FakeRean Description
FakeRean is a Trojan that is usually included and spread as an email attachment similar to ZBot. Spam messages are successful with spreading FakeRean by including an executable called "install.exe" within a zip archive. If a computer user downloads the ZIP file and runs the "install.exe" file, then they their system will be infected with the FakeRean Trojan horse. FakeRean can cause damage to a computer’s system files and prove difficult to manually detect and remove in some cases. FakeRean is also known as W32/FakeAV.AE!genr, W32/FakeRean.A.gen!Eldorado or TrojanDownloader:Win32/FakeRean.
Aliases:
TROJ_FAKEAV.ROE [TrendMicro], W32/FakeAV.PSO, a variant of Win32/Kryptik.EHO [NOD32], FakeAlert-DeskTopSec.gen [McAfee], Generic17.BZMB [AVG], Malware-Cryptor.Win32.Gron.2, a variant of Win32/Kryptik.EGQ [NOD32], Trojan.Fakealert.15579 [DrWeb], ASD.Prevention [AhnLab-V3], Trojan.FraudPack.ADQS, TROJ_FAKEAV.BKZ [TrendMicro], Downloader [Symantec], High Risk Cloaked Malware, Trojan/W32.FraudPack.159744.N and W32/FraudPack.GA.
Technical Information
File System Details
FakeRean creates the following file(s):
# | File Name | Size | MD5 | Detection Count |
---|---|---|---|---|
1 | %LOCALAPPDATA%\Microsoft\Windows\Temporary Internet Files\Content.IE5\FV3G78HU\go[1].exe | 168,960 | d4cfdb42e6af91847fb3965675a888a7 | 70 |
2 | %TEMP%orary Internet Files\Content.IE5\42D8JTLC\antivirus[2].exe | 167,424 | 89bba09c44e26fc370156b91ac65f056 | 44 |
3 | %PROGRAMFILES%\WinAntispywareCenter\av.exe | 309,248 | 44de29c3324f7afc102f7e6721076512 | 21 |
4 | %USERPROFILE%\My Documents\My Pictures\installer_70108.exe | 195,584 | dc762d29b9c7b18b28ae9b2c4dad860b | 6 |
5 | %LOCALAPPDATA%\Microsoft\Windows\Temporary Internet Files\Content.IE5\9FU1KFFR\movie[1].exe | 181,760 | af1737dea3c3d825403d8eb155820a17 | 5 |
6 | %TEMP%\Rar$EX01.297\setup.exe | 159,744 | 814b278bec8b062e2331329db6c67ae1 | 4 |
7 | %TEMP%m.2121.tmp.exe | 2,966,016 | 97fbdd22563bdd1c012e84d47fd619f4 | 1 |
8 | %TEMP%30D5.tmp | 159,232 | 495f445a5b5c7871cbd2bc4d2d7ea850 | 1 |
9 | %TEMP%m.21A.tmp.exe | 2,967,552 | 92abca286e8f590b523e86155c851733 | 1 |
10 | %TEMP%m.21E.tmp.exe | 2,965,504 | d53d1780a1c7dc19eedd3b4549d6f3e0 | 1 |
11 | %TEMP%m.228.tmp.exe | 7,270,912 | 33e63d00c7897cba57dddc5ac294a25a | 1 |
12 | %TEMP%m.2BFB4.tmp.exe | 2,701,824 | 42e3e0e2c488d5cfc56b01e39fc2f756 | 1 |
13 | %TEMP%m.2F7.tmp.exe | 2,718,208 | 18d71d0d496a179c7179efdbc18e1050 | 1 |
Related Posts
Site Disclaimer
Enigmasoftware.com is not associated, affiliated, sponsored or owned
by the malware creators or distributors mentioned on this article. This article should NOT be
mistaken or confused in being associated in any way with the promotion or endorsement of malware.
Our intent is to provide information that will educate computer users on how to detect, and ultimately
remove, malware from their computer with the help of SpyHunter and/or manual removal instructions provided on
this article.
This article is provided "as is" and to be used for educational information purposes only. By following any instructions on this article, you agree to be bound by the disclaimer. We make no guarantees that this article will help you completely remove the malware threats on your computer. Spyware changes regularly; therefore, it is difficult to fully clean an infected machine through manual means.
This article is provided "as is" and to be used for educational information purposes only. By following any instructions on this article, you agree to be bound by the disclaimer. We make no guarantees that this article will help you completely remove the malware threats on your computer. Spyware changes regularly; therefore, it is difficult to fully clean an infected machine through manual means.