Question:
How do I know if my computer is infected by Conficker?
Erka
2009-03-31 23:33:43 UTC
I just heard about the new virus program that's out there. Is there a way to find out if my computer has it or not?
Eleven answers:
CELTS!
2009-03-31 23:38:51 UTC
Go to any anti virus site, i.e. McAfee and if you cannot see the page, you are probably infected. The Conficker virus prevents you from seeing an anti virus site.



Make sure you have the latest updates from Microsoft and a great anti-virus software. If you have done that, you are protected.
?
2016-08-21 16:26:56 UTC
2
2009-04-01 04:47:40 UTC
If your computer is infected with Conficker, it's very easy to find out. Because the worm blocks attempts to remove it, it prevents computers from visiting Web sites where patches and cleaning tools can be downloaded. Below is a list of some sites Conficker blocks. If you are unable to visit them, your computer may be infected.



For more information you can go through http://www.iyogi.net



Andrew
Digitaltaz
2009-03-31 23:40:34 UTC
The easiest way is to try to browse to www.symantec.com . The Virus prevents access to most of the major antivirus websites.
?
2016-09-28 15:55:18 UTC
no person is risk-free. not even f***ing mac customers. in case you have a mac and are not effected by way of the trojan horse (it could influence macs yet you shouldn't get it) i visit come back on your place and supply it to you. particularly using fact human beings think of bragging to their buddies approximately how they paid two times the money for an working equipment that has 0.5 the valuable properties of a working laptop or laptop is well worth whilst.
Ladybuggram
2009-03-31 23:39:41 UTC
Try clicking on your virus protection icon. If it doesn't work, you probably have the virus....it was on the news tonight. www.koinlocal6.com That is our local news, but you could check on MSN updates. Check your virus protection and updates.



Good luck and hope that blasted virus stays away from your computer.
2009-03-31 23:41:02 UTC
Check out Asystematics- They have current instructions on how to find out about this bot down in the right hand corner.
wohhhoo
2009-03-31 23:40:32 UTC
run a virus scan

is ur computer running slower than usual??

is it unresponsive?

are you getting constant pop ups?

is windows trying to do something every few minutes that "needs your permission"?



basically, is ur computer acting differently
I don't know
2009-03-31 23:37:21 UTC
im wondering the same thing
smile [dontcha mess with cupid]
2009-03-31 23:38:24 UTC
if you can go to microsoft.com or symantic.com, places where you'd download antiviruses, you're good.
Martial H
2009-04-01 12:15:07 UTC
General Methods of propagation:

• Local network

• Mapped network drives





Aliases:

• Symantec: W32.Downadup.B

• Kaspersky: Net-Worm.Win32.Kido.fw

• F-Secure: Worm:W32/Downadup.gen!A

• Sophos: Mal/Conficker-A

• Panda: Trj/Downloader.MDW

• Grisoft: I-Worm/Generic.CJY

• Eset: a variant of Win32/Conficker.AE worm

• Bitdefender: Win32.Worm.Downadup.Gen



Similar detection:

• Worm/Kido





Platforms / OS:

• Windows 95

• Windows 98

• Windows 98 SE

• Windows NT

• Windows ME

• Windows 2000

• Windows XP

• Windows 2003





Side effects:

• Registry modification

• Makes use of software vulnerability

• Third party control



Files It copies itself to the following locations:

• %all shared folders% \RECYCLER\S-%number%\%random character string%.vmx

• %ProgramFiles%\Internet Explorer\%random character string%.dll

• %ProgramFiles%\Movie Maker\%random character string%.dll

• %System%\%random character string%.dll

• %Temp%\%random character string%.dll

• %ALLUSERSPROFILE%\Application Data\%random character string%.dll







The following file is created:



– %all shared folders%\autorun.inf This is a non malicious text file with the following content:

• %random comments%

shellexecute rundll32.exe %paths and filenames of malware copies%,%random character string%

%random comments%



Registry The following registry keys are added in order to load the service after reboot:



– HKLM\SYSTEM\CurrentControlSet\Services\%random words%\

Parameters\

• ServiceDll" = "%paths and filenames of malware copies%"



– HKLM\SYSTEM\CurrentControlSet\Services\%random words%\

• "ImagePath" = %SystemRoot%\system32\svchost.exe -k netsvcs

"Type" = "4"

"Start" = "4"

"ErrorControl" = "4"







The following registry keys are changed:



– [HKLM\SYSTEM\CurrentControlSet\Services\wscsvc]

Old value:

• "Start"=dword:00000003

New value:

• "Start"=dword:00000004



– [HKLM\SYSTEM\CurrentControlSet\Services\wuauserv]

Old value:

• "Start"=dword:00000003

New value:

• "Start"=dword:00000004



– [HKLM\SYSTEM\CurrentControlSet\Services\BITS]

Old value:

• "Start"=dword:00000003

New value:

• "Start"=dword:00000004



– [HKLM\SYSTEM\CurrentControlSet\Services\ERSvc]

Old value:

• "Start"=dword:00000003

New value:

• "Start"=dword:00000004



– HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced

New value:

• "Hidden"=dword:00000002

"ShowCompColor"=dword:00000001

"HideFileExt"=dword:00000000

"DontPrettyPath"=dword:00000000

"ShowInfoTip"=dword:00000001

"HideIcons"=dword:00000000

"MapNetDrvBtn"=dword:00000000

"WebView"=dword:00000000

"Filter"=dword:00000000

"SuperHidden"=dword:00000000

"SeparateProcess"=dword:00000000



Network Infection In order to ensure its propagation the malware attemps to connect to other machines as described below.





IP address generation:

It creates random IP addresses while it keeps the first three octets from its own address. Afterwards it tries to establish a connection with the created addresses.





Infection process:

It makes the compromised machine download the malware from the infected source computer.

The downloaded file is stored on the compromised machine as: .\RECYCLER\S-%number%\%random character string%.vmx



Hosts – Access to the following domains is effectively blocked:

• ahnlab; arcabit; avast; avg.; avira; avp.; bit9.; ca.; castlecops;

centralcommand; cert.; clamav; comodo; computerassociates; cpsecure;

defender; drweb; emsisoft; esafe; eset; etrust; ewido; f-prot;

f-secure; fortinet; gdata; grisoft; hacksoft; hauri; ikarus; jotti;

k7computing; kaspersky; malware; mcafee; microsoft; nai.;

networkassociates; nod32; norman; norton; panda; pctools; prevx;

quickheal; rising; rootkit; sans.; securecomputing; sophos; spamhaus;

spyware; sunbelt; symantec; threatexpert; trendmicro; vet.; virus;

wilderssecurity; windowsupdate





Miscellaneous Internet connection:

In order to check for its internet connection the following DNS servers are contacted:

• http://www.getmyip.org

• http://www.whatsmyipaddress.com

• http://getmyip.co.uk

• http://checkip.dyndns.org





Checks for an internet connection by contacting the following web sites:

• baidu.com; google.com; yahoo.com; msn.com; ask.com; w3.org; aol.com;

cnn.com; ebay.com; msn.com; myspace.com





File patching:

In order to increase the number of maximum connections it has the capability to modify the tcpip.sys. It may result in a corruption of that file and break network connectivity.



Rootkit Technology It is a malware-specific technology. The malware hides its presence from system utilities, security applications and in the end, from the user.





Method used:


This content was originally posted on Y! Answers, a Q&A website that shut down in 2021.
Loading...