TIP: Click on subject to list as thread! ANSI
echo: dirty_dozen
to: ALL
from: KURT WISMER
date: 2004-07-18 18:35:00
subject: News, July 18 2004

[cut-n-paste from sophos.com]

W32/Agobot-KW

Type
Win32 worm

Detection
Sophos has received several reports of this worm from the wild.

Description
W32/Agobot-KW is a network worm which spreads by copying itself to 
computers protected by weak passwords and via IRC channels. The worm 
also allows unauthorised remote access to the computer via a network.

W32/Agobot-KW copies itself to the Windows system folder as svchosts.exe 
and adds entries to the registry at the following locations to run 
itself on system logon:

HKLM\Software\Microsoft\Windows\CurrentVersion\Run\WindowsConfig =
\svchosts.exe
HKLM\Software\Microsoft\Windows\CurrentVersion\RunServices\WindowsConfig 
= 
* Origin: Try Our Web Based QWK: DOCSPLACE.ORG (1:123/140)
SEEN-BY: 633/267 270
@PATH: 123/140 500 106/2000 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.