Virus Information


246pages on
this wiki
Add New Page
Talk0 Share

Ad blocker interference detected!

Wikia is a free-to-use site that makes money from advertising. We have a modified experience for viewers using ad blockers

Wikia is not accessible if you’ve made further modifications. Remove the custom ad blocker rule(s) and the page will load as expected.

CodeRed II
Type Internet Worm
Date Discovered 2001.07.13
Place of Origin China
Source Language Assembly
Platform MS IIS Server
File Type(s)
Reported Costs $2.75 Billion

CodeRed II is a worm that caused possible billions of dollars of damage in the summer of 2001. It contains the text string "Hacked by Chinese!", which is displayed on web pages that the worm defaces. It is also one of the few worms able to run entirely in memory, leaving no files on the hard drive or any other permanent storage (although some variants do).


CodeRed arrives at a server as a GET /default.ida request on TCP port 80. The request contains code that exploits a known buffer overflow vulnerability in the indexing software in Microsoft's Internet Information Server (IIS), allowing the worm to run code from within the IIS server (described by Microsoft here). The worm runs entirely in memory, and cannot be found on the disk. It is about 3,569 bytes long.

The signature of CodeRed will appear in the signature logs as:

  f%u0078%u0000%u00=a  HTTP/1.0

Using the CreateThread API, the worm will try to create 100 threads or copies of itself, but due to a bug in its code, it actually may create many more. Infected computers are likely to have high CPU loads because of this. Each of the threads checks for the file, C:\Notworm. If this file exists, the worm does not run and the thread goes into an infinite sleep state. It is uncertain what the exact significance of the Notworm file is. There is some speculation that this file may have only existed on one or more of the creator's computers in order to prevent it from infecting them.

If the date is between the 20th and 28th of the month, the worm will send junk data to port 80 of, then the IP address of (it was changed because of the worm). After the 28th, it goes into an infinite sleep mode and cannot be awakened unless deliberately executed.

The 100th thread of the worm will check the language of the local page of the server. If the language is US English, it will change the page.

If the date is before the 20th of the month, the next 99 threads attempt to exploit more computers by targeting random IP addresses. To avoid looping back to infect the source computer, the worm will not make HTTP requests to the IP addresses 127.*.*.* . If the default language of the computer is American English, further threads cause Web pages to appear defaced. First, the thread sleeps for two hours, and then hooks a function, which responds to the HTTP requests. Instead of returning the correct Web page, the worm returns its own HTML code.

This hook lasts for 10 hours and is then removed. However, re-infection or other threads can rehook the function.

The worm attempts to connect to TCP port 80 on a randomly chosen host assuming that a web server will be found. Upon a successful connection to port 80, the attacking host sends a crafted HTTP GET request to the victim, attempting to exploit the buffer overflow in the Indexing Service.

The original CodeRed worm stopped propagating on 2001.07.28, going into "Infinite Sleep Mode". It is believed that the worm will not "awaken" and will not spread again, unless deliberately executed again.



This variant is very similar to the original with only two major differences. The signature of CodeRed.II replaces the multiple N's with X's. This variant also drops a trojan called VirtualRoot, which can give a cracker access and control to the server.


This is a nematode worm or anti-worm. This worm has (or may have) its own entry.


Code Red infected between 1 and 2 million computers and resulted in an estimated $2.75 billion in clean-up costs and lost productivity. This is out of a possible 6 million, as that is the number of IIS servers in existence at the time. It was the most costly malware of 2001.


eEye believed that the worm originated in Makati City, Philippines (the same origin as the VBS/Loveletter worm). The defaced web pages strongly suggest that it might come from China.

Some antivirus people accused Wintermute of the virus coding group 29A of creating CodeRed. Wintermute did code a virus named Redcode, which was probably mistaken for CodeRed.

Other FactsEdit

CodeRed was deemed by the FBI to be so dangerous that it could bring down the entire Internet due to the increased traffic from the scans.

The phrase "Hacked by Chinese", in the payload of the original CodeRed, became an Internet meme indicating an online defeat. Sometimes it means being beaten in a game by a less-experienced player or someone with less skills. This phrase was still used as late as mid January in 2010 in a PC World article, though any reference to CodeRed or the meme may not have consciously been the intention of the author.


Kaspersky Labs ,, Net-Worm.Win32.CodeRed.a

CERT, CERT® Advisory CA-2001-19 "Code Red" Worm Exploiting Buffer Overflow In IIS Indexing Service DLL 2001.07.19 - 2002.01.17

CIAC, L-117: The Code Red Worm 2001.07.19

Cliff Changchun Zou, Weibo Gong, Don Towsley. "Code Red Worm Propagation Modeling and Analysis". University of Massachusetts, 2002.

Science Daily, "System Halts Computer Viruses, Worms, Before End-user Stage". 2003.11.12

John W. Lockwood, James Moscola, Matthew Kulig, David Reddick, and Tim Brooks. Internet Worm and Virus Protection in Dynamically Reconfigurable Hardware

Eric Chien., CodeRed Worm.

Brian Cashell, William D. Jackson, Mark Jickling, Baird Webel, Government and Finance Division. CRS Report for Congress, Received through the CRS Web, "The Economic Impact of Cyber-Attacks". 2004.04.01

McAfee Antivirus. W32/CodeBlue.worm

Michelle Delio. Wired, "Code Blue Targets China Firm". 2001.09.07

-. -, The Hunt for the Worm Writers. 2001.08.09

The Urban Dictionary, Hacked by Chinese.

Also on Fandom

Random Wiki