Welcome to the Virus Encyclopedia of Panda Security.
It connects to several IRC servers and waits for remote control commands to carry out on the affected computer. It exploits the vulnerabilities LSASS and RPC DCOM, among others, in order to spread to as many computers as possible.
|First detected on:||Aug. 20, 2005|
|Detection updated on:||Aug. 25, 2005|
|Yes, using TruPrevent Technologies
Sdbot.ESE is a worm that connects to several IRC servers in order to receive remote control commands, acting as a backdoor. It can be instructed to download and run files, launch DoS (Denial of Service) attacks, add or remove shared resources, search for vulnerable computers, etc.
Additionally, Sdbot.ESE installs its own FTP (File Transfer Protocol) and TFTP (Trivial File Transfer Protocol) servers on the affected computer in order to spread to other systems.
Sdbot.ESE exploits the vulnerabilities LSASS, RPC DCOM, Workstation Service, Plug and Play and SQL Server Resolution Service to spread across the Internet.
It is highly recommendable to download the security patches for the vulnerabilities LSASS, RPC DCOM, Workstation Service, Plug and Play and SQL Server Resolution Service from the Microsoft website.
Sdbot.ESE is difficult to recognize, as it does not display any messages or warnings that indicate it has reached the computer.