Mydoom can be transmitted through email or file sharing with Kazaa. To be transmitted through Kazaa, the user must download the worm from an infected computer on the Kazaa network.
Mydoom also arrives in an email address with a spoofed sender address with eight possible subject lines:
- Mail Delivery System
- Mail Transaction Failed
- Server Report
The body of the email could be one of three possibilities:
- Mail transaction failed. Partial message is available.
- The message contains Unicode characters and has been sent as a binary attachment.
- The message cannot be represented in 7-bit ASCII encoding and has been sent as a binary attachment.
The attachment has a generic name and two file extensions in an attempt to fool the user into thinking it is some sort of document. The file name has nine possibilities:
The first fake file extension has three:
The second real file extension has six:
The .zip version will be an actual .zip file with a copy of the worm bearing the same name as the .zip. If it has an .exe or .scr extension, the attachment will have an icon similar to that of a .txt file in Windows XP.
When Mydoom is executed, it copies itself to the Windows system folder as Taskmon.exe (which is a legitimate file, though only when found in the Windows folder). It also creates the file Shimgapi.dll in the system folder.
This file is a backdoor trojan that opens TCP listening ports ranging from 3127 to 3198 and can download and execute arbitrary files. A file named Message, which contains random letters when opened with Notepad is placed in the Temp folder and opened in Notepad.
The worm creates or modifies several registry keys. It adds the value "TaskMon = \System Folder\taskmon.exe to two keys, one a Local Machine and the other a Current User registry key, both ensure that the worm will run every time the computer is started. It cradds the value "(Default) = \(System Folder)\shimgapi.dll" to a root registry key that ensures shimgapi.dll will be run by Internet Explorer when the web browser is run. It also creates a Local Machine and current user version of another registry key.
Mydoom then searches files with the following extensions for email addresses:
The worm then sends itself as an email using its own SMTP engine. The worm also contains strings with which it attempts to randomly generate an email address. The strings are the following mostly common names:
The worm will attempt to guess the name of the receiving server by appending the following strings to the domain name:
It will avoid sending itself to domain names with the following strings:
It will also avoid sending itself to any user names with the following strings:
It will avoid email addresses with the following strings, regardless of whether the string is in the user or domain name:
It will copy itself to the Kazaa download folder under the following file names:
Between 2004.02.01 and 2004.02.12 the worm tries to perform a DoS attack on the website www.sco.com. It creates 64 threads, which make an HTTP GET request from a random port on the infected computer to port 80 of www.sco.com. There is a 25% likelihood that the attack will come from any given infected machine because of the way Mydoom verifies the date.
Mydoom.B launches a Denial of Service attack against both SCO and Microsoft. It begins its attack on www.sco.com on February 1st, using 7 threads to constantly send a GET request to the website. It begins its attack on www.microsoft.com on February 3rd and uses 13 threads.
Email monitoring service MessageLabs blocked 7.4 million copies of Mydoom.A. Mydoom.A had infected about one out of every 41 email messages. It accounted for 20-30% of worldwide email traffic shortly after its release to the wild. Major websites moved temporarily or permanently to new addresses to avoid the DoS attack. F-Secure antivirus expert Mikko Hypponen called Mydoom the "worst e-mail worm incident in virus history". MessageLabs ranked it number 5 on its list of most active worms.
SCO moved its website www.sco.com to www.thescogroup.com in response to the amount of requests sent to the site. The group offered a $250,000 reward for information leading to the capture and conviction of the creator of the Mydoom.A worm. Microsoft offered a similar reward for the creator of the Mydoom.B worm, which attacked their site.
The SCO Group, which owns the rights to Unix, sued several vendors and supporters of Linux, claiming that some of its proprietary code was used in the system. The company sued Novell (owners of SuSE), AutoZone and Daimler-Chrysler and was sued by Red Hat and IBM. This action caused much anger in the open source community, causing many to suspect they were involved. Many open source groups around the world denied this and condemned the creation of viruses and worms.
Peter Ferrie. Symantec.com, W32.Mydoom.A
Scott Gettis. Symantec.com, W32.Mydoom.B@mm
McAfee Antivirus, W32/Mydoom@MM
Sophos Antivirus, W32/Mydoom-A
John Hogan. SearchWinIT, "A week of gloom and Mydoom". 2004.01.30
David Becker. CNet News, "Mydoom Virus Declared Worst Ever". 2004.01.29
John Leyden. The Register, SCO sidesteps MyDoom attacks. 2004.02.03
-. -, MyDoom assault forces SCO off the net. 2004.02.02
Dick O'Brien. ENN, SCO falls to Mydoom.A worm. 2004.02.02
Anthony Quinn. -, Irish Linux group condemns viruses 2004.02.06
Norton Antivirus, ☀http://uk.norton.com/top-5-viruses/promo