W32/Rbot-AXK is a worm and IRC backdoor Trojan for the Windows platform.
W32/Rbot-AXK spreads to other network computers by exploiting common buffer overflow vulnerabilities, including IIS5SSL (MS04-011), RPC-DCOM (MS04-012), WKS (MS03-049), WebDav (MS03-007), UPNP (MS01-059) and ASN.1 (MS04-007).
W32/Rbot-AXK runs continuously in the background, providing a backdoor server which allows a remote intruder to gain access and control over the computer via IRC channels.
W32/Rbot-AXK can be controlled by a remote attacker over IRC channels. The backdoor component of W32/Rbot-AXK can be instructed by a remote user to perform the following functions:
capture screen/webcam images
download/execute arbitrary files
start a remote shell (RLOGIN)
start an FTP server
take part in distributed denial of service (DDoS) attacks
When first run W32/Rbot-AXK copies itself to <System>\<random name>.pif.
The following registry entries are created to run <random name>.pif on startup:
Registry entries are set as follows: