1. Symantec/
  2. Security Response/
  3. W32.Explet.A@mm


Risk Level 2: Low

June 2, 2004
February 13, 2007 12:23:57 PM
Also Known As:
I-Worm.Plexus.a [Kaspersky], WORM_PLEXUS.A [Trend], Win32.Mimail.W [Computer Assoc, W32/Plexus@MM [McAfee]
Systems Affected:
CVE References:
CAN-2003-0533 CAN-2003-0352

W32.Explet.A@mm is a mass-mailing worm that also spreads through network shares and the Kazaa file-sharing network. The worm exploits the Microsoft Windows LSASS Buffer Overrun Vulnerability (described in Microsoft Security Bulletin MS04-011) and the DCOM RPC vulnerability (described in Microsoft Security Bulletin MS03-026) through TCP ports 135 and 445. It may also lower security settings and download remote files.

Antivirus Protection Dates

  • Initial Rapid Release version June 3, 2004
  • Latest Rapid Release version August 8, 2016 revision 023
  • Initial Daily Certified version June 3, 2004
  • Latest Daily Certified version August 9, 2016 revision 001
  • Initial Weekly Certified release date June 7, 2004
Click here for a more detailed description of Rapid Release and Daily Certified virus definitions.
Writeup By: Yana Liu

Search Threats

Search by name
Example: W32.Beagle.AG@mm
STAR Antimalware Protection Technologies
2016 Internet Security Threat Report, Volume 21
  • Twitter
  • Facebook
  • LinkedIn
  • Google+
  • YouTube