Eng
  1. Skip to navigation
  2. Skip to content
  3. Skip to sidebar


Agobot.VS


Aliases:


Agobot.VS
Agobot.VS
Backdoor.Agobot.VS, W32.HLLW.Gaobot, Gaobot, Win32/Gaobot
Phatbot, Phat

Malware

W32

Summary

The Agobot.VS variant was found on October 27th, 2004. We received several reports about it from the field. This backdoor is functionality similar to previous Agobot variants.



Disinfection & Removal

Automatic Disinfection

Allow F-Secure Anti-Virus to disinfect the relevant files.

For more general information on disinfection, please see Removal Instructions.



Technical Details


Security Updates

The most important step of disinfection is the installation of security patches for the vulnerabilities exploited by Agobot.

Detailed information and patches are available from the following pages:


Automatic Disinfection

Allow F-Secure Anti-Virus to disinfect the relevant files.For more general information on disinfection, please see Removal Instructions.


Network Disinfection

For general instructions on disinfecting a local network infection, please see Eliminating A Local Network Outbreak.


Manual Disinfection

Caution: Manual disinfection is a risky process; it is recommended only for advanced users.

Manual disinfection of this Agobot variant requires killing the backdoor's process in memory and deletion of the infected file from Windows System folder.

The file name is 'winl0g0n.exe'. There are zeroes instead of 'o' letters in the file name: do not confuse this file with a Windows component named 'winlogon.exe'!



Detection

F-Secure Anti-Virus detects this backdoor as 'Backdoor.Agobot.VS' with the following updates:

Detection Type: PC
Database: 2004-10-27_05



Description Created: Alexey Podrezov; October 27th, 2004



Submit a sample




Wondering if a file or URL is malicious? Submit a sample to our Lab for analysis via the Sample Analysis System (SAS)

Give And Get Advice




Give advice. Get advice. Share the knowledge on our free discussion forum.