All disassembly analasis made shows that it is a simplistic worm designed
break in, execute, and start sending itself out. No system damage or host
embedding has been detected. The writer of the worm had no intentions of
causing permanent damage.
For now, seeing how effective this worm was how long do you think its going to take before there are many, many variations on this worm that *DO* have malicious code and backdoor the machine in a way that will survive a reboot.
It's really gone after a restart.
Network Security Engineer
Digital ID Print: 874f 1b77 470f 0b10 126e d8d2 c3a3 d52a 24ab 73c3
PGP Print: C6AD B205 E3C6 38AB 0164 6604 66F5 CCFC F4ED F1E0
PGP Key: http://akasha.irt.drexel.edu/danny.asc