Description:
This memory-resident malware has both worm and backdoor capabilities.
It exploits certain vulnerabilities to propagate across networks. Like the earlier AGOBOT variants, it takes advantage of the following Windows vulnerabilities:
Remote Procedure Call (RPC) Distributed Component Object Model (DCOM) vulnerability
IIS5/WEBDAV Buffer Overflow vulnerability
RPC Locator vulnerability
For more information about these Windows vulnerabilities, please refer to the following Microsoft Web pages:
Microsoft Security Bulletin MS03-026
Microsoft Security Bulletin MS03-001
Microsoft Security Bulletin MS03-007
It drops itself as the file EXPLORE.EXE in the Windows system folder. It attempts to log into systems using a list of user names and passwords.
It opens port 6667 and tries to connect to an Internet Relay Chat (IRC) server.It then listens for commands from the bot through an IRC channel. Upon establishing connection, this malware allows a remote user to execute malicious commands on the infected system.
It also terminates antivirus-related processes and steals CD keys of certain game applications.
This malware is compressed using Aspack and UPX.
It runs on Windows NT, 2000 and XP.
http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_AGOBOT.AL

Chowhound
Comic Vine
GameFAQs
GameSpot
Giant Bomb
TechRepublic