Welcome to the Virus Encyclopedia of Panda Security.
It joins an IRC channel in order to receive control commands, such as launching denial of service attacks against websites.
|First detected on:||June 22, 2004|
|Detection updated on:||June 22, 2004|
|Yes, using TruPrevent Technologies
Sdbot.AEL is a worm with backdoor characteristics, which allows hackers to gain remote access to the affected computer in order to carry out actions that compromise user confidentiality and impede the tasks performed.
Sdbot.AEL uses its own IRC client in order to join an IRC channel and accept remote control commands, such as launching denial of service (DoS) attacks against websites. It can also download and run files on the affected computer.
Sdbot.AEL spreads across computer networks. In order to do so, it checks if the affected computer belongs to a network. If so, it attempts to access the network shared resources, using passwords that are typical or easy to guess. Then, it makes a copy of itself to those shared resources.
Sdbot.AEL is difficult to recognize, as it does not show any messages or warnings that indicate it has reached a computer.