This is a classical backdoor and allows a ‘master’ to control the victim machine remotely by sending commands via IRC channels.
Agobot copies itself into the Windows directory under random names and then registers itself in the system registry auto-run keys:
Agobot connects to various IRC servers opening channels identified in the body of the worm. It is then ready to receive commands from the ‘master’, who can now download and launch files on the victim machine, scan other computers for vulnerabilities and install itself on these vulnerable machines.
|Find out the statistics of the threats spreading in your region|