FakeRean

Por SpideyMan em Troianos
Traduzir Para:

Cartão de pontuação de ameaças

Popularity Rank: 18,004
Nível da Ameaça: 100 % (Alto)
Computadores infectados: 9,842
Visto pela Primeira Vez: November 30, 2010
Visto pela Última Vez: January 29, 2026
SO (s) Afetados: Windows


O FakeRean é um Trojan que é, normalmente, incluído e espalhado como um anexo de e-mail semelhante ao Zbot. As mensagens de spam são bem sucedidas na propagação do FakeRean, quando incluem um arquivo executável chamado "install.exe" dentro de um arquivo zip. Se um usuário de computador baixar o arquivo ZIP e executar o arquivo "install.exe", então o seu sistema será infectado pelo Trojan do FakeRean. O FakeRean pode causar danos aos arquivos de sistema de um computador e ser difícil, em alguns casos, de ser detectado e removido manualmente. O FakeRean também é conhecido como W32/FakeAV.AE!genr, W32/FakeRean.A.gen! Eldorado ou TrojanDownloader: Win32/FakeRean ....

Outros Nomes

15 fornecedores de segurança sinalizaram este arquivo como malicioso.

Antivirus Vendor Detecção
AVG Cryptic.EOS
Fortinet W32/Jorik_Fraud.SRX!tr
Ikarus Trojan.Win32.Loktrom
AntiVir TR/Symmi.176421
Kaspersky Trojan.Win32.Jorik.Fraud.srx
AVG Crypt.BXIV
Fortinet W32/Generic!tr
McAfee Fake-Rena-FMB!D3516C44B50F
AVG Generic30.BBID
Kaspersky Trojan-FakeAV.Win32.CProtection.aih
Symantec Trojan.Winlock!gen1
Fortinet W32/Generic.GPL!tr
AntiVir TR/Fake.Rean.776
Sophos Troj/FakeAV-GOU
McAfee Fake-SecTool-FLM!B7B9041FC273

SpyHunter detecta e remove FakeRean

Detalhes Sobre os Arquivos do Sistema

FakeRean pode criar o(s) seguinte(s) arquivo(s):
# Nome do arquivo MD5 Detecções
1. msecurity.exe d35d56ba42a7b32196ff263fb79e3cad 5
2. security_cleaner.exe 635515dd37ff62f238920eacaf91e233 4
3. pnj.exe ae7d35206e33efa128fed3ab03f25cd9 3
4. nek.exe 632d67b553428b93204f7457472f3972 3
5. ndr.exe c4f2c5841f26525a899a53b0c12d7bb3 2
6. fmb.exe 3c29d43a0f4f4803fd1fb1866bf46cbd 2
7. exr.exe 70d574b7f24bd23467d2188377025039 2
8. fap.exe 20167cba152bdc52965a84b488d05627 2
9. erv.exe f61e2a0ad9d5e04ab1baca8399ecfd18 2
10. pdh.exe 82be0d41ee155bfcf919f8a5ded9c6d4 2
11. wwe.exe 7df15ed96ced549d4ddd5a388b8505e0 2
12. av.exe 0bc5e06b4fe42bbdde18b534ec8feb91 2
13. tlf.exe fd965a0be37382bc83ebfcb8a7ba3e52 2
14. dow.exe 9bd2bc135683525822d1c251d4959847 2
15. drw.exe 529b489bb3eb8232f87318b8bb3e3ba3 2
16. bcq.exe 8b8585f8d64dd6383dcf8dbbf49621be 1
17. qwu.exe f0e50738e85f8db4787130b4823e1906 1
18. aak.exe 4da1e82ba52f7050757fa2104b14c87e 1
19. sve.exe 61e91f6e0cd4b05e2701fdd4c048bd47 1
20. jqq.exe 8657d274e17a0936704365288e8d04f8 1
21. qnb.exe 802c064f0ba701e499dd0605e218a5e4 1
22. bll.exe f8b7849c7ac2b3c850332b78b2f0189f 1
23. ljo.exe 4c33f7dfd6dc5f684e60f9e019e7c180 1
24. snf.exe 99569cebc1f721ff66217699808230bc 1
25. bvk.exe 3958bb38562dee3cc0ae35d4220aa627 1
26. yna.exe 3f9ef3cef499dd435d7b86d74ea838bb 1
27. kfk.exe 433f01b5642c37016588f11ee5485519 1
28. 8814206.exe 86562961e94a757cb37576d2a955c06b 1
29. amsecure.exe d3516c44b50fabd3ba2636e54ff172d1 1
Arquivos Adicionais

Relatório de análise

Informação geral

Family Name: Rogue.FakeRean
Signature status: No Signature

Known Samples

MD5: 0604af7c52911b648819277aa11e2872
SHA1: 38b24c6e11a0e5a8d9dc7ef4dead9399d96543e7
SHA256: B599512AF4A79C574D397B1F3AD319B5912FD86C00F3C57A2224EA6D540FD11F
Tamanho do Arquivo: 393.22 KB, 393216 bytes
MD5: e3cb47ea02d2ff4cec014a3e4be1004e
SHA1: f240b4ed11c4a0e44876ce1185ddfebf7e5df0f2
SHA256: A41A998C482BA943BDCBE019AD9115C0D4BBA64D25CEF19B5377F99A437C2072
Tamanho do Arquivo: 2.79 MB, 2786304 bytes
MD5: 7684c3746b315e2ba8768771f8c88a0d
SHA1: b558fd80a32aef34ad0d1f408bf9afca62016651
SHA256: 12A24B74AF1C7C3F73382B10EC08C1FB10A4ABFF049E9DB425EDFE47A295FB15
Tamanho do Arquivo: 1.82 MB, 1818624 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have relocations information
  • File doesn't have security information
  • File has TLS information
  • File is .NET application
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
Show More
  • File is Native application (NOT .NET application)
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Nome Valor
Assembly Version 1.0.0.0
Comments MBM Converter
Company Name
  • Cequenze Technology Inc.
  • Luxtron
File Description
  • EasyMaker
  • MBM Converter Application
File Version
  • 1.00
  • 1.0.0.29
  • 1.0.0.0
Internal Name
  • EasyMaker.exe
  • MBMConverter
Legal Copyright Copyright © Luxtron 2010
Legal Trademarks Cequenze Technoloy Inc.
Original Filename
  • EasyMaker.exe
  • MBMConverter.exe
Product Name
  • EasyMaker
  • MBMConverter.exe
Product Version
  • 1.00
  • 1.0.0.0

File Traits

  • .NET
  • vb6
  • x86

Files Modified

File Attributes
c:\windows\appcompat\programs\amcache.hve Read Data,Read Control,Write Data
c:\windows\appcompat\programs\amcache.hve Write Attributes

Windows API Usage

Category API
Syscall Use
  • ntdll.dll!NtAccessCheck
  • ntdll.dll!NtAdjustPrivilegesToken
  • ntdll.dll!NtAlertThreadByThreadId
  • ntdll.dll!NtAlpcConnectPort
  • ntdll.dll!NtAlpcSendWaitReceivePort
  • ntdll.dll!NtApphelpCacheControl
  • ntdll.dll!NtAssociateWaitCompletionPacket
  • ntdll.dll!NtClearEvent
  • ntdll.dll!NtClose
  • ntdll.dll!NtConnectPort
Show More
  • ntdll.dll!NtCreateEvent
  • ntdll.dll!NtCreateFile
  • ntdll.dll!NtCreateIoCompletion
  • ntdll.dll!NtCreateKey
  • ntdll.dll!NtCreateMutant
  • ntdll.dll!NtCreateSection
  • ntdll.dll!NtCreateSemaphore
  • ntdll.dll!NtCreateTimer2
  • ntdll.dll!NtCreateWaitCompletionPacket
  • ntdll.dll!NtCreateWorkerFactory
  • ntdll.dll!NtDelayExecution
  • ntdll.dll!NtDeleteValueKey
  • ntdll.dll!NtDeviceIoControlFile
  • ntdll.dll!NtDuplicateObject
  • ntdll.dll!NtDuplicateToken
  • ntdll.dll!NtEnumerateKey
  • ntdll.dll!NtEnumerateValueKey
  • ntdll.dll!NtFreeVirtualMemory
  • ntdll.dll!NtFsControlFile
  • ntdll.dll!NtLoadKeyEx
  • ntdll.dll!NtMapViewOfSection
  • ntdll.dll!NtNotifyChangeKey
  • ntdll.dll!NtOpenDirectoryObject
  • ntdll.dll!NtOpenEvent
  • ntdll.dll!NtOpenFile
  • ntdll.dll!NtOpenKey
  • ntdll.dll!NtOpenKeyEx
  • ntdll.dll!NtOpenProcessToken
  • ntdll.dll!NtOpenProcessTokenEx
  • ntdll.dll!NtOpenSection
  • ntdll.dll!NtOpenSemaphore
  • ntdll.dll!NtOpenSymbolicLinkObject
  • ntdll.dll!NtOpenThread
  • ntdll.dll!NtOpenThreadToken
  • ntdll.dll!NtOpenThreadTokenEx
  • ntdll.dll!NtProtectVirtualMemory
  • ntdll.dll!NtQueryAttributesFile
  • ntdll.dll!NtQueryDefaultLocale
  • ntdll.dll!NtQueryDirectoryFileEx
  • ntdll.dll!NtQueryFullAttributesFile
  • ntdll.dll!NtQueryInformationFile
  • ntdll.dll!NtQueryInformationProcess
  • ntdll.dll!NtQueryInformationThread
  • ntdll.dll!NtQueryInformationToken
  • ntdll.dll!NtQueryKey
  • ntdll.dll!NtQueryLicenseValue
  • ntdll.dll!NtQueryPerformanceCounter
  • ntdll.dll!NtQuerySecurityAttributesToken
  • ntdll.dll!NtQuerySecurityObject
  • ntdll.dll!NtQuerySymbolicLinkObject
  • ntdll.dll!NtQuerySystemInformation
  • ntdll.dll!NtQuerySystemInformationEx
  • ntdll.dll!NtQueryValueKey
  • ntdll.dll!NtQueryVirtualMemory
  • ntdll.dll!NtQueryVolumeInformationFile
  • ntdll.dll!NtQueryWnfStateData
  • ntdll.dll!NtReadVirtualMemory
  • ntdll.dll!NtReleaseMutant
  • ntdll.dll!NtReleaseSemaphore
  • ntdll.dll!NtReleaseWorkerFactoryWorker
  • ntdll.dll!NtRequestWaitReplyPort
  • ntdll.dll!NtSetEvent
  • ntdll.dll!NtSetInformationKey
  • ntdll.dll!NtSetInformationProcess
  • ntdll.dll!NtSetInformationThread
  • ntdll.dll!NtSetInformationVirtualMemory
  • ntdll.dll!NtSetInformationWorkerFactory
  • ntdll.dll!NtSubscribeWnfStateChange
  • ntdll.dll!NtTestAlert
  • ntdll.dll!NtTraceControl
  • ntdll.dll!NtTraceEvent
  • ntdll.dll!NtUnmapViewOfSection
  • ntdll.dll!NtUnmapViewOfSectionEx
  • ntdll.dll!NtWaitForSingleObject
  • ntdll.dll!NtWaitForWorkViaWorkerFactory
  • ntdll.dll!NtWaitLowEventPair
  • ntdll.dll!NtWorkerFactoryWorkerReady
  • ntdll.dll!NtWriteFile
  • UNKNOWN
User Data Access
  • GetUserObjectInformation
Anti Debug
  • IsDebuggerPresent
Process Shell Execute
  • CreateProcess
Encryption Used
  • BCryptOpenAlgorithmProvider
Process Manipulation Evasion
  • ReadProcessMemory
Other Suspicious
  • SetWindowsHookEx

Shell Command Execution

C:\Windows\Microsoft.NET\Framework64\v2.0.50727\\dw20.exe dw20.exe -x -s 824

Postagens Relacionadas

Tendendo

Mais visto

Carregando...