Amus is a Windows PE executable file, written in Visual Basic and packed by Yoda. The compressed file size is about 50 KB. Amus is activated only if users double click on the attachment.
After being launched, Amus creates a unique identifier named Masum and attempts to activate ISpeechVoice.Speak (aka Microsoft Sam) and play the following soundtrack:
How are you. I am back. My name is mister hamzi. I am seeing you. Haaaaaaaa. You must come to Turkey. I am cleaning your computer. 5. 4. 3. 2. 1. 0. Gule. Gule.
Amus then copies itself into the root directory of the C:\ drive under the name masum.exe and into the Windows folder under the following names:
The worm registers the file KdzEregli.exe in the following Windows auto run system registry key:
Moreover, Amus creates the following system registry key:
Amus uses Outlook to send copies of itself to all recipients listed in the address book.
- Subject : Listen and Smile
- Attachment name : Masum.exe
- Hey. I beg your pardon. You must listen.
Amus does not spoof sender addresses and uses the real address of the infected machine.
Amus is programmed to replace the home page URL in Internet Explorer on the 1st, 6th, 20th and 25th of each month with the following text:
Konneting du pepil and dizkoneting the user. Anlami: Baglansan ne olacak, baglanmasan ne olacak. Zaten hatlar burada rezalet.
On the 2nd, 15th and 17th of each month, Amus will attempt to delete all .ini files in the Windows folder. On the 10th and 23rd of each month, the worm will attempt to delete all .dll files in the Windows folder.
Securelist (Kaspersky Labs), Email-Worm.Win32.Amus.a