Results 1 to 9 of 9

Thread: W32.Conficker.worm problem

  1. #1
    Join Date
    Dec 2008
    Posts
    35

    W32.Conficker.worm problem

    Hello All

    MY Pc is Infected with W32.Conficker.worm. Every time I clean or kill it using On Access or On Demand scans it keeps reappearing.and also i am using the latest version Virusscan 8.5.0 Patch 6 and the necessary Microsoft hot fixes. I have noticed that most of the time , the antivirus software do not kill the virus completely it just kills the service or the process. It deletes the instances of the virus in most cases but its keeps popping up. Any can Help Thanks

  2. #2
    Join Date
    May 2008
    Posts
    2,945

    Re: W32.Conficker.worm problem

    Are you using using Vista or XP? If so then you can try disabling System Restore. VirusScan should easily rid you of this. Once a scan is performed and your pc is clean then you can re-enable System Restore.

  3. #3
    Join Date
    Jan 2006
    Posts
    3,792

    Re: W32.Conficker.worm problem

    Worm:Win32/Conficker.A is a worm that infects other computers across a network by exploiting a vulnerability in the Windows Server service (SVCHOST.EXE). If the vulnerability is successfully exploited, it could allow remote code execution when file sharing is enabled.

  4. #4
    Join Date
    Jan 2006
    Posts
    4,221

    Re: W32.Conficker.worm problem

    This is an analysis Report of this Virus

    Technical Information

    Worm:Win32/Conficker.A is a worm that infects other computers across a network by exploiting a vulnerability in the Windows Server service (SVCHOST.EXE). If the vulnerability is successfully exploited, it could allow remote code execution when file sharing is enabled.

    Installation
    This worm searches for the Windows executable 'services.exe' and will inject itself into it.
    This worm copies itself to the Windows system folder as <random>.dll where <random> is a 5-8 character lowercase alphabetic name such as 'nxyme.dll'.

    The worm adjusts the file time of the dropped DLL worm copy to the same as the system's kernel32.dll file time to mask forensic evidence of infection time. The registry is modified to execute the dropped DLL worm copy as a service.

    Adds value: "DisplayName"
    With data: "0"
    To subkey: HKLM\SYSTEM\CurrentControlSet\Services\vcdrlxeu

    Adds value: "ServiceDll"
    With data: "<system folder>\nxyme.dll"
    To subkey: HKLM\SYSTEM\ControlSet001\Services\vcdrlxeu\Parameters

    Once a machine has been infected the worm will patch the exploited function via a simple code hook in order to prevent re-infecting a machine it has already compromised. The worm opens and listens for connection attempts on a randomly chosen port between 1024 and 10000 and bypasses Windows firewall using APIs. The worm also stops the Internet connection sharing service.

    Spreads Via…
    Networked Computers
    Win32/Conficker.A copies itself into memory and begins propagating to random IP addresses across a network by exploiting a vulnerability in the Windows Server service (SVCHOST.EXE). If the vulnerability is successfully exploited, the worm instructs the target computer to download a copy of the worm from the host computer via HTTP protocol using the random port opened by the worm.

    The worm uses the following URLs to determine the computer's geographic location:

    getmyip.org
    getmyip.co.uk
    checkip.dyndns.org

    Win32/Conficker.A avoids infecting Ukrainian located computers.

    Payload
    Creates HTTP Server
    The worm opens a random port between 1024 and 10000 and acts like a web server (HTTP server). If the remote machine is exploited successfully, the victim will connect back to the http server and download a worm copy.

    Resets System Restore Point
    The worm may call an API function to reset the computer's system restore point, potentially defeating recovery using system restore.

    Downloads Files
    If the date is after November 25, 2008, this worm will build a URL in the following format and attempt to download a file from it:

    <random ip?>/search?q=%d&aq=7

    If the date is after December 1, 2008 Win32/Conficker.A will attempt to download a file 'loadadv.exe' from the domain 'trafficconverter.biz'.

  5. #5
    Join Date
    Jan 2006
    Posts
    4,221

    Re: W32.Conficker.worm problem

    Steps

    Take the following steps to help prevent infection on your system:
    1. Enable a firewall on your computer.
    2. Get the latest computer updates for all your installed software, including Security Bulletin MS08-067.
    3. Use up-to-date antivirus software.
    4. Use caution when opening attachments and accepting file transfers.
    5. Use caution when clicking on links to web pages.
    6. Protect yourself against social engineering attacks.
    7. Enable a firewall on your computer
    8. Use a third-party firewall product or turn on the Microsoft Windows Internet Connection Firewall.


    To turn on the Windows Firewall in Windows Vista
    1. Click Start, and click Control Panel.
    2. Click Security.
    3. Click Turn Windows Firewall on or off.
    4. Select On.
    5. Click OK.


    To turn on the Internet Connection Firewall in Windows XP
    1. Click Start, and click Control Panel.
    2. Click Network and Internet Connections. If you do not see Network and Internet Connections, click Switch to Category View.
    3. Click Change Windows Firewall Settings.
    4. Select On.
    5. Click OK.


    Get the latest computer updates
    Updates help protect your computer from viruses, worms, and other threats as they are discovered. It is important to install updates for all the software that is installed in your computer. These are usually available from vendor websites.

    You can use the Automatic Updates feature in Windows to automatically
    1. download future Microsoft security updates while your computer is on and connected to the Internet.
    2. To turn on Automatic Updates in Windows Vista
    3. Click Start, and click Control Panel.
    4. Click System and Maintainance.
    5. Click Windows Updates.
    6. Select a setting. Microsoft recommends selecting Install updates automatically and choose a time that is convenient for you. If you do not choose Automatic, but you choose to be notified when updates are ready, a notification balloon appears when new downloads are available to install. Click the notification balloon to review and install the updates.


    To turn on Automatic Updates in Windows XP
    1. Click Start, and click Control Panel.
    2. Click System.
    3. Click Automatic Updates.
    4. Select a setting. Microsoft recommends selecting Automatic. If you do not choose Automatic, but you choose to be notified when updates are ready, a notification balloon appears when new downloads are available to install. Click the notification balloon to review and install the updates.


    Use up-to-date antivirus software
    Most antivirus software can detect and prevent infection by known malicious software. To help protect you from infection, you should always run antivirus software that is updated with the latest signature files. Antivirus software is available from several sources. For more information, see http://www.microsoft.com/protect/com...ses/vista.mspx.

    Use caution when opening attachments and accepting file transfers
    Exercise caution with e-mail and attachments received from unknown sources, or received unexpectedly from known sources. Use extreme caution when accepting file transfers from known or unknown sources.

    Use caution when clicking on links to web pages
    Exercise caution with links to web pages that you receive from unknown sources, especially if the links are to a web page that you are not familiar with or are suspicious of. Malicious software may be installed in your system simply by visiting a web page with harmful content.

    Avoid downloading pirated software
    Threats may also be bundled with software and files that are available for download on various torrent sites. Downloading "cracked" or "pirated" software from these sites carries not only the risk of being infected with malware, but is also illegal. For more information. please see our article 'The risks of obtaining and using pirated software'.

    Protect yourself from social engineering attacks
    While attackers may attempt to exploit vulnerabilities in hardware or software in order to compromise a system, they also attempt to exploit vulnerabilities in human behavior in order to do the same. When an attacker attempts to take advantage of human behavior in order to persuade the affected user to perform an action of the attacker's choice, it is known as 'social engineering'. Essentially, social engineering is an attack against the human interface of the targeted system. For more information, please see our article 'What is social engineering?'.

  6. #6
    Join Date
    May 2008
    Posts
    2,945

    Re: W32.Conficker.worm problem


  7. #7
    Join Date
    May 2008
    Posts
    2,945

    Re: W32.Conficker.worm problem

    Also Download the Microsoft Security Bulletin MS08-067 – Critical

    http://www.microsoft.com/technet/sec.../MS08-067.mspx

  8. #8
    Join Date
    Jan 2006
    Posts
    3,792

    Re: W32.Conficker.worm problem

    Users infected by W32/Conficker.worm should perform an On Demand Scan to remove remnants of the worm in memory using the latest DATs.

    Upon detection of W32/Conficker!mem and REBOOT, the W32/Conficker.worm malware components will be removed.

  9. #9
    Join Date
    Dec 2008
    Posts
    322

Similar Threads

  1. How Conficker worm work?
    By Flacos in forum Networking & Security
    Replies: 4
    Last Post: 31-01-2010, 06:57 AM
  2. Worm:Win32/Conficker.B!inf
    By KAMANA in forum Networking & Security
    Replies: 3
    Last Post: 25-11-2009, 04:54 AM
  3. Microsoft Security Updates for Conficker Worm
    By Maximus() in forum Networking & Security
    Replies: 4
    Last Post: 27-06-2009, 05:31 PM
  4. April 1st virus, Conficker Worm, what it is?
    By GunFighter in forum Networking & Security
    Replies: 2
    Last Post: 16-06-2009, 12:41 PM

Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
Page generated in 1,713,311,660.12901 seconds with 17 queries