Virus type: Worm
This memory-resident malware has both worm and backdoor capabilities.
Like the earlier AGOBOT variants, it takes advantage of the following Windows vulnerabilities to propagate across networks:
Remote Procedure Call (RPC) Distributed Component Object Model (DCOM) Vulnerability
RPC Locator Vulnerability
IIS5/WEBDAV Buffer Overflow Vulnerability
For more information about these Windows vulnerabilities, please refer to the following Microsoft Web pages:
Microsoft Security Bulletin MS03-026
Microsoft Security Bulletin MS03-001
Microsoft Security Bulletin MS03-007
It drops itself as the file WINDNS32.EXE in the Windows system folder and attempts to log into systems using a long list of user names and passwords.
Meet the drop-resistant Moto Z2 Force
The Moto Z2 Force is really thin, with a fast processor and great battery life. It can survive drops without shattering.