The Web    Google
1/11: Agobot-OV Worm Connects to IRC Server

1/11: Agobot-OV Worm Connects to IRC Server
January 11, 2005

W32/Agobot-OV is a network worm with IRC backdoor functionality. Once installed, W32/Agobot-OV connects to a preconfigured IRC server, joins a channel and awaits further instructions. These instructions can cause the bot to perform any of the following actions:

start a UDP, TCP, ICMP, syn, http or ping flood
start a socks4, socks5, http or https proxy server
redirect TCP or GRE connections
start an FTP server
start a command shell server
show statistics about the infected system
reboot/shutdown the infected machine
kill anti-virus and security processes
list/terminate running processes
scan randomly- or sequentially-chosen IPs for infectable machines
make local drives network-shareable
close down vulnerable services in order to secure the machine
search for product keys
search local drives for AOL user details
sniff network traffic in order to find passwords
start a keylogger
download and install an updated version of itself
install bot plugins for additional functionality

The worm spreads to machines affected by known vulnerabilities, running network services protected by weak passwords or infected by common backdoor Trojans.

W32/Agobot-OV adds (loopback) entries to the Windows HOSTS file in order to prevent access to the security-related websites.

More information can be found at Sophos page.

  • Look Out For 3-Headed Plexus Worm
  • 11/4: Rbot-OX Worm Has IRC Functions
  • 11/23: Backdoor.Sdbot.AH a Network-Aware Worm
  • Sasser Worm Spreading Rapidly
  • 7/23: Dluca-CQ an Adware Application
  • Network Security Management Market Heats Up
  • 9/21: Sdbot-PK Worm Scans for Vulnerabilties
  • 2/11: Rbot-VT Worm Has Backdoor Ability
  • MS Patches 'Moderate' DirectX Flaw
  • Palyh and Fizzer Top Troublemakers in May
  • Making Outlook Less Insecure
  • Buy Security Camera