A foray into Conficker's logic and rendezvous points

  • Authors:
  • Phillip Porras;Hassen Saïdi;Vinod Yegneswaran

  • Affiliations:
  • Computer Science Laboratory, SRI International;Computer Science Laboratory, SRI International;Computer Science Laboratory, SRI International

  • Venue:
  • LEET'09 Proceedings of the 2nd USENIX conference on Large-scale exploits and emergent threats: botnets, spyware, worms, and more
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

We present an in depth static analysis of the Conficker worm, primarily through the exploration of the client-side binary logic. In this paper, we summarize various aspects of the inner workings of binary variants A and B, which were the first in a chain of recent revisions aimed to keep this epidemic resistant to ongoing eradication attempts. These first two variants have combined to produce a multi-million node population of infected hosts, whose true main purpose has yet to be fully understood. We further validate aspects of our analysis through in-situ network analyses, and discuss some attribution links about its origins.