SonicALERT
Search

Sonicwall Signatures

 

Go to All Categories list.


  Mydoom.F
Mydoom.F is a Worm. Worms are reproducing malicious programs that run independently and travel across network connections without human action. They could spread over email, IM, peer-to-peer networks, or directly over the wire by leveraging vulnerabilities. The threat that a worm poses is its capability to replicate itself on the system so the computer can send out hundreds or thousands of copies of itself.

File Related Changes
It drops the following file(s) on the system:
  • "c:\Program Files\Microsoft Silverlight\4.0.60531.0\da\rvzidvfg.exe"
  • "c:\Program Files\Common Files\microsoft shared\OCR\mkzjjmrlyup.exe"
  • "c:\py\lib\zhuxsu.exe"
  • "c:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\web\bobjvtdq.exe"
  • "c:\ProgramData\Microsoft\Search\Data\Applications\Windows\Projects\SystemIndex\Indexer\CiFiles\umlcjdpirnog.exe"
  • "c:\Program Files\Common Files\microsoft shared\VC\rngalrn.exe"
  • "c:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\hqdnlnnjprniy.exe"
  • "c:\Program Files\Common Files\microsoft shared\Triedit\chbcwilo.exe"
  • "c:\Program Files\Common Files\microsoft shared\ink\1.7\ogfo.exe"
  • "c:\Windows\System32\nwqkndcpotzp.exe"
  • "c:\py\tcl\tcl8.5\tzdata\Atlantic\tyjgw.exe"
  • "c:\Windows\System32\yumwl.dll"
  • "c:\Program Files\Common Files\microsoft shared\DAO\satfyi.exe"
  • "c:\py\DLLs\jipgudvgl.exe"
  • "c:\Program Files\Adobe\Reader 9.0\Reader\plug_ins\dlhuqakt.exe"
  • "c:\py\tcl\dde1.3\wirgopo.exe"
  • "c:\Program Files\Common Files\microsoft shared\ink\HWRCustomization\jrvhp.exe"
  • "c:\Program Files\Windows Media Player\Media Renderer\uwuomjxnykuq.exe"
  • "c:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Tablet PC\wdlvpeg.exe"
  • "c:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\en-US\js\enknalqezdc.exe"

          Network Activity
          We observed the following DNS query/queries:
          • bar.foo
          • mail-in100.apple.com
          • mx2.shore.net
          • acm.org.s7b2.psmtp.com
          • python.org
          • acm.org
          • mail-in2.apple.com
          • mail-in5.apple.com
          • acm.org.s7a2.psmtp.com
          • apple.com
          • www.python.org
          • mail-in21.apple.com
          • mail-in24.apple.com
          • shore.net
          • mail-in23.apple.com
          • mail.python.org
          • mx1.shore.net
          • mail-in25.apple.com
          • mail-in6.apple.com
          • acm.org.s7b1.psmtp.com
          • mail-in7.apple.com
          • acm.org.s7a1.psmtp.com
          • bar.baz
          • mail-in22.apple.com
          • unicode.org
          • mail-in4.apple.com

          The sample sends Spam mails to a number of sources

            Registry Related Changes
            It makes the following registry modifications to ensure infection after system reboot:
            • HKLM\Software\Microsoft\Windows\CurrentVersion\Run\euyuek = C:\Windows\system32\nwqkndcpotzp.exe


            Relevant Information