W32.Nujama


Aliases: W32/Nujama.worm!p2p, Win32/Nujama.A WORM_NUJAMA.A
Variants: N/A

Classification: Malware
Category: Computer Worm

Status: Active & Spreading
Spreading: Slow
Geographical info: Asia, North and South America, and some parts of Europe and Australia
Removal: Easy
Platform: W32
Discovered: 26 Dec 2006
Damage: Low

Characteristics: W32.Nujama is a worm that propagates by changing system information mapped drives and hiding file extensions. It attacks Windows 2000, Windows 95, Windows 98, Windows Me, Windows NT, Windows Server 2003 and Windows XP Operating Systems. Another visible symptom is that it shows a window box entitles, “ WinZip Self-Extract error!” It also presents the message “Ha fallado la descompresion del archive. Si fue descargado de internet, puede que este danado.”

More details about W32.Nujama

This will also prompt the user to click the “Ok” button. Once this is clicked, the worm will go through its process of infection and thus copies itself to various filenames in the windows system folders. These are Folder.htt, Desktop.ini, e.zip, oeminfo.ini, SystemMonitor.exe, ptsnoop.exe, InfoVersion.exe, cmmpu.exe and call of duty[68 SPACES].exe. It also changes the boot sector and this could result to the inability of the computer to run. This will also prompt the user to click the “Ok” button. Once this is clicked, the worm will go through its process of infection and copies itself to various filenames in the windows system folders. These are Folder.htt, Desktop.ini, e.zip, oeminfo.ini, SystemMonitor.exe, ptsnoop.exe, InfoVersion.exe, cmmpu.exe and call of duty[68 SPACES].exe.

According to some users, the W32.Nujama application is capable of downloading unsolicited computer files and applications. This may be done by downloading codes to a computer that were not requested or wanted by the user. This kind of malware may also be capable of downloading and installing virtually any application into the affected computer. It is also possible that the W32.Nujama program is capable of exploiting computer security flaws. These security vulnerabilities may allow hackers to gain access to and control a victim computer.