The backdoor provides networking with the following hosts:
In response, the backdoor receives the following commands from an attacker:
TSUNAMI UNKNOWN NICK SERVER GETSPOOFS SPOOFS DISABLE ENABLE KILL VERSION KILLALL HELP IRC SH PAN MOVE UDP GET
Depending on the command, the backdoor can perform the following actions:
Thus, the backdoor provides an attacker with full access to an infected computer, which becomes a part of a botnet.