Jump to content

Build Theme!
  • Infected?


Hey there! :wub: Looks like you're enjoying the discussion, but you're not signed up for an account. When you create an account, we remember exactly what you've read, so you always come right back where you left off. You also get notifications, here and via email, whenever new posts are made. You can like posts to share the love. :D Join 92804 other members! Anybody can ask, anybody can answer. Consistently helpful members may be invited to become staff. Here's how it works. Virus cleanup? Start here -> Malware Removal Forum.

Try What the Tech -- It's free!


Tracing infectected? email. Is it possible?

  • Please log in to reply
2 replies to this topic

#1 dohouch


    New Member

  • Authentic Member
  • Pip
  • 11 posts

Posted 13 December 2006 - 06:34 AM

Just received an email that set of my anti-virus as it had an .exe attachment. This is an email account that never gets spam (yes amazing,Never :D ) so I'm thinking that this has come from someone's address book.

Is there any way I can find that out? Have attached header info, with personal info removed.Attached File  Header_of_Infected_Email.txt   903bytes   208 downloads


Register to Remove

#2 paws


    Tech Team

  • Administrator
  • 6,085 posts

Posted 16 December 2006 - 03:30 AM

Tracing the origins of email is a fairly arcane art but can be done, but is resource hungry.

There are programmes that can be downloaded from the Internet to assist you in this but before you start on this it is important to have an outline knowledge of how email gets from sender to recipient. Its also important to remember that some email clients are set up to automatically block an attachment that is executable.

For example a file ending in .exe is an executable and is often automatically blocked either by the email client or by the ISP (Internet Service Provider) The reason for this is that an .exe file can be malicious and severely harm your system when it runs. On the other hand the .exe file may be perfectly legitimate, and be very useful and provide useful and important services and benefits.

It is necessary therefore to establish the safety of a particular file (running appropriate anti-virus/antispyware scans) and thoroughly researching the file before even considering overriding the security settings that you have in place. If in any doubt the best advice is to keep well clear of it.

For extra information on starting to trace the origins of the email the following site offers a basic overview that might help you get started.


The bad guys are unfortunately very adept at both covering their tracks and masquerading under false colours, so you will need to be alert, diligent, and tenacious in your quest to avoid being defeated by the deliberate obfuscations that they employ.
Best of luck
The help you receive here is free. If you wish to show your appreciation, then you may donate to help keep us online. http://www.whatthetech.com/donate

#3 dohouch


    New Member

  • Authentic Member
  • Pip
  • 11 posts

Posted 16 December 2006 - 06:58 AM

Thanks for great link. Have just kicked off reading it. Will enjoy all the basic information on that site, I need the simple stuff.

Related Topics

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users