Email-Worm.MSWord.Bizon
Detection added: 22.04.2024 23:51:05 (GMT+2)
MD5: 16C9B2F0CF98DCE28D3D7CE80BBDE3E5
SHA1: 4C1F0F96D6A14576388FB9ABEE7BFE22F289CF7C
Behavior: Email Worm MD5: 16C9B2F0CF98DCE28D3D7CE80BBDE3E5
SHA1: 4C1F0F96D6A14576388FB9ABEE7BFE22F289CF7C
Email worms spread via infected email messages. The worm may be in the form of an attachment or the email may contain a link to an infected website.
Worm will be activated when the user clicks on the attachment or will be activated when the user clicks on the link leading to the infected site.
Use one of the following methods to spread: Direct connection to SMTP servers using a SMTP API library coded into the worm; MS Outlook services; Windows MAPI functions.
Behavior: Worm
A worm that spreads via e-mail, usually in infected executable e-mail file attachments.
NOTE: The hash is only listed for the first detected malicious file. SHA/MD5 hash should not be intended as a security/antivirus solution, instead it provides you an additional information, allowing you to identify known malware files.
Learn more about:




Take the following steps to help prevent infection on your computer:
- Use up-to-date antivirus software.
- Get the latest updates for Operating system and your installed software.
- Use strong passwords and password management software.
- Use caution when opening attachments, accepting file transfers and clicking on links to webpages.