): The email sender is made up of the following names and domain names:
One of the following domain names will be added at the sender's name:
-SUBJECT: One of the following subjects will be chosen for the virulent email:
Do not reply to this email
Mail Delivery System
Mail Transaction Failed
-The email text (BODY): One of the following text lines will also be chosen for the email:
-The message contains Unicode characters and has been sent as a binary attachment.
-The message cannot be represented in 7-bit ASCII encoding and has been sent as a binary attachment.
-Mail transaction failed. Partial message is available.
-Thank you for registering at WORLDXXXPASS.COM
All your payment info, login and password you can find in the attachment file.
It's a real good choise to go to WORLDXXXPASS.COM
-Attention! New self-spreading virus!
Be careful, a new self-spreading virus called "RTSW.Smash" spreading very fast via e-mail and P2P networks. It's about two million people infected and it will be more.
To avoid your infection by this virus and to stop it we provide you with full information how to protect yourself against it and also including free remover. Your can find it in the attachment.
c 2004 Networks Associates Technology, Inc. All Rights Reserved
-New terms and conditions for credit card holders
Here a new terms and conditions for credit card holders using a credit cards for making purchase in the Internet in the attachment. Please, read it carefully. If you are not agree with new terms and conditions do not use your credit card in the World Wide Web.
The World Bank Group
c 2004 The World Bank Group, All Rights Reserved
-Attention! Your IP was logged by The Internet Fraud Complaint Center
Your IP was logged by The Internet Fraud Complaint Center. There was a fraud attempt logged by The Internet Fraud Complaint Center from your IP. This is a serious crime, so all records was sent to the FBI. All information you can find in the attachment. Your IP was flagged and if there will be anover attemption you will be busted.
This message is brought to you by the Federal Bureau of Investigation and the National White Collar Crime Center.
-ATTACHMENT: The filenames of the attachment are composed of: names + extensions:
followed by one of the following file extensions:
If the MyDoom.AM is executed, it creates the following files:
The worm creates the following entries in the Windows Registry:
-[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft \Windows NT\CurrentVersion\Winlogon]
The Worm/MyDoom.AM searches on the infected system for files with the following extensions, containing email addresses,where it can later send itself using its own SMTP engine:
Should one of the following processees active be, these would be terminated from Mydoom.AM:
Worm/MyDoom.AM installs the trojan 'TR/MadTol.A' on the infected system. In order to do this, it downloads the following files and stores them in the Windows system directory:
Would one of these files be executed, the trojan installs itself on the system. For this, the following files are created by the trojan:
The trojan 'TR/MadTol.A' has already been detected by AVIRA since 12/2003 .
Description inserted by Crony Walker on Tuesday, June 15, 2004