[33280] in bugtraq

home help back first fref pref prev next nref lref last post

information and reverse engineering bits of the Mydoom worm

daemon@ATHENA.MIT.EDU (Gadi Evron)
Tue Jan 27 23:32:06 2004

Message-ID: <4016DE6F.5040008@egotistical.reprehensible.net>
Date: Tue, 27 Jan 2004 23:55:59 +0200
From: Gadi Evron <ge@egotistical.reprehensible.net>
MIME-Version: 1.0
To: bugtraq@securityfocus.com
Cc: full-disclosure@lists.netsys.com
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit

We've released a digest of a few of the messages that passed through 
TH-Research about this new worm.

In it is information about the worm that is not included in the 
different vendors web pages, and requires a higher understanding of 
assembly and reverse engineering.

We release it for the purpose of assisting sysadmins and security 
researchers by making the information available publicly.

You can find the digest at: http://www.math.org.il/newworm-digest1.txt.

As always, this information is released with the agreement of the 
different authors, according to the list's FAQ guidelines.

	Gadi Evron.

The Trojan Horses Research Maling List - http://ecompute.org/th-list

home help back first fref pref prev next nref lref last post