VIRUS ALERT
January 26, 2004
HIGHPanda Virus Alert - Mydoom.A - Release #1
PANDA SOFTWARE ANNOUNCES RED ALERT FOR COMPUTER VIRUS: W32/Mydoom.A.worm
New Worm MyDoom.A CAUSES Numerous Infections in Corporate Environments in
Few Hours
Glendale, CA, January, 26, 2004 - New worm Mydoom.A.worm has already
reached red alert status according to the virus labs of Panda Software.
There have already been many incidences with thousands of users in numerous
countries. The ability of MyDoom.A to spread rapidly, as well as the damage
it is leaving behind, makes Mydoom.A.worm as serious as last summers
Bugbear and Blaster.
• Repair and detection is also available via
www.pandasoftware.com/activescan
• Thousands of users are affected by fast spreading worm using the
social engineering techniques.
• New worm does not take advantage of any Microsoft vulnerability’s to
infect the computers
• New worm installs a file that opens the TCP port 3127 allowing the
computer external control
• It also uses KaZaa to spread, copying itself in the user shared
folder.
• Panda Software has made available to all Panda users detection and
disinfection for this worm
Mydoom.A forwards itself to all the addresses found in the affected
computers. As other countries begin the the usual workday increasing
computer activity it is expected that this virus will grow and create more
issues.
Mydoom.A comes via an e-mail message with an attached file. Like the other
recent virus epidemics, social engineering techniques cheat the user making
the think they are supposed to open the file. The virus not only infects
the computer that received the e-mail but then mails itself to all the
contacts found in addresses book.
In addition, it opens the TCP port 3127 in the infected computer, allowing
remote control of the computer. It means any malicious hacker may get
access and steal, modify or destroy any kind of Information stored in the
computer.
As additional Information, this virus is ready to launch a Denial of
Service attack against the web site www.sco.com next February, 1st this
year.
Mydoom.A.worm search e-mail addresses in the computer files with the
extensions: .htm, .sht, .php, .asp, .dbx, .tbb, .adb, .pl, .wab, .txt. It
uses its own SMTP engine to send itself by e-mail.
The message content changes, and may be composed by the following
sentences:
Subject:
test
hi
hello
Mail Delivery System
Mail Transaction Failed
Server Report
Status
Error
Body:
Mail Transaction Failed. Partial message is available.
The message contains Unicode characters and has been sent as a binary
attachment.
The message cannot be represented in 7-bit ASCII encoding and has been
sent as a binary attachment
Attached file name:
document
readme
doc
text
file
data
test
message
body
File extension:
.pif
.scr
.exe
.cmd
.bat
.zip
Once the virus has infected the computer, it then searches for the peer-to-
peer file sharing Network KaZaa. If KaZaa is detected a file is copied to
the shared folder allowing its distribution via this peer to peer system.
The filename may be one of the following ones:
winamp5
icq2004-final
activation_crack
strip-girl-2.0bdcom_patches
rootkitXP
office_crack
nuke2004
and PIF, .SCR o .BAT extension.
Panda Software offers updates to all its customers to detect and eliminate
Mydoom.A.worm. Users who have not enabled automatic updates can upgrade the
antivirus in http://www.pandasoftware.com/.
Due to the possibility of being infected by Mydoom.A.worm, Panda Software
advises users to treat all e-mails received with caution, and to update
their antivirus solutions as soon as possible and installing a good
firewall.
Similarly, users can also detect and disinfect this and other malicious
code using the free, online antivirus, Panda ActiveScan, which is available
on the company’s website at http://www.pandasoftware.com.
Detailed technical information on Mydoom.A.worm is available from Panda
Software’s Virus Encyclopedia.
About PandaLabs:
On receiving a possibly infected file, Panda Software's technical staff
gets straight down to work. The file is analyzed and depending on the type,
the action taken may include: disassembly, macro scanning, code analysis
etc. If the file does in fact contain a new virus, the disinfection and
detection routines are prepared and quickly distributed to users.
For more information:
Alan Wallace
Original source: panda-us-virusalert-2004-01-27-mydoom_a#1.doc

