An e-mail containing Maldal.C can be recognized by the following characteristics:
The subject of the e-mail is: 'Happy New Year'
The e-mails body text is:
Hii, I can't describe my feelings But all I can say
is Happy new year :-) bye
And then as said before the attachment is named: CHRISTMAS.EXE
Maldal disguises itself as a Christmas greeting card to hide its true function. When the attachment is run it displays a greeting card featuring Santa Claus and a reindeer (either Rudolf or Dasher but our virus experts are still debating on the subject).
Then the worm copies itself onto the windows directory as 'Christmas.exe'. This copy of Maldal.C is added to the registy run keys as:
Thus it will be started every time Windows is starts up.
After being executed the worm disables the keyboard and attempts to
delete everything from the Windows System directory.
It sets the computer name to 'ZaCker' and modifies Internet
Explorer's starting page as to directing to an infected homepage displaying this text:.
Sharoon = a war crimenal
Bush supports him
Bush = a war crimenal
American people must protect their country
government will lead them to the hell !
When this page is viewed using Internet Explorer, the
Windows installation drive and execute it.
Now Maldal.C will try to everything in the
following directories on the Windows installation drive:
Program Files\Zone Labs
Program Files\AntiViral Toolkit Pro
Program Files\Command Software\F-PROT95
Program Files\Quick Heal
Program Files\Norton AntiVirus
The worm will also drop a called file DaLaL.htm into Windows System
directory, which contains a link to the second part of the worm. This
file is copied, along with the copy of the worm as 'server.vbs' to
root of each mapped network drive.
Next the worm searches through every fixed and network drive, and
appends the content of 'DaLaL.htm' to each file with ".htm", ".html", or ".asp" extensions.
The worm will also delete files with the following extensions:
After deleting a file, it will create a copy of itself with the
same name and extension as the original but add a .vbs
extension into the name.
W32/Maldal.C@mm also searches for mIRC application's configuration file
and replaces it. After that an infected user will show a
message when another user joins the same IRC channel.
This message also contains a link to the infected web page.
Finally, if the script is executed after 30 minutes of the initial
infection, and the number of seconds equals five, it attempts to
delete all files from the system, shows a message box and shuts down
The second part of the worm behaves in the same way as the first part,
except it drops another file to the Windows system directory -
- and executes it. This file then sends a message with
a link to itself to all recipients listed in the Outlook Contacts folder.
The message has the following content:
Subject Very important !!!
Body: See this page
W32/Maldal@mm is detected and disinfected by F-Prot Antivirus™, version 3.11a, using virus definition files from 19th of December or later