W32/Rbot-AGZ

Category: Viruses and Spyware
Type: Win32 worm
Prevalence: No Reports

Download Download our free Virus Removal Tool - Find and remove threats your antivirus missed

W32/Rbot-AGZ is a network worm and IRC backdoor Trojan for the Windows platform. The worm copies itself to a file named Flashget.exe in the Windows system folder.

W32/Rbot-AGZ spreads using a variety of techniques including exploiting weak passwords on computers and SQL servers, exploiting operating system vulnerabilities (including DCOM-RPC, LSASS, WebDAV and UPNP) and using backdoors opened by other worms or Trojans.

W32/Rbot-AGZ can be controlled by a remote attacker over IRC channels. W32/Rbot-AGZ is a network worm and IRC backdoor Trojan for the Windows platform.

The worm copies itself to a file named Flashget.exe in the Windows system folder and creates the following registry entries:

HKCU\Software\Microsoft\OLE\
Flashget Download Manager
"Flashget.exe"

HKLM\Software\Microsoft\Windows\CurrentVersion\Run\
Flashget Download Manager
"Flashget.exe"

HKLM\Software\Microsoft\Windows\CurrentVersion\RunServices\
Flashget Download Manager
"Flashget.exe"

W32/Rbot-AGZ spreads using a variety of techniques including exploiting weak passwords on computers and SQL servers, exploiting operating system vulnerabilities (including DCOM-RPC, LSASS, WebDAV and UPNP) and using backdoors opened by other worms or Trojans.

W32/Rbot-AGZ can be controlled by a remote attacker over IRC channels. The backdoor component of W32/Rbot-AGZ can be instructed by a remote user to perform the following functions:

start an FTP server
start a Proxy server
start a web server
take part in distributed denial of service (DDoS) attacks
log keypresses
capture screen/webcam images
packet sniffing
port scanning
download/execute arbitrary files
start a remote shell (RLOGIN)

Patches for the operating system vulnerabilities exploited by W32/Rbot-AGZ can be obtained from Microsoft at:

http://www.microsoft.com/technet/security/bulletin/ms04-012.mspx
http://www.microsoft.com/technet/security/bulletin/ms03-039.mspx
http://www.microsoft.com/technet/security/bulletin/ms03-007.mspx
http://www.microsoft.com/technet/security/bulletin/ms01-059.mspx