Threat Encyclopedia

Selected viruses, spyware, and other threats: sorted alphabetically


You can download the removal tool here .
Short description
Win32/Conficker.A is a worm that spreads by exploiting a vulnerability in Server Service . The file is run-time compressed using UPX .
When executed, the worm copies itself in the %system% folder using the following name:
  • %variable%.dll
A string with variable content is used instead of %variable% .

The library %variable%.dll is loaded and injected into the following process:
  • services.exe
The worm registers itself as a system service using the following filename:
  • netsvcs
In order to be executed on every system start, the worm sets the following Registry entries:
  • [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\%random
    service name%\Parameters]
    "ServiceDll" = "%system%\%variable%.dll"
  • [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\%random
    service name%]
    "Image Path" = "%System Root%\system32\svchost.exe -k netsvcs"
A string with variable content is used instead of %random service name% .
The worm starts a HTTP server on a random port.

It connects to remote machines to port TCP 445 in attempt to exploit the Server Service vulnerability.

If successful, the remote computer may attempt to connect to the infected computer and download the copy of the worm .

This vulnerability is described in Microsoft Security Bulletin MS08-067 .
Other information
If the current system date and time matches the condition the worm will attempt to download several files from the Internet.

The files are then executed. The worm contains a list of (1) URLs.

The following services are disabled:
  • Windows Firewall