W32/Agobot-BA

Category: Viruses and SpywareProtection available since:01 Dec 2003 00:00:00 (GMT)
Type: Win32 wormLast Updated:01 Dec 2003 00:00:00 (GMT)
Prevalence: Small Number of Reports

Download Download our free Virus Removal Tool - Find and remove threats your antivirus missed

W32/Agobot-BA is an IRC backdoor Trojan and network worm.

W32/Agobot-BA copies itself to network shares with weak passwords and attempts to spread to computers using the DCOM RPC and the RPC locator vulnerabilities.

These vulnerabilities allow the worm to execute its code on target computers with System level privileges. For further information on these vulnerabilities and for details on how to patch the computer against such attacks please see Microsoft security bulletins MS03-026 and MS03-001.

When first run, W32/Agobot-BA copies itself to the Windows system folder with the filename msasm.exe and creates the following registry entries so that the worm is run when Windows starts up:

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\
MS Config Stream = msasm.exe

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices\
MS Config Stream = msasm.exe

W32/Agobot-BA also registers itself as a service which will be activated when Windows starts up. The name of the service is MS Config Stream.

W32/Agobot-BA connects to a remote IRC server and joins a specific channel. The backdoor functionality of the worm can then be accessed by an attacker using the IRC network.

The worm also attempts to terminate and disable various security related programs.