The Phatbot Trojan can be controlled by an attacker on
a remote site (using a p2p protocol). The Trojan has a
large set of commands which can be executed. A few
of these commands include: stealing CD keys, running
a command using system(..), displaying system information,
executing file from an ftp url and killing a process
[5].