Type Worm
Aliases
Backdoor.Agobot.3.gen
WORM_AGOBOT.CD
Win32/Agobot.3.FU
W32/Agobot-CC is a network worm which also allows unauthorised remote access to the computer via IRC channels.
W32/Agobot-CC attempts to copy itself to network shares with weak passwords and attempts to spread to computers using the DCOM RPC and the RPC locator vulnerabilities.
These vulnerabilities allow the worm to execute its code on target computers with System level privileges. For further information on these vulnerabilities and for details on how to protect/patch the computer against such attacks please see Microsoft security bulletins MS03-001 and MS03-026. MS03-026 has been superseded by Microsoft security bulletin MS03-039.
W32/Agobot-CC moves itself to the Windows system folder as LSASS.EXE and creates entries in the registry at the following locations to run itself on system restart:
HKLM\Software\Microsoft\Windows\CurrentVersion\Run
HKLM\Software\Microsoft\Windows\CurrentVersion\RunServices
HKLM\SYSTEM\CurrentControlSet\Services\Driver\ImagePath
Each time W32/Agobot-CC is run it attempts to connect to a remote IRC server and join a specific channel.
W32/Agobot-CC attempts to terminate various anti-virus and security processes, e.g. sweep95, blackice and zonealarm. The worm also attempts to terminate processes related to W32/Blaster-A and its variants, e.g. MSBLAST.EXE, *****32.EXE and DLLHOST.EXE.
http://www.sophos.com/virusinfo/analyses/w32agobotcc.html