W32/Agobot-BR

Category: Viruses and SpywareProtection available since:15 Dec 2003 00:00:00 (GMT)
Type: Win32 wormLast Updated:15 Dec 2003 00:00:00 (GMT)
Prevalence: No Reports

Download Download our free Virus Removal Tool - Find and remove threats your antivirus missed

W32/Agobot-BR copies itself to network shares with weak passwords and attempts to spread to computers using the DCOM RPC and the RPC locator vulnerabilities.

These vulnerabilities allow the worm to execute its code on target computers with System level privileges. For further information on these vulnerabilities and for details on how to protect/patch the computer against such attacks please see Microsoft security bulletins MS03-001 and MS03-026. MS03-026 has been superseded by Microsoft security bulletin MS03-039.

When first run, W32/Agobot-BR copies itself to the Windows system folder with the filename mdmsv.exe and creates the following registry entries so that the worm is run when Windows starts up:

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\
machine-debugger = mdmsv.exe

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices\
machine-debugger = mdmsv.exe

W32/Agobot-BR registers itself as a service which will be activated when Windows starts up. The name of the service is machine-debugger.

W32/Agobot-BR connects to a remote IRC server and joins a specific channel. The backdoor functionality of the worm can then be accessed by an attacker using the IRC network.

The worm also attempts to terminate and disable various security related programs.