Home / malware Win32.Mimail.D,E,F,H@mm
First posted on 21 November 2011.
Source: BitDefenderAliases :
Win32.Mimail.D,E,F,H@mm is also known as W32/Mimail.gen@MM, (Mcafee.
Explanation :
There are only small differences between the two variants, D and F.
Like their predecessors, versions A and C, these versions also spread via e-mail.
The e-mail format is as follows:
From: john@???????? (??????? means any domain, for example yahoo.com etc)
Subject: don't be late! (30 spaces) ???????? (? may be any letter)
Body:
Will meet tonight as we agreed, because on Wednesday I don't think I'll make it,
so don't be late. And yes, by the way here is the file you asked for.
It's all written there. See you.
Attachmet: readnow.zip (containing file readnow.doc.scr)
Once run, the virus does the following:
- On Windows 9x/Me systems, hides its presence using RegisterServiceProcess, and thus it cannot be seen in Task Manager.
- copies itself as
cnfrm.exe (D@mm and E@mm variants)
sysload32.exe (F@mm variant)
cnfrm33.exe (H@mm variant)
in %WINDOWS% folder
- creates zip.tmp (copy of readnow.zip) and exe.tmp (copy of readnow.doc.scr) in %WINDOWS% folder
- creates the registry key
variants D@mm and E@mm:
[HKLMSoftwareMicrosoftWindowsCurrentVersionRun]
with the value "Cnfrm32"="%WINDOWS%cnfrm.exe"
variant F@mm:
[HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersionRun]
with the value "SystemLoad32"="%WINDOWS%sysload32.exe"
variant H@mm:
[[HKLMSoftwareMicrosoftWindowsCurrentVersionRun]
with the value ["Cn323"="%WINDOWS%cnfrm33.exe"
- searches for e-mail addresses in files inside Program Files folder and also in files found using the registry list of folders
[HKLMSoftwareMicrosoftWindowsCurrentVersionExplorerShell Folder]
and filters out files with extension: com, wav, cab, pdf, rar, zip, tif, psd, ocx, vxd, mp3, mpg, avi, dll, exe, gif, jpg, bmp, and stores harvested e-mail addresses in file %WINDOWS%eml.tmp
- uses it's own smtp server to send itself; for each e-mail address harvested, it querries the host's DNS server for the domain name associated with the harvested e-mail address and attempts to send itself through that domain's smtp address or, if it fails, it uses the smtp address 212.5.86.163
- checks if the infected computer is connected to the internet by attempting to access www.google.com
- attempts dos attacks
on (www.)spews.org, (www.)spamhaus.org, (www.)spamcop.net (D@mm variant).
on (www.)fethard.biz, (www.)fethard-finance.com (E@mm variant).
on (www.)mysupersales.com (F@mm variant).
on (www.)spews.org, (www.)spamhaus.org (H@mm variant).Last update 21 November 2011