|
||
4/6: Mydoom-AJ Worm Uses Email Similar to earlier MYDOOM variants, Worm_Mydoom.AJ propagates via email messages. It also uses social engineering techniques by sending an email message that poses as a love letter. It sends the said email message using a spoofed sender's name.
It obtains target email addresses from files using specific extension names. It also generates email addresses by selecting a user name, which it appends to a selected domain name, from its own list. It skips email addresses that contain certain strings.
The email message it sends has varying subjects, message body content, and attachment file names. For specific details about this worm's email message, please click here. Aside from email, this worm also attempts to propagate via popular peer-to-peer (P2P) file-sharing networks.
This worm also has the ability to prevent users from accessing security and antivirus Web sites by modifying the system's HOSTS file. It also terminates certain malware-related, security-related, and Windows-related processes running on the affected system.
Technical details can be found at Trend Micro page.
|
||
|