Category: Viruses and Spyware
Type: Win32 worm
Prevalence: No Reports

Download Download our free Virus Removal Tool - Find and remove threats your antivirus missed

W32/Agobot-SR is a worm that spreads via network shares. The worm also has a backdoor component that allows a malicious user remote access to an infected computer via IRC channels while running in the background as a service process.

When run W32/Agobot-SR moves itself to the Windows System folder and creates the following registry entries so as to run itself at user logon:



W32/Agobot-SR attempts to terminate processes related to anti-virus and security programs.

When instructed by a remote attacker, W32/Agobot-SR attempts to perform the following functions:

  • shutdown the computer
  • terminate processes
  • log keystrokes
  • download files from the internet and run them
  • steal email addresses
  • steal CD keys
  • launch denialoof-service (DoS) attacks
  • steal computer information

The worm also appends the HOSTS file with the following mappings: www.symantec.com securityresponse.symantec.com symantec.com www.sophos.com sophos.com www.mcafee.com mcafee.com liveupdate.symantecliveupdate.com www.viruslist.com viruslist.com viruslist.com f-secure.com www.f-secure.com kaspersky.com www.avp.com www.kaspersky.com avp.com www.networkassociates.com networkassociates.com www.ca.com ca.com mast.mcafee.com my-etrust.com www.my-etrust.com download.mcafee.com dispatch.mcafee.com secure.nai.com nai.com www.nai.com update.symantec.com updates.symantec.com us.mcafee.com liveupdate.symantec.com customer.symantec.com rads.mcafee.com trendmicro.com www.trendmicro.com

W32/Agobot-SR attempts to use the following vulnerabilities:

RPC-DCOM (MS04-012) security exploit
LSASS (MS04-011) security exploit
WebDAV (MS03-007) security exploit
Workstation Service (MS03-049, CAN-2003-0812) security exploit