Start the year on the right foot
Renew your protection now with this limited-time offer
*Home users only
Get 50% discount!
Discover the plan that suits you best!
This Christmas will be different
but we want to continue helping you protect your loved ones
*For home users only
You’re about to visit our web page in English Would you like to continue?
If this is not what you’re looking for,
Visit our Welcome Page!
Call us 24/7 and get a free diagnosis 951 203 528
Welcome to the Virus Encyclopedia of Panda Security.
It launches Distributed Denial of Service attacks against the website www.sco.com. It opens a port, allowing a hacker to gain remote access to network resources.
Mydoom.A is a worm that spreads via e-mail in a message with variable characteristics and through the peer-to-peer (P2P) file sharing program KaZaA.
Mydoom.A launches DDoS (Distributed Denial of Service) attacks against the website www.sco.com if the system date is between February 1 and February 12, 2004. It does this by launching GET/ HTTP/ 1.1 requests every 1,024 milliseconds. On February 12, 2004, the worm finishes its payload, ending its execution whenever it is activated.
Mydoom.A drops the DLL (Dynamic Link Library) SHIMGAPI.DLL, which creates a backdoor, opening the first available TCP port in the range from 3127 to 3198. This backdoor component allows to download and run an executable file, and acts as a TCP proxy server, allowing a hacker to gain remote access to network resources.
Note: on February 10, 2004, a new variant of this worm was detected by PandaLabs. This new variant carries out the same actions as the original, but it is compressed
Mydoom.A is easy to recognize once it has affected the computer, as it opens the Windows Notepad and shows junk data.
ARE YOU FACING ANY PC OR INTERNET RELATED PROBLEMS? FREE SUPPORT INCLUDED. CALL US 24/7
powered by Anytech365