Welcome to the Virus Encyclopedia of Panda Security.
It connects to an IRC server and waits for remote control commands to be performed on the affected computer. On demand, it can spread via AOL Instant Messenger.
|First detected on:||June 28, 2005|
|Detection updated on:||June 28, 2005|
Oscarbot.AY is a worm with backdoor characteristics that connects to the IRC server b0dy3r.q8hell.org, joins a certain channel and waits for remote control commands to be carried out on the affected computer. These control commands include downloading and running files, update its own code and delete itself, for example.
Additionally, in order to carry out some of its actions, Oscarbot.AY installs the hacking tool detected as Rootkit.C.
Though Oscarbot.AY does not spread automatically by itself, it can be instructed to use AOL Instant Messenger in order to send messages to all the addresses in the Contact List.>
Oscarbot.AY is difficult to recognize, as it does not display any messages or warnings that indicate it has reached the computer.