Agobot botnet
#Agobot botnet install#
It has rather odd characteristics for a virus, with the unique ability to download and install random files (perhaps to create more sharers) from its members, such as music, pornography, and even full games. It is a malicious computer worm that tends to come from the P2P network Ares, installing from its virus form, Ares.exe. Names and such can be added via the XML files to produce variable shuffle imports. Generally, it has been observed that every custom modified variant of Agobot features a selection of the above methods as well as some "homebrew" modules, which essentially are released exploits ported to its code. A good example is Telnet or Microsoft's Server Message Block The ability to spread to systems by brute forcing a login.Attempts to hijack common Trojan horses that accept incoming connections via an open port.MS05-039 Plug and Play Remote Buffer Overflow.MS03-026 RPC DCOM Remote Buffer Overflow.The following propagation methods are sub-modules to the port scanning engine: The Agobot may contain other features such as: Port scanner used to find and infect other hosts.
#Agobot botnet update#
An infectious Agobot can vary in size from ~12kbyte to ~500kbyte depending on features, compiler optimizations and binary modifications.Ī module written for one member in the Agobot family can usually be ported with ease to another bot. In fact the majority of modern Agobot strains must be built with Visual Studio due to its reliance on Visual Studio's SDK and Processor Pack. The majority of the development force behind Agobot is targeting the Microsoft Windows platform as a result the vast majority of the variants are not Linux compatible. Agobot now has several thousand variants. Other bots in the Agobot family are Phatbot and Forbot. New versions, or variants, of the worm appeared so rapidly that the Agobot family quickly grew larger than other bot families.