This thesis analyzes the Rxbot malware. Rxbot is a win32 bot that belongs to the Agobot family. The analysis includes a static code analysis of Rxbot's source code to understand its modularity and configuration. A dynamic analysis examines Rxbot's process-level and network-level behaviors when built and executed. The analysis also describes tricks used by botmasters to evade detection. Finally, the thesis proposes future work analyzing botnets using honeypots.