Netsky.p (firstname.lastname@example.org) takes advantage of the Incorrect MIME header in Internet Explorer, the app that renders HTML e-mail for Microsoft Outlook. A patch to correct this IE flaw has been available from Microsoft since 2001. Netsky.p also spreads via shared network files. This worm will attempt to delete Registry keys from infected computers. Netsky.p does not affect users of Linux, the Mac OS, or Unix. Because Netsky.p spreads via e-mail and could damage system files, this worm rates a 6 on the CNET/ZDNet Virus Meter.
How it works
Netsky.p arrives via e-mail using a spoofed e-mail address as the sender. The subject is taken from one of the following choices:
Re:Extended Mail System
Re:Proctected Mail System
The body text is taken from the following list:
I found this document about you.
I have attached it to this mail.
Waiting for authentification.
Protected message is available
Do not visit this illegal websites!
Here is my phone number.
I cannot believe that.
Your file is attached.
For further details see that attachment.
Congratulations!, your best friend.
Greetings from france, your friend.
If the message will not displayed automatically, follow the link to read the delivered message.
Received message is available at: (a bogus URL)
The attached file is a zip file. Netsky.p also searches shared file directories that use the following words:
my shared folder
According to McAfee, once executed, Netspky.p copes itself as FVProtect.exe and adds the following files to the Windows file folder:
base64.tmp (UUEncoded worm)
zip1.tmp (a worm zip archive)
zip2.tmp (a worm zip archive)
zip3.tmp (a worm zip archive)
zipped.tmp (a worm zip archive)
The worm sends copies of itself to e-mail addresses found on the infected PC.
Netsky.p also creates the following Registry key:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run "Norton Antivirus AV" =
Netsky.p deletes the following Registry keys if present:
Netsky.p uses an Internet Explorer vulnerability from 2001, MS01-020, to execute automatically; however, automatic execution should affect only users still running unpatched versions of Internet Explorer 5.01 or 5.5.
Users of Internet Explorer 5.01 or 5.5 are urged to patch their software if they haven't done so already.
A few antivirus software companies have updated their signature files to include this worm. This will stop the infection upon contact and in some cases will remove an active infection from your system. For more information, see Computer Associates, F-Secure, McAfee, Sophos, Symantec, and Trend Micro.