Thank you for being a valued part of the CNET community. As of December 1, 2020, the forums are in read-only format. In early 2021, CNET Forums will no longer be available. We are grateful for the participation and advice you have provided to one another over the years.

Thanks,

CNET Support

General discussion

W32/Agobot-DQ

Mar 8, 2004 11:23PM PST

Aliases
Backdoor.Agobot.3.gen, W32/Gaobot.worm.gen.d

Type
Win32 worm

Description
W32/Agobot-DQ is a network worm which also allows unauthorised remote access to the computer via IRC channels.
W32/Agobot-DQ tries to copy itself to network shares with weak passwords.

W32/Agobot-DQ copies itself to the Windows system folder as FILENAME.EXE and creates entries in the registry at the following locations to run itself on system restart:

HKLM\Software\Microsoft\Windows\CurrentVersion\Run\
Configuration Loader

HKLM\Software\Microsoft\Windows\CurrentVersion\RunServices\
Configuration Loader

The worm disables the shares C$, D$, ADMIN$ and IPC$.


Read more: http://www.sophos.com/virusinfo/analyses/w32agobotdq.html

Discussion is locked