Once detected, the F-Secure security product will automatically disinfect the suspect file by either deleting it or renaming it.
Downadup makes use of random extension names in order to avoid detection. During disinfection, Scanning Options should be set to:
- Scan all files
For more general information on disinfection, please see Removal Instructions.
Some variants of the Downadup worm attempt to block execution of F-Secure malware removal tools. If the downloaded tool does not work, please rename the file. Example: from "f-downadup.exe" to "file.exe" or "explorer.exe". Then try running the tool again.
Specific tool with heuristics for Downadup worm variants:
This is a command line tool. Please read the text file included in the ZIP for additional details.
Microsoft Help and Support
Knowledge Base Article 962007 provides numerous details for manual disinfection of Conficker.B (alias Downadup):
More scanning & removal options
More information on scanning and removal options available in your F-Secure product can be found in the Help Center.
You may also refer to the Knowledge Base on the F-Secure Community site for more assistance.
For technical details of Downadup's installation and propagation mechanisms, see the following descriptions:
Downadup uses a variety of methods and vectors to spread itself:
- Exploits a Windows vulnerability; patched by security update 958644 (read our Vulnerability Report, SA32326: Microsoft Windows Server Service Vulnerability).
- Use of network shares; weak passwords.
- It uses Windows AutoRun functionality; autorun.inf files are copied to USB drives and other removable media.
Certain Downadup variants have additional rooutines:
- Worm:W32/Downaduprun.A (Uses an autorun.inf file)
- Worm:W32/Downadupjob.gen (creates a Task Scheduler Object)
Description Created: 2009-01-09 11:53:48.0
Description Last Modified: 2010-09-29 09:40:20.0