detection icon

Short bio

Worm.Conficker is Malwarebytes’ detection name for a family of worms that exploit a vulnerability in older Windows versions.


Network monitoring may reveal crafted RPC requests that are trying to trigger a buffer overflow.

Type and source of infection

Worm.Conficker tries to exploit a vulnerability in the Windows server service. This vulnerability can lead to remote code execution if an affected system received a specially crafted remote procedure call (RPC) request. This could allow an attacker to exploit this vulnerability without authentication to run arbitrary code on unpatched versions of systems running Windows 2000 Service Pack (SP) 4, Windows XP SP2 and SP3, Windows Server 2003 SP1 and SP2, Vista Gold SP1, Windows Server 2008 and Windows 7 systems.


block Worm.Conficker

Malwarebytes blocks Worm.Conficker

Home remediation

Malwarebytes can detect and remove Worm.Conficker without further user interaction.

  1. Please download Malwarebytes to your desktop.
  2. Double-click MBSetup.exe and follow the prompts to install the program.
  3. When your Malwarebytes for Windows installation completes, the program opens to the Welcome to Malwarebytes screen.
  4. Click on the Get started button.
  5. Click Scan to start a Threat Scan.
  6. Click Quarantine to remove the found threats.
  7. Reboot the system if prompted to complete the removal process.

Business remediation

How to remove Worm.Conficker with the Malwarebytes Nebula console

You can use the Malwarebytes Anti-Malware Nebula console to scan endpoints.

endpoint menu

Nebula endpoint tasks menu

Choose the Scan + Quarantine option. Afterwards you can check the Detections page to see which threats were found.

Nebula detections

On the Quarantine page you can see which threats were quarantined and restore them if necessary.

Associated threats

  • Worm.Conficker.H
  • Worm.Conficker.Generic