Email-Worm:W32/Netsky.P mass-mails itself to new victims using both email and by copying itself across local networks (LAN) and Peer-to-Peer (P2P) networks, as well as FTP and HTTP folders.
Based on the settings of your F-Secure security product, it will either move the file to the quarantine where it cannot spread or cause harm, or remove it.
A False Positive is when a file is incorrectly detected as harmful, usually because its code or behavior resembles known harmful programs. A False Positive will usually be fixed in a subsequent database update without any action needed on your part. If you wish, you may also:
Check for the latest database updates
First check if your F-Secure security program is using the latest updates, then try scanning the file again.
Submit a sample
After checking, if you still believe the file is incorrectly detected, you can submit a sample of it for re-analysis.
Note: If the file was moved to quarantine, you need to collect the file from quarantine before you can submit it.
Exclude a file from further scanning
If you are certain that the file is safe and want to continue using it, you can exclude it from further scanning by the F-Secure security product.
Note: You need administrative rights to change the settings.
The worm's file is spread as a dropper that is a Windows PE executable 29568 bytes long, packed with FSG file. When the dropper is run, it extracts the main worm's file that is 26624 bytes long and is packed with a modified UPX file compressor. That file is a DLL, so Netsky authors started to use a new approach to installing the worm to a system.
Netsky.P continues the ongoing feud with the Bagle worm's author.
Netsky.P was discovered on March 21st, 2004
Upon execution Netsky.P copies itself as FVPROTECT.EXE file to Windows folder and then extracts the main worm component as USERCONFIG9X.DLL to the same folder. The worm adds a startup key for one of the dropped files into System Registry:
where %WinDir% represents Windows folder name. Additionally the worm drops the following files into Windows folder:
These files contain UUEncoded worm's executable file and ZIP archives (3 different variants). These 3 archives contain worm's executables with the following names:
NetSky.P worm removes Registry keys of several Bagle worm variants if it finds them on an infected computer. At least the last 9 keys (listed below) belong to earlier Bagle variants.
This worm variant contains another insulting message for the author of Bagle worm.
NetSky.P deletes the following Registry keys:
Before spreading in email the worm collects email addresses. It scans all files on all drives from C: to Z: except CD-ROM drives. If any file with the following extensions is found, the worm opens it and searches for email addresses there:
The worm avoids sending emails to addresses that contain the following substrings:
The worm composes over 30 different types of emails. Subjects, body texts and attachment names are randomly selected from the variants that are hardcoded in the worm's body. These are the variants of the messages that the worm can send out:
Subject:
Body:
Attachment:
----------------- or -----------------
Subject:
Body: Thank you for your request, your details are attached!Thanks! Attachment:
----------------- or -----------------
Subject:
Body: I am shocked about your document!Let'us be short: you have no experience in writing letters!!! Attachment:
----------------- or -----------------
Subject:
Body: Try this, or nothing!Here is it! Attachment:
----------------- or -----------------
Subject:
Body: Do not visit this illegal websites!You have downloaded these illegal cracks?.
Attachment:
----------------- or -----------------
Subject:
Body: Here is my icq list.Here is my phone number.
Attachment:
----------------- or -----------------
Subject:
Body: I have visited this website and I found you in the spammer list. Is that true?Are you a spammer? (I found your email on a spammer website!?!) Attachment:
----------------- or -----------------
Subject:
Body: po44u90ugjid-k9z5894z09u049u89gh89fsdpokofkdpbm3-4i Attachment:
----------------- or -----------------
Subject:[random]
Body:[random]
Attachment:
----------------- or -----------------
Subject:
Body: Please r564g!he4a56a3haafdogu#mfn3oSMTP Error #201 See the ghg5%&6gfz65!4Hf55d!46gfgfServer Error #203 Attachment:
----------------- or -----------------
Subject:
Body: Your photo, uahhh.... , you are naked!You have written a very good text, excellent, good work! Attachment:
----------------- or -----------------
Subject:
Body: Your archive is attached.Monthly news report.
Attachment:
----------------- or -----------------
Subject:
Body: lovely, :-)your big love, ;-) Attachment:
----------------- or -----------------
Subject:
Body: I hope you accept the result!The sample is attached! Attachment:
----------------- or -----------------
Subject:
Body: Your important document, correction is finished!Important message, do not show this anyone! Attachment:
----------------- or -----------------
Body: Here is the website. ;-)My favourite page.
Attachment:
----------------- or -----------------
Subject:
Body: The sample file you sent contains a new virus version of mydoom.j.Please clean your system with the attached signature.Sincerly,Robert Ferrew The sample file you sent contains a new virus version of buppa.k.Please update your virus scanner with the attached dat file.Best Regards,Keria Reynolds Attachment:
----------------- or -----------------
Subject:
Body:
Have a look at these.
Attachment:
----------------- or -----------------
Subject:
Body:
Attachment:
----------------- or -----------------
Subject:
Body:
Attachment:
----------------- or -----------------
Subject:
Body:
Attachment:
----------------- or -----------------
Subject:
Body:
Attachment:
----------------- or -----------------
Subject:
Body:
Attachment:
----------------- or -----------------
Subject:
Body:
Attachment:
----------------- or -----------------
Subject:
Body:
Attachment:
----------------- or -----------------
Subject:
Body:
Attachment:
----------------- or -----------------
Subject:
Body:
Attachment:
----------------- or -----------------
Subject:
Body:
Attachment:
----------------- or -----------------
Subject:
Body:
Attachment:
----------------- or -----------------
Subject:
Body:
Attachment:
----------------- or -----------------
Subject:
Body:
Attachment:
----------------- or -----------------
Subject:
Body:
Attachment:
combined with the following:
The [ext] represents the extension that can be single or double. The first extension can be:
The second extension can be:
The infected attachment name can contain random numbers and can be sent in a ZIP archive. The worm can add a fake scan report to the end of an infected message. The following variants of scan report are used:
The worm can send messages with an IFrame Exploit that allows the worm's attachment MESSAGE.SCR to be automatically run on certain versions of email clients.
The worm scans all drives from C: to Z: except CD-ROM drives. If it finds folders with any of the following names:
Then copies itself there multiple times with the following names:
This feature allows the worm to spread to local network, to shared folders of P2P (peer-to-peer) clients and to ftp and http server folders (if such servers are present on an infected computer or on computers that have open shares with an infected one). Additionally it allows the worm to copy itself multiple times on a local hard disk.