1. Symantec/
  2. Security Response/
  3. W32.Netsky.K@mm


Risk Level 2: Low

March 8, 2004
February 13, 2007 12:18:36 PM
Also Known As:
W32/Netsky-J [Sophos], Win32.Netsky.J [Computer Assoc, W32/Netsky.j@MM [McAfee], WORM_NETSKY.J [Trend], I-Worm.NetSky.j [Kaspersky]
Systems Affected:
Windows 2000, Windows 98, Windows Me, Windows NT, Windows Server 2003, Windows XP

W32.Netsky.K@mm is a mass-mailing worm that uses its own SMTP engine to send itself to the email addresses it finds when scanning hard drives and mapped drives.

The "sender" of the email is spoofed, and its subject, message body, and attachment vary. The attachment has a .pif extension.

This threat is compressed with tElock.

  • Symantec Consumer products that support the Worm Blocking functionality automatically detect this threat as it attempts to spread.
  • The worm has an MD5 hash value of 0xE26BC65552359A226CE6589E60C22151.

The worm attempts to disinfect the systems that the following worms may have compromised. The deletion of the additional registry keys may result in other worms being de-activated.
  • W32.Beagle.A@mm through W32.Beagle.K@mm
  • W32.Mydoom.A@mm
  • W32.Mydoom.B@mm
  • W32.Netsky@mm
  • W32.Netsky.B@mm
  • W32.Cone@mm
  • W32.Cone.B@mm
  • W32.Welchia.B.Worm through W32.Welchia.D.Worm
  • W32.Pinfi
  • W32.HLLW.Deadhat.B
  • W32.Mimail.T@mm

Antivirus Protection Dates

  • Initial Rapid Release version March 8, 2004
  • Latest Rapid Release version September 14, 2016 revision 024
  • Initial Daily Certified version March 8, 2004
  • Latest Daily Certified version September 15, 2016 revision 001
  • Initial Weekly Certified release date March 8, 2004
Click here for a more detailed description of Rapid Release and Daily Certified virus definitions.
Writeup By: Yana Liu

Search Threats

Search by name
Example: W32.Beagle.AG@mm
STAR Antimalware Protection Technologies
2016 Internet Security Threat Report, Volume 21
  • Twitter
  • Facebook
  • LinkedIn
  • Google+
  • YouTube