The Agobot.VS variant was found on October 27th, 2004. We received several reports about it from the field. This backdoor is functionality similar to previous Agobot variants.
Disinfection & Removal
The most important step of disinfection is the installation of security patches for the vulnerabilities exploited by Agobot.
Detailed information and patches are available from the following pages:
- RPC/DCOM (MS03-026, fixed by MS03-039): http://www.microsoft.com/technet/security/bulletin/MS03-039.mspx
- RPC/Locator (MS03-001): http://www.microsoft.com/technet/security/bulletin/MS03-001.mspx
- WebDAV (MS03-007): http://www.microsoft.com/technet/security/bulletin/MS03-007.mspx
- LSASS (MS04-011): http://www.microsoft.com/technet/security/bulletin/MS04-011.mspx
Allow F-Secure Anti-Virus to disinfect the relevant files.For more general information on disinfection, please see Removal Instructions.
For general instructions on disinfecting a local network infection, please see Eliminating A Local Network Outbreak.
Caution: Manual disinfection is a risky process; it is recommended only for advanced users.
Manual disinfection of this Agobot variant requires killing the backdoor's process in memory and deletion of the infected file from Windows System folder.
The file name is 'winl0g0n.exe'. There are zeroes instead of 'o' letters in the file name: do not confuse this file with a Windows component named 'winlogon.exe'!
F-Secure Anti-Virus detects this backdoor as 'Backdoor.Agobot.VS' with the following
Detection Type: PC
Description Created: Alexey Podrezov; October 27th, 2004