1. Symantec/
  2. Security Response/
  3. W32.Dumaru.AD@mm


Risk Level 2: Low

February 3, 2004
February 13, 2007 12:17:00 PM
Also Known As:
I-Worm.Dumaru.gen [Kaspersky], W32/Dumaru.gen@MM [McAfee]
Systems Affected:

W32.Dumaru.AD@mm is a multi-threaded, mass-mailing worm that downloads and runs a file, runs a keylogger, steals personal information, and starts an FTP server on port 10000. This worm is similar to the W32.Dumaru.Z@mm worm.

The worm uses its own SMTP engine to spread to the email addresses it finds on an infected system.

The email has the following characteristics:

From: "Elene" <F**KENSUICIDE@HOTMAIL.COM>  (censored)
Subject: Important information for you. Read it immediately !
Attachment: Myphoto.zip

The attachment is a zip file that contains the worm executable as myphoto.jpg <spaces> .exe". (There are numerous spaces between ".jpg" and ".exe".)

Hi !
Here is my photo, that you asked for yesterday.

Note: The email message contains an IFRAME exploit, so that Microsoft Outlook will download the worm from a hard-coded URL and execute it.

Antivirus Protection Dates

  • Initial Rapid Release version February 3, 2004
  • Latest Rapid Release version August 8, 2016 revision 023
  • Initial Daily Certified version February 3, 2004
  • Latest Daily Certified version August 9, 2016 revision 001
  • Initial Weekly Certified release date February 4, 2004
Click here for a more detailed description of Rapid Release and Daily Certified virus definitions.
Writeup By: Robert X Wang

Search Threats

Search by name
Example: W32.Beagle.AG@mm
STAR Antimalware Protection Technologies
2016 Internet Security Threat Report, Volume 21
  • Twitter
  • Facebook
  • LinkedIn
  • Google+
  • YouTube