Thank you for being a valued part of the CNET community. As of December 1, 2020, the forums are in read-only format. In early 2021, CNET Forums will no longer be available. We are grateful for the participation and advice you have provided to one another over the years.

Thanks,

CNET Support

General discussion

W32.Netsky.M@mm

Mar 10, 2004 8:27AM PST

Discovered on: March 10, 2004
Last Updated on: March 10, 2004 03:26:18 PM

W32.Netsky.M@mm is a mass-mailing worm that uses its own SMTP engine to send itself to the email addresses it finds when scanning hard drives and mapped drives.

The "sender" of the email is spoofed, and its subject, message body, and attachment vary. The attachment has a .pif extension.

This threat is compressed with UPX.


--------------------------------------------------------------------------------
Notes:
Symantec Consumer products that support the Worm Blocking functionality automatically detect this threat as it attempts to spread.
The worm has an MD5 hash value of 0xC32DB5E91758E38CD8A46ACC85109CF2.

--------------------------------------------------------------------------------




Type: Worm

When W32.Netsky.K@mm runs, it does the following:


Creates a mutex named "Rabbo_Mutex". This mutex allows only one instance of the worm to execute.


Copies itself as %Windir%\AVprotect9x.exe


Adds the value:

"9xHtProtect"="%Windir%\AVprotect9x.exe"

to the registry key:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

so that the worm runs when you start Windows.

Read more: http://securityresponse.symantec.com/avcenter/venc/data/w32.netsky.m@mm.html

Discussion is locked