Worm.Conficker

ThreatDown is now the name of the Malwarebytes line of business products. References to Malwarebytes below reflect the amazing technology used to first identify the threat.

Short bio

Worm.Conficker is Malwarebytes’ detection name for a family of worms that exploit a vulnerability in older Windows versions.

Type of infection

Worm.Conficker tries to exploit a vulnerability in the Windows server service. This vulnerability can lead to remote code execution if an affected system received a specially crafted remote procedure call (RPC) request. This could allow an attacker to exploit this vulnerability without authentication to run arbitrary code on unpatched versions of systems running Windows 2000 Service Pack (SP) 4, Windows XP SP2 and SP3, Windows Server 2003 SP1 and SP2, Vista Gold SP1, Windows Server 2008 and Windows 7 systems.

Malicious behavior

Network monitoring may reveal crafted RPC requests that are trying to trigger a buffer overflow.

Protection

Malwarebytes blocks Worm.Conficker

Home remediation

You can use the Malwarebytes Anti-Malware Nebula console to scan endpoints.

Nebula endpoint tasks menu

Choose the Scan + Quarantine option. Afterwards you can check the Detections page to see which threats were found.

On the Quarantine page you can see which threats were quarantined and restore them if necessary.

Associated threats

  • Worm.Conficker.H
  • Worm.Conficker.Generic