FakeRean

FakeRean Description

Type: Trojan

FakeRean is a Trojan that is usually included and spread as an email attachment similar to ZBot. Spam messages are successful with spreading FakeRean by including an executable called "install.exe" within a zip archive. If a computer user downloads the ZIP file and runs the "install.exe" file, then they their system will be infected with the FakeRean Trojan horse. FakeRean can cause damage to a computer’s system files and prove difficult to manually detect and remove in some cases. FakeRean is also known as W32/FakeAV.AE!genr, W32/FakeRean.A.gen!Eldorado or TrojanDownloader:Win32/FakeRean.

Aliases

15 security vendors flagged this file as malicious.

Anti-Virus Software Detection
TrendMicro TROJ_FAKEAV.ROE
NOD32 a variant of Win32/Kryptik.EHO
McAfee FakeAlert-DeskTopSec.gen
AVG Generic17.BZMB
NOD32 a variant of Win32/Kryptik.EGQ
DrWeb Trojan.Fakealert.15579
AhnLab-V3 ASD.Prevention
TrendMicro TROJ_FAKEAV.BKZ
Symantec Downloader
McAfee-GW-Edition Artemis!814B278BEC8B
McAfee Generic.dx!sqr
Kaspersky Trojan.Win32.FraudPack.avts
F-Secure Trojan:W32/Agent.DJFD
BitDefender Trojan.Generic.KD.11016
AntiVir TR/FraudPack.avts

Technical Information

File System Details

FakeRean creates the following file(s):
# File Name MD5 Detection Count
1 go[1].exe d4cfdb42e6af91847fb3965675a888a7 70
2 antivirus[2].exe 89bba09c44e26fc370156b91ac65f056 44
3 av.exe 44de29c3324f7afc102f7e6721076512 21
4 installer_70108.exe dc762d29b9c7b18b28ae9b2c4dad860b 6
5 movie[1].exe af1737dea3c3d825403d8eb155820a17 5
6 setup.exe 814b278bec8b062e2331329db6c67ae1 4
7 m.2121.tmp.exe 97fbdd22563bdd1c012e84d47fd619f4 1
8 30D5.tmp 495f445a5b5c7871cbd2bc4d2d7ea850 1
9 m.21A.tmp.exe 92abca286e8f590b523e86155c851733 1
10 m.21E.tmp.exe d53d1780a1c7dc19eedd3b4549d6f3e0 1
11 m.228.tmp.exe 33e63d00c7897cba57dddc5ac294a25a 1
12 m.2BFB4.tmp.exe 42e3e0e2c488d5cfc56b01e39fc2f756 1
13 m.2F7.tmp.exe 18d71d0d496a179c7179efdbc18e1050 1
More files

Related Posts

Site Disclaimer

Enigmasoftware.com is not associated, affiliated, sponsored or owned by the malware creators or distributors mentioned on this article. This article should NOT be mistaken or confused in being associated in any way with the promotion or endorsement of malware. Our intent is to provide information that will educate computer users on how to detect, and ultimately remove, malware from their computer with the help of SpyHunter and/or manual removal instructions provided on this article.

This article is provided "as is" and to be used for educational information purposes only. By following any instructions on this article, you agree to be bound by the disclaimer. We make no guarantees that this article will help you completely remove the malware threats on your computer. Spyware changes regularly; therefore, it is difficult to fully clean an infected machine through manual means.