|W32.Gaobot.YC is a variant of W32.HLLW.Gaobot.gen that attempts to spread to network shares and allows access to an infected computer through an IRC channel.
The worm uses multiple vulnerabilities to spread.
Allows unauthorized remote access.
Steals CD keys of several popular computer games.
Ends processes belonging to antivirus and firewall software.
Accounts with weak passwords; systems not patched against the DCOM RPC vulnerability or the RPC locator vulnerability.
Copies itself as %System%\svhst.exe.
Adds the value: "Configuration Loader" = "svhst.exe"
to the registry keys:
Connects to a predefined IRC channel, using its own IRC client, and listens for the commands from an attacker.
Copies itself to any systems it compromised using the previously mentioned exploits.
Drops Backdoor.Gaobot to the compromised network shares, and then executes it.
Attempts to kill some processes associated with other worms:
dllhost.exe; msblast.exe; mspatch.exe; penis32.exe; tftpd.exe; winhlpp32.exe; winppr32.exe
Listens on randomly calculated ports (within the range of 1000, and one from above 10000) and waits for other computers to download the worm.
Use antivirus (also check How To Remove section)Startup Optimizer to remove it from startup.