Need help? Ask the community or hire an expert.
Go to Avira Answers
Virus:TR/Fake.Rean.479
Date discovered:01/04/2011
Type:Trojan
In the wild:Yes
Reported Infections:Low
Distribution Potential:Low
Damage Potential:Low to medium
Static file:Yes
File size:339.968 Bytes
MD5 checksum:E18531567316D37BA463F983FC126871
VDF version:7.11.05.156 - Friday, April 1, 2011
IVDF version:7.11.05.156 - Friday, April 1, 2011

 General Method of propagation:
   • No own spreading routine


Aliases:
   •  TrendMicro: TROJ_FAKEAV.WVT
   •  Sophos: Mal/FakeAV-JR
   •  Microsoft: Rogue:Win32/FakeRean


Platforms / OS:
   • Windows 2000
   • Windows XP
   • Windows 2003
   • Windows Vista
   • Windows 7


Side effects:
   • Blocks access to security websites
   • Drops files
   • Lowers security settings
   • Registry modification


Right after execution the following information is displayed:




 Files It copies itself to the following location:
   • %HOME%\Local Settings\Application Data\%random character string%.exe



It deletes the initially executed copy of itself.



The following files are created:

%TEMPDIR%\7q1c014o4vt6ly5x80c38g3f
– %ALLUSERSPROFILE%\Application Data\7q1c014o4vt6ly5x80c38g3f
– %HOME%\Local Settings\Application Data\7q1c014o4vt6ly5x80c38g3f
%TEMPDIR%\7q1c014o4vt6ly5x80c38g3f
– %HOME%\Templates\7q1c014o4vt6ly5x80c38g3f

 Registry The following registry keys are added:

– [HKLM\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\
   FirewallPolicy\StandardProfile]
   • "DoNotAllowExceptions"=dword:00000000
   • "EnableFirewall"=dword:00000000
   • "DisableNotifications"=dword:00000001

– [HKLM\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\
   FirewallPolicy\DomainProfile]
   • "EnableFirewall"=dword:00000000
   • "DoNotAllowExceptions"=dword:00000000
   • "DisableNotifications"=dword:00000001

– [HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
   • "ctfmon.exe"="%SYSDIR%\ctfmon.exe"

– [HKCR\.exe\shell\open\command]
   • "(Default)"="\"%HOME%\Local Settings\Application Data\\%random character string%.exe\" -a \"%1\" %*"
   • "IsolatedCommand"="\"%1\" %*"

– [HKCR\exefile\shell\open\command]
   • "(Default)"="\"%HOME%\Local Settings\Application Data\\%random character string%.exe\" -a \"%1\" %*"
   • "IsolatedCommand"="\"%1\" %*"

– [HKCR\exefile\shell\runas\command]
   • "(Default)"="\"%1\" %*"
   • "IsolatedCommand"="\"%1\" %*"

– [HKLM\SOFTWARE\Clients\StartMenuInternet\IEXPLORE.EXE\shell\open\
   command]
   • "(Default)"="\"%HOME%\Local Settings\Application Data\\%random character string%.exe\" -a \"%PROGRAM FILES%\Intern"



The following registry key is changed:

– [HKLM\SOFTWARE\Microsoft\Security Center]
   New value:
   • "AntiVirusDisableNotify"=dword:00000001
   • "FirewallDisableNotify"=dword:00000001
   • "FirewallOverride"=dword:00000001
   • "UpdatesDisableNotify"=dword:00000001
   • "AntiVirusOverride"=dword:00000001

 Injection – It injects itself as a remote thread into a process.

    Process name:
   • iexplore.exe


 Miscellaneous Accesses internet resources:
   • **********yziriryvi.com/1013000312;
      **********ipemura.com/1013000312;
      **********awekugygil.com/1013000312;
      **********ylocimemyja.com/1013000312;
      **********epelihyzex.com/1013000312;
      **********ijinymut.com/1013000312;
      **********uwemixonav.com/1013000312;
      **********exynogemi.com/1013000312;
      **********elaticik.com/1013000312;
      **********inolecowary.com/1013000312;
      **********ofociv.com/1013000312;
      **********ujykolenuja.com/1013000312;
      **********exyhun.com/1013000312;
      **********oralipijago.com/1013000312;
      **********idehecyty.com/1013000312;
      **********evepapucof.com/1013000312;
      **********ykacagatet.com/1013000312;
      **********ulipum.com/1013000312;
      **********isesyf.com/1013000312;
      **********ityvik.com/1013000312;
      **********ehiqino.com/1013000312;
      **********ynufyk.com/1013000312;
      **********udizoni.com/1013000312;
      **********evanyxora.com/1013000312;
      **********idicawisos.com/1013000312;
      **********ibipaj.com/1013000312;
      **********upinycom.com/1013000312;
      **********ygizeq.com/1013000312;
      **********emolezala.com/1013000312;
      **********eriwihat.com/1013000312;
      **********ecolun.com/1013000312

Description inserted by Andrei Ilie on Tuesday, August 16, 2011
Description updated by Andrei Ilie on Tuesday, August 16, 2011

Back . . . .