Welcome to the Virus Encyclopedia of Panda Security.
It uses the LSASS, RPC DCOM and IIS5SSL vulnerabilities, among other means, in order to spread to as many computers as possible. It logs keystrokes, obtains confidential information on the affected computer, runs files, etc.
|First detected on:||Feb. 15, 2005|
|Detection updated on:||Feb. 15, 2005|
|Yes, using TruPrevent Technologies
Gaobot.DAC is a worm with backdoor characteristics that allows hackers to gain remote control over the affected computer and carry out actions such as command execution, download and execute files, log keystrokes, obtain different information on the computer, launch distributed denial of service (DDoS) attacks, etc.
Gaobot.DAC uses different means to spread:
It makes copies of itself in the shared network resources it accesses to.
It exploits the LSASS, RPC DCOM and IIS5SSL vulnerabilities to spread across the Internet.
It is highly recommendable to download the security patches for the LSASS, RPC DCOM and IIS5SSL vulnerabilities from the Microsoft website.
Gaobot.DAC is difficult to recognize, as it does not display any messages or warnings that indicate it has reached the computer.