Virus Encyclopedia
Welcome to the Virus Encyclopedia of Panda Security.
Conficker.C | |
Threat Level Damage Distribution |
Brief Description | |
Conficker.C is a worm which exploits a vulnerability in the Windows Server Service which allows remote code execution. It is the vulnerability MS08-067. If the system date is after January 1, 2009, it will try to connect to a certain website in order to download and run another type of malware in the affected computer. On the one hand, it reduces considerably the protection level of the computer, as it prevents the user and the computer from connecting to many websites related to antivirus companies. On the other, it uses weak passwords to access the user accounts in order to modify their security policies. Conficker.C spreads by exploiting the vulnerability MS08-067. In order to do so, it sends malformed RPC requests to other computers in which it attempts to enter a copy of itself. Additionally, it spreads through shared and removable drives.
It is highly recommended to download and apply the security patch for the vulnerability MS08-067. Access the web page for downloading the patch. |
Visible Symptoms | |
Conficker.C is difficult to recognize, as it does not display any messages or warnings that indicate it has reached the computer. >>> |
Effects |
Conficker.C is designed to spread by exploiting a vulnerability in the Windows Server Service which allows remote code execution. It is the vulnerability MS08-067. Additionally, Conficker.C carries out the following actions:
|
Conficker.C creates a random DLL in the Windows system directory. This file is created with system, read-only and hidden attributes.
It also creates a file with random name and VMX extension in the folder RECYCLER\%random name% of all the shared and removable drives of the computer. It is copied with system, read-only and hidden attributes. Additionally, it creates an AUTORUN.INF file in these drives. This way, it is run whenever any of them is accessed.
On the other hand, it creates a scheduled task in the folder Tasks of the Windows directory in order to start its execution periodically.
Conficker.C creates the following entries in the Windows Registry:
Conficker.C modifies the following entries from the Windows Registry in order to make its detection more difficult:
Conficker.C spreads by exploiting the vulnerability called MS08-067, which is a vulnerability in the Windows server service. In order to do so, it sends malformed RPC requests to other computers. If any of them is vulnerable, it will download a copy of the worm to the system.
Additionally, Conficker.C also spreads through the system drives, both shared and removable, making copies of itself in them. It also creates an AUTORUN.INF file in order to be run whenever any of them is accessed.