Malware type: Worm

Aliases: W32.Spybot.Worm (Symantec), HEUR/Crypted (Avira),

In the wild: No

Destructive: No

Language: English

Platform: Windows NT, 2000, XP

Encrypted: No

Overall risk rating:

Reported infections:

Damage potential:


Distribution potential:



This worm exploits certain vulnerabilities to propagate across networks. It takes advantage of the following Windows vulnerabilities:

  • Remote Procedure Call (RPC) Distributed Component Object Model (DCOM) vulnerability
  • IIS5/WEBDAV Buffer Overflow vulnerability
  • RPC Locator Vulnerability

For more information about these Windows vulnerabilities, please refer to the following Microsoft Web pages:

It attempts to log into systems using a list of user names and passwords. This worm then drops a copy of itself in accessed machines.

This worm steals CD keys of certain game applications. It also has backdoor capabilities and may execute remote commands in the host machine.

It runs on Windows NT, 2000 and XP.

For additional information about this threat, see:

Description created: Jun. 24, 2004 1:34:56 AM GMT -0800


Size of malware: 93,184 Bytes

Initial samples received on: Jun 24, 2004

Installation and Autostart Technique

Upon execution, this worm drops a copy of itself as the following files in the Windows system folder:


(Note: The Windows system folder is usually C:\WINNT\System32 on Windows 2000 and NT, and C:\Windows\System32 on Windows XP.)

It adds any of the following registry entries, which enable this malware to run automatically at every system startup:

NVIDIA Video Drivers = "video_32D.exe"

NVIDIA Video Drivers = "video_32D.exe"

NVIDIA Video Drivers = "video_32D.exe"

It then deletes all files that start with the string regs, including its dropped file.

Network Share Propagation

This worm attempts to propagate to the following folders in the network:

  • c$
  • d$
  • e$
  • admin$
  • print$

If these folders have full access rights, it attempts to copy itself to these network shares. However, if these shared folders have restricted access rights, the worm attempts force its way into the system by logging in using the following user names and passwords:

User names:

  • adm
  • administrador
  • administrat
  • administrateur
  • administrator
  • admins
  • computer
  • database
  • db2
  • dba
  • default
  • guest
  • oracle
  • owner
  • staff
  • student
  • teacher
  • wwwadmin


  • 007
  • 1
  • 12
  • 123
  • 1234
  • 12345
  • 123456
  • 1234567
  • 12345678
  • 123456789
  • 1234567890
  • 2000
  • 2001
  • 2002
  • 2003
  • 2004
  • access
  • accounting
  • accounts
  • asd
  • backup
  • bill
  • bitch
  • blank
  • bob
  • brian
  • changeme
  • chris
  • cisco
  • compaq
  • control
  • data
  • databasepass
  • databasepassword
  • db1
  • db1234
  • dbpass
  • dbpassword
  • dell
  • demo
  • domain
  • domainpass
  • domainpassword
  • eric
  • exchange
  • fred
  • fuck
  • george
  • god
  • hell
  • hello
  • home
  • homeuser
  • hp
  • ian
  • ibm
  • internet
  • intranet
  • jen
  • joe
  • john
  • kate
  • katie
  • lan
  • lee
  • linux
  • login
  • loginpass
  • luke
  • mail
  • main
  • mary
  • mike
  • neil
  • nokia
  • none
  • null
  • oem
  • oeminstall
  • oemuser
  • office
  • orainstall
  • outlook
  • pass
  • pass1234
  • passwd
  • password1
  • peter
  • pwd
  • qaz
  • qwe
  • qwerty
  • sam
  • sex
  • siemens
  • slut
  • sql
  • sqlpassoainstall
  • sue
  • susan
  • system
  • technical
  • test
  • unix
  • user
  • web
  • win2000
  • win2k
  • win98
  • windows
  • winnt
  • winpass
  • winxp
  • www
  • xp
  • zxc


This worm takes advantage of the Remote Procedure Call (RPC) Distributed Component Object Model (DCOM) vulnerability present on Windows XP systems, which allows an attacker to gain full access and execute any code on a target machine, leaving it compromised.

Read more on this vulnerability from the following link:

This worm looks for vulnerable Windows XP machines on the network by scanning for random TCP/IP addresses on port 135.

It further uses the RPC Locator vulnerability which affects Windows NT systems and searches for vulnerable Windows NT machines on the network by incrementally scanning TCP/IP addresses on port 445.

More information on this vulnerability is available from the following Microsoft page:

This worm also exploits the IIS5/WEBDAV buffer overrun exploit affecting Windows NT platforms, which enables arbitrary codes to execute on the server.

The following link offers more information from Microsoft about this vulnerability:

Backdoor Capabilities

This worm also has backdoor capabilities. It acts as a server program controlled by an IRC (Internet Relay Chat) Bot. To do this, the worm connects to a the IRC server rxs.parited.net and joins the channel #.agobs..

Once connected, this IRC Bot is capable of sending commands to the server program. These commands are used to control the target system and the behavior of the bot. These commands are basically categorized as the bot, command manager, Cvar, IRC, redirect, and download commands.

With the IRC console, the bot inputs the commands to the console and waits for information from the server.

The Bot commands used by the bot to controls the malware server program include the following:

  • Assign a new random nickname to the bot
  • Cause the bot to display its status
  • Cause the bot to display system information
  • Cause the bot to quit IRC and terminate itself
  • Change the nickname of the bot
  • Completely remove the bot from the system
  • Display the bot version or ID
  • Display the information about the bot
  • Make the bot execute a .EXE file
  • Open any file that is a registered file type
  • Remove a bot using a specific bot ID
  • Repeat a command for a specified number of times
  • Resolve IP/Hostname by DNS
  • Terminate the bot

The bot to control the commands is using the Command Manager. For this Agobot version, it only has a command to display the list of commands this malware has.

Cvars are IRC default variables that allow channel creators to change user settings. CVAR commands used by the bot to control the IRC Cvar include the following:

  • List Cvars
  • Display the value of a Cvar
  • Set the value of a CvarT

The IRC commands used by the bot to control the behavior of the IRC application include the following:

  • Cause the bot to display network information
  • Disconnect the bot from IRC
  • Make the bot change IRC modes
  • Make the bot change the server Cvars
  • Make the bot join an IRC channel
  • Make the bot part an IRC channel
  • Make the bot quit from IRC
  • Make the bot reconnect to IRC
  • Make the bot reply the network information if the hostname contains the string ".edu"
  • Make the bot reply to the network information if the hostname contains a specified string
  • Make the bot send a raw string to the IRC server
  • Make the bot send an action message to the channel
  • Send a private message to the target

The following Mac commands are used by the bot to connect to its server component using a bot user:

  • Log in a user to the bot
  • Log out a user from the bot

The following Redirect commands are used by the bot to control the traffic that passes to the infected system:

  • Redirect a TCP port to another host
  • Redirect GRE traffic that results to proxy PPTP VPN connections
  • Stop all redirects

The following Downloader commands are used by the bot to download and execute files from a specific protocol:

  • Make the bot download a file from an FTP site to a specified local folder
  • Make the bot download and execute a file from an FTP site on a specified local folder
  • Make the bot download a file from FTP to a specified local folder and update it if the files are different
  • Make the bot download a file from HTTP site to a specified local folder
  • Make the bot download and execute a file from HTTP site on a specified local folder
  • Make the bot download a file from HTTP to a specified local folder and update it if the files are different

This malware may also perform the following commands:

  • Obtain Email addresses from the Windows Address book
  • Add/Remove entries in the Windows registry

Information Theft

This worm steals AOL screen names and CD keys of the following games:

  • Battlefield 1942
  • Battlefield 1942: Secret Weapons Of WWII
  • Battlefield 1942: The Road To Rome
  • Battlefield 1942: Vietnam
  • Black and White
  • Command and Conquer: Generals
  • Command and Conquer: Generals: Zero Hour
  • Command and Conquer: Red Alert2
  • Command and Conquer: Tiberian Sun
  • Counter-Strike
  • FIFA 2002
  • FIFA 2003
  • Freedom Force
  • Global Operations
  • Gunman Chronicles
  • Half-Life
  • Hidden and Dangerous 2
  • IGI2: Covert Strike
  • Industry Giant 2
  • James Bond 007 Nightfire
  • Medal of Honor: Allied Assault
  • Medal of Honor: Allied Assault: Breakthrough
  • Medal of Honor: Allied Assault: Spearhead
  • Nascar Racing 2002
  • Nascar Racing 2003
  • Need For Speed: Hot Pursuit 2
  • Need For Speed: Underground
  • Neverwinter Nights
  • NHL 2002
  • NHL 2003
  • Ravenshield
  • Shogun: Total War: Warlord Edition
  • Soldier of Fortune II - Double Helix
  • Soldiers Of Anarchy
  • The Gladiators
  • Unreal Tournament 2003
  • Unreal Tournament 2004

Other Details

This worm is able to remove the following default shared folders:

  • C$
  • ADMIN$
  • IPC$

Analysis by: Imelda Yap

Revision History:

First pattern file version: 4.658.10
First pattern file release date: Aug 18, 2007


Minimum scan engine version needed: 6.810

Pattern file needed: 7.351.00

Pattern release date: Jul 30, 2010

Important note: The "Minimum scan engine" refers to the earliest Trend Micro scan engine version guaranteed to detect this threat. However, Trend Micro strongly recommends that you update to the latest version in order to get comprehensive protection. Download the latest scan engine here.


Terminating the Malware Program

This procedure terminates the running malware process.

  1. Open Windows Task Manager.
    � On Windows 95, 98, and ME, press
    � On Windows NT, 2000, and XP, press
    CTRL%20SHIFT%20ESC, then click the Processes tab.
  2. In the list of running programs*, locate the process:
  3. Select the malware process, then press either the End Task or the End Process button, depending on the version of Windows on your system.
  4. To check if the malware process has been terminated, close Task Manager, and then open it again.
  5. Close Task Manager.

*NOTE: On systems running Windows 95, 98, and ME, Windows Task Manager may not show certain processes. You can use a third party process viewer such as Process Explorer to terminate the malware process. Otherwise, continue with the next procedure, noting additional instructions.

Removing Autostart Entries from the Registry

Removing autostart entries from the registry prevents the malware from executing during startup.

To remove the malware autostart entries:

  1. Open Registry Editor. To do this, click Start>Run, type Regedit, then press Enter.
  2. In the left panel, double-click the following:
  3. In the right panel, locate and delete the entry:
    NVIDIA Video Drivers = �video_32D.exe�
  4. In the left panel, double-click the following:
  5. In the right panel, locate and delete the entry or entries:
    NVIDIA Video Drivers = �video_32D.exe�
  6. In the left panel, double-click the following:
  7. In the right panel, locate and delete the entry or entries:
    NVIDIA Video Drivers = �video_32D.exe�
  8. Close Registry Editor.
NOTE: If you were not able to terminate the malware process from memory as described in the previous procedure, restart your system.

Additional Windows XP Cleaning Instructions

Running Trend Micro Antivirus

Scan your system with Trend Micro antivirus and clean all files detected as WORM_AGOBOT.KV. To do this, Trend Micro customers must download the latest pattern file and scan their system. Other Internet users can use HouseCall, Trend Micro�s free online virus scanner.

Applying Patches

This malware exploits known vulnerabilities affecting the Windows NT platforms. Download and install the following to patch your system.

Refrain from using the affected software until the appropriate patch has been installed.

Trend Micro offers best-of-breed antivirus and content-security solutions for your corporate network, small and medium business, mobile device or home PC.