1. Symantec/
  2. Security Response/
  3. W32.Mydoom.L@mm


Risk Level 2: Low

July 19, 2004
February 13, 2007 12:25:29 PM
Also Known As:
W32/Mydoom.n@MM [McAfee], WORM_MYDOOM.L [Trend], W32/MyDoom-N [Sophos], I-Worm.Mydoom.l [Kaspersky], Win32.Mydoom.N [Computer Assoc
Systems Affected:

The W32.Mydoom.L@mm mass-mailing worm:
  • Uses its own SMTP engine to send itself to all the email addresses that it finds from an infected system.
    The email has an attachment with a .bat, .cmd, .com, .exe, .pif, .scr, or .zip extension.
  • The attachment name may contain a randomly selected domain, which was found on the sender's system. For example, the attachment name could contain fakedomain.com if the address x@fakedomain.com was harvested.
  • Contains keylogging capabilities. The From field of the email is spoofed.
  • Acts as a backdoor on infected systems.
  • Is written in C++ and is packed with UPX.

Note: Virus definitions 60719am (extended version July 19, 2004, rev. 39) and earlier, released on July 19, 2004, detect this threat as W32.Beagle.AF@mm.

Antivirus Protection Dates

  • Initial Rapid Release version July 19, 2004
  • Latest Rapid Release version March 8, 2018 revision 024
  • Initial Daily Certified version July 19, 2004
  • Latest Daily Certified version March 9, 2018 revision 002
  • Initial Weekly Certified release date July 19, 2004
Click here for a more detailed description of Rapid Release and Daily Certified virus definitions.
Writeup By: Yana Liu

Search Threats

Search by name
Example: W32.Beagle.AG@mm
STAR Antimalware Protection Technologies
2016 Internet Security Threat Report, Volume 21
  • Twitter
  • Facebook
  • LinkedIn
  • Google+
  • YouTube