The backdoor provides networking with the following hosts:
In response, the backdoor receives next commands from an attacker:
TSUNAMI UNKNOWN NICK SERVER GETSPOOFS SPOOFS DISABLE ENABLE KILL VERSION KILLALL HELP IRC SH PAN MOVE UDP GET
Depending on command backdoor can perform the following actions:
Thus backdoor provides an attacker a full access to an infected computer, which becomes a part of a botnet.