Welcome to the Virus Encyclopedia of Panda Security.
It connects to several IRC servers and waits for remote control commands to carry out on the affected computer. It exploits the vulnerabilities LSASS and RPC DCOM, among others, in order to spread to as many computers as possible.
|First detected on:||Sept. 14, 2005|
|Detection updated on:||Sept. 20, 2005|
|Yes, using TruPrevent Technologies
Sdbot.FAH is a worm that connects to several IRC servers in order to receive remote control commands, acting as a backdoor. It can be instructed to download and run files, log the keystrokes typed by the user, execute commands, etc.
Additionally, Sdbot.FAH installs its own FTP (File Transfer Protocol) server on the affected computer in order to spread to other systems.
Sdbot.FAH exploits the vulnerabilities LSASS, RPC DCOM, SQL Server Resolution Service and Vulnerability in ASN.1 Library in Microsoft products, and a vulnerability in IMAIL Server from Ipswitch, to spread across the Internet.
It is highly recommendable to download the security patches for the vulnerabilities LSASS, RPC DCOM, SQL Server Resolution Service, Vulnerability in ASN.1 Library and IMAIL Server from the companies' official websites.
Sdbot.FAH is difficult to recognize, as it does not display any messages or warnings that indicate it has reached the computer.