Tech moves fast! Stay ahead of the curve with Techopedia!
Join nearly 200,000 subscribers who receive actionable tech insights from Techopedia.
After a computer is infected with GTbot, the trojan runs a stealth mIRC client without the user's knowledge. The attacker can then gain information about the infected computer, as well as use the infected computer to launch a denial-of-service (DoS) attack.
Popular files names for GTbot are as follows: temp.exe, miri.inc, script.inl, temp.scr and WHVLXD.DAT.