A remote administration utility which bypasses normal security mechanisms to secretly control a program, computer or network.
Once detected, the F-Secure security product will automatically disinfect the suspect file by either deleting it or renaming it.
Detailed instructions for F-Secure security products are available in the documentation found in the Downloads section of our Home - Global site.
You may also refer to the Knowledge Base on the F-Secure Community site for further assistance.
Backdoor:W32/Agent.AMB is a malicious program that allows an attacker to remotely download and execute files on the infected computer. The backdoor may also be used to force the computer to perform Denial of Service (DoS) attacks.
It drops its main executable in Windows System directory using any of the following filenames:
Agent.AMB also drops the following file:
- %temp%\rs.bat - A batch file used to delete the executed copy of the backdoor.
It installs itself as a service using any of the following service names:
- Windows Firewall
Agent.AMB connects to a remote site and awaits for commands from a remote hacker.
It may also perform DoS attacks on certain websites and download other malware from the Internet.
Some variants of this backdoor may drop copies of its executable file (using random filenames) to the following locations:
- %Program Files%\Common Files\Microsoft Shared\
- %Program Files%\Windows Media Player\
- %Program Files%\Internet Explorer\Connection Wizard\
Other variants also drop the configuration file, Autorun.inf, together with the main executable. If the Windows Autorun function is enabled in the system, the Autorun.inf file is used to automatically run the backdoor upon opening a drive or inserting a removable device into the machine.