Class Trojan-DDoS
Platform Win32

Technical Details

This is a Win32 DDoS (Distributed Denial of Service attack) Trojan that was distributed by a hacker (or hackers group) in November 2000. The Trojan was sent as an e-mail message with an attached file.

The message text and header looks as follows:


From: World Travel Agency Ltd. []
Sent: November 21, 2000 5:31 PM]
To: All tourists and vacationist]
Subject: Celebrate the New Millenium!]

World Travel Agency Ltd.
359 BTC Drive
P.O. Box 134108
Seattle, WA 98108-23

Dear Sir/Madam

Celebrate the New Millenium! Discover the Paradise!

We offer the most attractive package for the New Millenium celebrations you have ever seen.
Pure nature, modern architecture and high technologies are fused to create the perfect resort.
Reasonable prises, correctness, high quality services.
Click on the zip-file below to see our offer!
Make your neighbours envy!

Best Regards,


The attached file intends to be displayed as a ZIP archive, but it is a Windows EXE file with the following name:

“OFFER2001.ZIP [many spaces] .EXE”

This is Trojan “installer” that will affect a computer if it is run. Because of a “spaces” trick, it will be displayed as a .ZIP file in many cases, which could deceive a user to open it.


When the EXE file (Trojan installer) is run, it extracts from itself two more executable files and copies them to the Windows system director with the following names:


Under Win9x and WinNT, these files are then registered in the auto-run sections in different ways: under WinNT, the Trojan registers a SOUNDV.EXE file in the system registry:

SOFTWAREMicrosoftWindowsCurrentVersionRun soundv.exe

Under Win9x, the DLL file is registered in the SYSTEM.INI file in the following[boot] section:


The Trojan then displays the following fake error message:

A requred DLL does not exist.

A requred DLL does not exist

(the grammar mistake is left as it is in the Trojan code).

The SOUNDV.EXE is the DoS Trojan itself. The MRE.DLL is a small program that just executes the SOUNDV.EXE upon each running. As a result, under both Win9x and WinNT, the SOUNDV.EXE component will be activated.

DoS Attack

When this file is run (upon the next Windows restart), it will stay active as a hidden application (service), then it enables the auto-dial option in the Internet settings, then performs a DoS attack on the server “”.

Find out the statistics of the threats spreading in your region