Thank you for being a valued part of the CNET community. As of December 1, 2020, the forums are in read-only format. In early 2021, CNET Forums will no longer be available. We are grateful for the participation and advice you have provided to one another over the years.

Thanks,

CNET Support

General discussion

W32/Agobot-AW

Dec 1, 2003 12:24AM PST

Aliases
Backdoor.Agobot.3.gen, W32/Gaobot.worm.gen, W32.HLLW.Gaobot.gen

Type
Win32 worm

W32/Agobot-AW is a network worm which also allows unauthorised remote access to the computer via IRC channels.
W32/Agobot-AW copies itself to network shares with weak passwords and attempts to spread to computers using the DCOM RPC and the RPC locator vulnerabilities.

These vulnerabilities allow the worm to execute its code on target computers with System level priviledges. For further information on these vulnerabilities and for details on how to protect/patch the computer against such attacks please see Microsoft security bulletins MS03-026 and MS03-001.

W32/Agobot-AW drops a copy of itself to the Windows system32 folder as wincrt32.exe and adds the following registry entries to run itself on system restart:

HKLM\Software\Microsoft\Windows\CurrentVersion\Run\Config Loader
HKLM\Software\Microsoft\Windows\CurrentVersion\RunServices\Config Loader

W32/Agobot-AW collects system information and registration keys of popular games that are installed on the computer.

W32/Agobot-AW attempts to terminate various processes related to anti-virus and security software (e.g. SWEEP95.EXE, BLACKICE.EXE and ZONEALARM.EXE).

http://www.sophos.com/virusinfo/analyses/w32agobotaw.html

Discussion is locked