Over the past few weeks a series of blog entries were published about W32.Waledac:
Waledac – an Overview
Waledac, Part 2: Its Bootstraps and Armor
Waledac, Part 3: A Spammer, Downloader, and Infostealer – Among Other Things
If you are interested you can download a Waledac paper, posted here, which presents information on Waledac’s functionalities, possible origins, spam campaigns, and protection mechanisms. There is also more detail on Waledac’s communication protocol and task messages. The paper is based on a blog series and a threat analysis report that was published on the DeepSight portal in June 2009.