Threat Database Trojans Trojan.Fakesafe

Trojan.Fakesafe

By Sumo3000 in Trojans

Threat Scorecard

Threat Level: 90 % (High)
Infected Computers: 2
First Seen: May 20, 2013
Last Seen: March 29, 2021
OS(es) Affected: Windows

Trojan.Fakesafe is a Trojan that is a component of a targeted campaign called 'SafeNet' (the name of the campaign is not associated with the security company of the same name). Cybercriminals behind this malware campaign are using phishing emails with infected attachments, found as Trojan.Fakesafe. These attachments are document files that exploit vulnerabilities in Microsoft Word. Some of the documents exploit the Microsoft Windows Common Controls ActiveX Control Remote Code Execution Vulnerability (CVE-2012-0158). If exploitation is successful, the infected documents download the malevolent files. Trojan.Fakesafe opens a back door and steals information from the compromised PC. Once run, Trojan.Fakesafe replicates itself as the malevolent files. Trojan.Fakesafe also creates the malevolent files. Trojan.Fakesafe creates the registry entries. Trojan.Fakesafe strives to open a back door by connecting to the predefined web address Getapencil.com. The remote cybercriminal is then able to fulfill the harmful actions on the corrupted PC such as download and run files that incorporate bogus security applications and update the threat.

File System Details

Trojan.Fakesafe may create the following file(s):
# File Name Detections
1. %Temp%\_Rm.bat
2. %Temp%\SafeNet\SafeExt.dll
3. %ProgramFiles%\Internet Explorer\SafeNet\SafeExt.dll
4. smcs.exe
5. %ProgramFiles%\Internet Explorer\SafeNet\SafeCredential.DAT
6. %Temp%\SafeNet\SafeCredential.DAT
7. %Temp%\SafeNet\kernel.dat
8. %Temp%\SafeNet\SafeExt.org

Registry Details

Trojan.Fakesafe may create the following registry entry or registry entries:
HKEY_CLASSES_ROOT\Folder\shellex\ContextMenuHandlers\SuperExtender\"(Default)" = "{B0597F7E-06FF-4A31-9C2C-11483CE7F30E}"
ContextMenu Extension"
HKEY_CLASSES_ROOT\*\shellex\ContextMenuHandlers\SuperExtender\"(Default)" = "{B0597F7E-06FF-4A31-9C2C-11483CE7F30E}"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\"{B0597F7E-06FF-4A31-9C2C-11483CE7F30E}" = "QuickOpen
HKEY_CLASSES_ROOT\Directory\Background\shellex\ContextMenuHandlers\SuperExtender\"(Default)" = "{B0597F7E-06FF-4A31-9C2C-11483CE7F30E}"
HKEY_CLASSES_ROOT\CLSID\{B0597F7E-06FF-4A31-9C2C-11483CE7F30E}\InprocServer32\"(Default)" = "%ProgramFiles%\Internet Explorer\SafeNet\SafeExt.dll"

Trending

Most Viewed

Loading...