Conficker

Por Domesticus em Minhocas

Cartão de pontuação de ameaças

Popularity Rank: 14,934
Nível da Ameaça: 90 % (Alto)
Computadores infectados: 49
Visto pela Primeira Vez: July 24, 2009
Visto pela Última Vez: September 24, 2025
SO (s) Afetados: Windows


O Conficker, também conhecido como W32/Conficker.worm, Win32/Conficker.A, W32.Downadup, Downadup e Kido, é um worm que explora as falhas que existem na vulnerabilidade MS08-067 do Windows. Quando o Conficker infecta o seu PC, ele pode impedi-lo de acessar sites de segurança e desativa certos serviços do sistema do Windows, tais como o Windows Security Center, o Error Reporting e o Windows Defender. O perigo do Conficker é sua capacidade de se espalhar para outros computadores vulneráveis, através de redes compartilhadas. Se um computador da rede estiver infectado, então ele poderá se espalhar para os outros computadores nessa rede. A Microsoft lançou uma correção para essa vulnerabilidade do Windows.

É imprescindível que você baixe a última correção liberada pela Atualizações do Windows da Microsoft. Além disso, como o Conficker usa nomes de arquivo aleatórios, para impedir ser fácilmente detectado, o melhor é usar um software anti-vírus ou anti-spyware, que vai permitir que você escaneie todo o seu computador, em vez de tentar apagar manualmente os arquivos do Conficker.

SpyHunter detecta e remove Conficker

Detalhes Sobre os Arquivos do Sistema

Conficker pode criar o(s) seguinte(s) arquivo(s):
# Nome do arquivo MD5 Detecções
1. malware.exe 09edf06953b56ee6a8cb6823cb3b2996 0
2. vhoinp.dll e80c7cb77020f9326e15b3a0fb298045 0
Arquivos Adicionais

Relatório de análise

Informação geral

Family Name: Worm.Conficker
Signature status: No Signature

Known Samples

MD5: 2c2c5fdcfd368151b6c0e090c53aa300
SHA1: 8c981285d9caa0c5d6285b980377e4721f26e7a0
SHA256: 66BEE08996C38F985AE00BA02DDB0BDDB4A3ADC062334B90D0E6F9DC1ECBB337
Tamanho do Arquivo: 2.09 MB, 2093056 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have security information
  • File has exports table
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
Show More
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

Windows PE Version Information

Nome Valor
Company Name Itesoft
Compile Date vendredi 28 janvier 2005 17:18
File Description Itesoft.FreeMind Component
File Version 1.9.5.508
Internal Name FMEntity
Legal Copyright Copyright © ITESOFT SA
Legal Trademarks ITESOFT.FreeMind and ITESOFT.Invoices are registered trademarks of ITESOFT SA.
Original Filename IT_FMEntity.dll
Product Name Itesoft FreeMind
Product Version 1.9

File Traits

  • dll
  • HighEntropy
  • imgui
  • VirtualQueryEx
  • WriteProcessMemory
  • x86

Block Information

Total Blocks: 7,335
Potentially Malicious Blocks: 184
Whitelisted Blocks: 5,837
Unknown Blocks: 1,314

Visual Map

0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 ? 0 ? ? 0 ? ? ? ? ? ? ? 0 ? ? ? ? 0 ? ? 0 ? ? ? ? ? ? 0 ? ? 0 ? 0 ? ? ? ? ? 0 0 0 ? 0 0 ? ? 0 0 0 0 0 0 0 ? ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 ? ? ? ? 0 ? ? 0 ? 0 0 0 0 ? 0 ? 0 0 ? ? 0 ? 0 ? ? 0 ? ? ? 0 ? ? ? ? ? ? ? ? ? ? ? ? 0 0 ? ? ? 0 0 ? ? ? 0 ? 0 0 0 0 0 ? 0 0 x ? 0 ? 0 ? ? ? ? ? ? 0 0 0 0 0 0 0 0 0 0 ? ? ? ? 0 ? ? ? 0 ? ? 0 ? ? 0 0 ? ? 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 ? ? ? ? 0 0 ? ? ? 0 0 0 0 0 0 0 0 0 0 0 0 0 ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? 0 ? ? 0 0 ? ? ? 0 0 ? 0 ? 0 ? ? ? 0 0 ? ? ? ? ? ? 0 ? ? 0 0 0 0 0 0 ? 0 0 0 0 0 0 0 0 ? 0 0 0 0 0 0 0 0 0 ? 0 0 0 0 0 ? ? 0 ? ? ? 0 ? ? 0 0 ? 0 ? ? ? 0 ? ? 0 ? ? ? 0 0 0 0 0 0 0 0 0 0 0 0 ? ? 0 0 ? ? 0 ? ? 0 0 0 0 0 0 0 ? ? 0 ? 0 0 0 0 0 ? ? ? ? 0 ? 0 x ? ? 0 ? ? ? 0 0 0 0 ? ? ? 0 ? 0 0 0 ? ? ? ? ? 0 ? ? 0 ? ? ? ? ? ? ? ? 0 0 x x ? ? ? ? ? ? 0 ? 0 0 x ? ? ? 0 ? 0 0 ? ? 0 ? 0 ? 0 0 ? 0 0 0 ? ? ? ? 0 0 0 ? ? ? ? 0 ? 0 ? 0 0 0 0 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? ? ? ? 0 ? ? 0 0 0 ? ? ? ? ? 0 ? ? 0 ? ? 0 ? 0 ? ? 0 ? ? ? 0 ? ? ? ? ? ? ? ? ? ? 0 ? ? ? 0 ? ? 0 ? ? ? ? ? ? ? ? 0 ? ? 0 ? ? 0 ? ? 0 ? ? 0 ? 0 0 ? ? ? 0 ? ? 0 ? ? 0 ? ? 0 ? 0 ? ? ? ? ? ? ? 0 ? ? ? 0 ? ? ? 0 ? 0 ? ? 0 0 ? ? 0 ? ? ? ? 0 ? ? 0 ? ? 0 ? ? ? 0 0 ? ? 0 ? 0 ? ? 0 ? ? ? 0 0 ? ? ? 0 ? ? 0 ? 0 ? ? ? ? ? ? ? ? 0 0 ? 0 ? ? 0 0 ? 0 0 ? ? 0 ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? 0 0 0 0 ? 0 ? 0 ? 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? ? 0 0 0 ? 0 ? 0 ? 0 0 0 0 0 0 0 0 0 ? ? 0 0 ? 0 ? ? ? ? ? ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? ? ? ? ? ? 0 0 ? ? 0 0 0 ? ? 0 0 0 0 0 0 0 ? 0 0 0 ? ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? ? ? 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 ? 0 ? ? ? 0 0 0 0 0 0 ? 0 0 0 0 0 0 0 0 0 0 ? 0 0 0 0 ? ? 0 0 0 ? 0 ? 0 0 0 ? 0 0 0 0 0 ? ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? ? ? ? ? ? 0 0 0 0 0 0 0 0 0 0 0 0 0 ? ? 0 0 0 ? 0 0 0 0 0 0 0 0 0 0 ? ? 0 0 0 0 0 0 0 0 ? 0 ? 0 0 0 0 0 ? ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? ? 0 0 ? ? 0 0 0 0 0 0 0 0 ? 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 ? ? ? 0 0 0 0 0 ? ? 0 0 0 0 0 ? ? 0 0 0 0 ? ? 0 0 0 0 0 ? 0 0 0 ? ? 0 0 0 ? ? ? 0 0 0 ? 0 0 0 ? 0 0 ? 0 0 0 0 0 ? ? 0 0 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 ? ? 0 0 ? ? ? ? 0 0 0 ? 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? ? ? ? ? ? ? 0 0 0 0 0 0 ? ? 0 0 ? 0 0 0 ? ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 0 0 ? 0 0 0 ? 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? ? ? ? ? ? ? ? 0 0 0 0 0 0 0 0 ? ? 0 0 ? ? 0 0 ? ? 0 0 0 0 ? ? ? ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? ? 0 0 0 0 0 0 0 0 0 0 0 0 ? ? ? ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? ? 0 0 0 0 0 0 0 0 0 ? 0 0 0 0 ? 0 0 0 0 0 ? 0 0 0 ? 0 0 0 0 0 0 0 ? 0 0 0 ? 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 ? ? ? ? ? ? ? ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? ? 0 0 0 0 0 0 0 ? 0 0 0 0 0 0 0 ? ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 0 0 0 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 0 ? 0 0 0 0 0 0 ? ? 0 ? 0 0 0 0 0 0 0 ? 0 0 ? ? 0 ? 0 0 ? ? 0 0 0 ? ? 0 ? ? 0 0 0 0 0 0 0 ? ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
... Data truncated
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Windows API Usage

Category API
Syscall Use
  • ntdll.dll!NtAlpcSendWaitReceivePort
  • ntdll.dll!NtClose
  • ntdll.dll!NtCreateFile
  • ntdll.dll!NtCreateSection
  • ntdll.dll!NtFreeVirtualMemory
  • ntdll.dll!NtMapViewOfSection
  • ntdll.dll!NtOpenFile
  • ntdll.dll!NtOpenKey
  • ntdll.dll!NtOpenProcessToken
  • ntdll.dll!NtProtectVirtualMemory
Show More
  • ntdll.dll!NtQueryAttributesFile
  • ntdll.dll!NtQueryDebugFilterState
  • ntdll.dll!NtQueryInformationProcess
  • ntdll.dll!NtQueryInformationThread
  • ntdll.dll!NtQueryInformationToken
  • ntdll.dll!NtQuerySystemInformationEx
  • ntdll.dll!NtQueryValueKey
  • ntdll.dll!NtQueryVirtualMemory
  • ntdll.dll!NtQueryVolumeInformationFile
  • ntdll.dll!NtReadFile
  • ntdll.dll!NtSetEvent
  • ntdll.dll!NtSetInformationFile
  • ntdll.dll!NtSetInformationProcess
  • ntdll.dll!NtTestAlert
  • ntdll.dll!NtUnmapViewOfSection
  • ntdll.dll!NtWriteFile
  • ntdll.dll!NtWriteVirtualMemory
  • win32u.dll!NtUserGetKeyboardLayout
  • win32u.dll!NtUserGetThreadState
Process Shell Execute
  • CreateProcess
Anti Debug
  • NtQuerySystemInformation

Shell Command Execution

C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\8c981285d9caa0c5d6285b980377e4721f26e7a0_0002093056.,LiQMAxHB

Postagens Relacionadas

Tendendo

Mais visto

Carregando...