Virus Encyclopedia
Welcome to the Virus Encyclopedia of Panda Security.
Mydoom.A | |
Threat Level Damage Distribution |
At a glance
|
Common name: | Mydoom.A |
Technical name: | W32/Mydoom.A.worm |
Threat level: | Medium |
Alias: | I-Worm/Novarg, WORM_MIMAIL.R W32/Mydoom@MM I-Worm/Novarg@MM |
Type: | Worm |
Effects: | It launches Distributed Denial of Service attacks against the website www.sco.com. It opens a port, allowing a hacker to gain remote access to network resources. |
Affected platforms:
|
Windows 2003/XP/2000/NT/ME/98/95 |
First detected on: | Jan. 27, 2004 |
Detection updated on: | June 25, 2007 |
Statistics | No |
Proactive protection: | Yes, using TruPrevent Technologies
|
Repair utility: | Panda QuickRemover |
Brief Description | |
Mydoom.A is a worm that spreads via e-mail in a message with variable characteristics and through the peer-to-peer (P2P) file sharing program KaZaA. Mydoom.A launches DDoS (Distributed Denial of Service) attacks against the website www.sco.com if the system date is between February 1 and February 12, 2004. It does this by launching GET/ HTTP/ 1.1 requests every 1,024 milliseconds. On February 12, 2004, the worm finishes its payload, ending its execution whenever it is activated. Mydoom.A drops the DLL (Dynamic Link Library) SHIMGAPI.DLL, which creates a backdoor, opening the first available TCP port in the range from 3127 to 3198. This backdoor component allows to download and run an executable file, and acts as a TCP proxy server, allowing a hacker to gain remote access to network resources. Note: on February 10, 2004, a new variant of this worm was detected by PandaLabs. This new variant carries out the same actions as the original, but it is compressed |
Visible Symptoms | |
Mydoom.A is easy to recognize once it has affected the computer, as it opens the Windows Notepad and shows junk data. |
Tech details
Effects |
Mydoom.A carries out the following actions: It launches DDoS (Distributed Denial of Service) attacks against the website www.sco.com if the system date is between February 1 and February 12, 2004. It does this by launching GET/ HTTP/ 1.1 requests every 1,024 milliseconds. On February 12, 2004, the worm finishes its payload, ending its execution whenever it is activated. It allows a hacker to gain remote access to network resources, as it drops the DLL (Dynamic Link Library) SHIMGAPI.DLL, which creates a backdoor, opening the first available TCP port in the range from 3127 to 3198. This backdoor component allows to download and run an executable file, and acts as a TCP proxy server. It opens the Windows Notepad and shows junk data.
Note: on February 10, 2004, a new variant of this worm was detected by PandaLabs. This new variant carries out the same actions as the original, but it is compressed with Petite rather than with UPX. |
Infection strategy
Mydoom.A creates the following files in the Windows system directory:
TASKMON.EXE. This file is a copy of the worm.
SHIMGAPI.DLL. This file creates a backdoor, opening the first available TCP port in the range from 3127 to 3198.
MESSAGE in the Windows temporary directory. This file contains the text shown in Notepad the first time the worm activates.
Mydoom.A creates the following entries in the Windows Registry:
HKEY_LOCAL_MACHINE\ Software\ Microsoft\ Windows\ CurrentVersion\ Run
TaskMon = %sysdir%\taskmon.exe
where %sysdir% is the Windows system directory. By default, in Windows Me/98/95 computers, this directory is C:\ WINDOWS\ SYSTEM, whereas in Windows 2003/XP/2000/NT computers, it is C:\ WINNT\ SYSTEM32.
By creating this entry, Mydoom.A ensures that it is run whenever Windows is started.
If it is unable to create this entry, it creates the following one:
HKEY_CURRENT_USER\ Software\ Microsoft\ Windows\ CurrentVersion\ Run
TaskMon = %sysdir%\ taskmon.exe
HKEY_CLASSES_ROOT\ CLSID\ {E6FB5E20-DE35-11CF-9C87-00AA005127ED}\ InProcServer
(default) = %sysdir%\ SHIMGAPI.DLL
By creating this entry, Mydoom.A launches the file SHIMGAPI.DLL with Windows Explorer.
HKEY_CURRENT_USER\ Software\ Microsoft\ Windows\ CurrentVersion\ Explorer\ ComDlg32
HKEY_CURRENT_USER\ Software\ Microsoft\ Windows\ CurrentVersion\ Explorer\ ComDlg32\ Version
HKEY_LOCAL_MACHINE\ Software\ Microsoft\ Windows\ CurrentVersion\ Explorer\ ComDlg32
HKEY_LOCAL_MACHINE\ Software\ Microsoft\ Windows\ CurrentVersion\ Explorer\ ComDlg32\ Version
Mydoom.A creates these entries in order to check if it has already affected the computer.
Means of transmission
Mydoom.A spreads via e-mail and through the peer-to-peer (P2P) file sharing program KaZaA.
1.- Transmission via e-mail.
Mydoom.A follows the routine below:
2.- Transmission through KaZaA.
Mydoom.A follows the routine below:
It creates copies of itself in the shared directory of KaZaA. These copies have a variable name, which consists of a random file name and a random extension:
Possible file names: WINAMP5, ICQ2004-FINAL, ACTIVATION_CRACK, STRIP-GIRL-2.0BDCOM_PATCHES, ROOTKITXP, OFFICE_CRACK, NUKE2004.
Possible extensions: PIF, SCR, BAT, EXE.
Other users of KaZaA can access the shared directory and download these files to their computers, thinking that they are useful computer programs. However, these users will actually download a copy of the worm.
When the downloaded file is run, these computers will be affected by Mydoom.A.
Further Details
Mydoom.A is written in the Assembler language. The worm is 22,528 bytes in size when it is compressed with UPX, and 32,768 bytes once it is decompressed.
Mydoom.A creates a mutex called SwebSipcSmtxSO in order to ensure that only a copy of the worm is run simultaneously.
Some of the text strings used by the worm are encrypted using a shift functionality that consists in shifting the characters 13 positions to the right.
Note: on February 10, 2004, a new variant of this worm was detected by PandaLabs. This variant carries out the same actions as the original, but it is compressed with Petite rather than with UPX. It is 24,048 bytes in size when it is compressed, and 42,280 bytes once it is decompressed.