Threat Database Worms IRC-Worm.Fagot

IRC-Worm.Fagot

By LoneStar in Worms

Threat Scorecard

Popularity Rank: 12,655
Threat Level: 50 % (Medium)
Infected Computers: 1,129
First Seen: December 8, 2011
Last Seen: October 6, 2025
OS(es) Affected: Windows

IRC-Worm.Fagot is a malignant computer worm, which circulates in IRC networks via vulnerable versions of mIRC chat application. IRC-Worm.Fagot sets its files on the affected computer's hard drive and runs there a process, which modifies Windows Media Player and tries to close all detected anti-virus programs. IRC-Worm.Fagot also changes default start page in Internet Explorer web browser and deletes numerous critical system files, substituting some of them with its malicious files. IRC-Worm.Fagot can cause Windows crashes and loss of data. IRC-Worm.Fagot conceals itself from the victims and stays resident in the system background. Get rid of IRC-Worm.Fagot as soon as possible.

File System Details

IRC-Worm.Fagot may create the following file(s):
# File Name Detections
1. patch_unpacked.exe
2. patch.exe

Analysis Report

General information

Family Name: Worm.Wootbot.B
Signature status: No Signature

Known Samples

MD5: ae26232a4e5ce4e204a274d740c4a33e
SHA1: c9f58e21a0f7a1c65fabb7e636f52d8c48549771
SHA256: 80B84297B9A0470A278BD551962794104FB665B2073E4361A667319F9A1ED03C
File Size: 2.19 MB, 2193527 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have relocations information
  • File doesn't have security information
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
  • File is not packed
Show More
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

File Traits

  • big overlay
  • Installer Manifest
  • No Version Info
  • x86

Block Information

Total Blocks: 343
Potentially Malicious Blocks: 0
Whitelisted Blocks: 333
Unknown Blocks: 10

Visual Map

0 0 ? 0 0 0 0 0 0 0 ? ? ? 0 ? 1 0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 0 0 0 0 0 ? 0 0 0 0 0 0 ? 0 0 0 0 0 0 1 0 0 0 1 0 0 0 0 0 1 0 0 0 0 0 0 1 0 0 0 0 1 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 1 1 0 0 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Files Modified

File Attributes
c:\users\user\appdata\local\temp\ext22d0.tmp Generic Write,Read Attributes
c:\users\user\appdata\local\temp\ext22d1.tmp Generic Write,Read Attributes
c:\users\user\appdata\local\temp\ext22e2.tmp Generic Write,Read Attributes
c:\users\user\appdata\local\temp\spi22b0.tmp Generic Write,Read Attributes
c:\users\user\appdata\local\temp\spi22b0.tmp\setup.bmp Generic Write,Read Attributes
c:\users\user\appdata\local\temp\spi22b0.tmp\setup.dat Generic Write,Read Attributes
c:\users\user\appdata\local\temp\spi22b0.tmp\setup.lic Generic Write,Read Attributes

Windows API Usage

Category API
Anti Debug
  • IsDebuggerPresent
User Data Access
  • GetUserObjectInformation

Trending

Most Viewed

Loading...