Need help? Ask the community or hire an expert.
Go to Avira Answers
Nume:TR/Fakealert.aksl
Descoperit pe data de:03/06/2011
Tip:Troian
ITW:Da
Numar infectii raportate:Scazut
Potential de raspandire:Scazut
Potential de distrugere:Scazut spre mediu
Fisier static:Da
Versiune VDF:7.11.09.03 - vineri, 3 iunie 2011
Versiune IVDF:7.11.09.03 - vineri, 3 iunie 2011

 General Metoda de raspandire:
   • Nu are rutina proprie de raspandire


Alias:
   •  Kaspersky: Trojan.Win32.FakeAV.dcoy
   •  Sophos: Mal/FakeAV-JR
     Microsoft: Rogue:Win32/FakeRean


Sistem de operare:
   • Windows 2000
   • Windows XP
   • Windows 2003
    Windows Vista
    Windows 7


Efecte secundare:
   • Blocheaza accesul la website-uri ale firmelor de securitate
   • Creeaza fisiere
   • Reduce setarile de securitate
   • Modificari in registri


Imediat dupa lansarea in executie, pe ecran este afisat:




 Fisiere Se copiaza in urmatoarea locatie:
   • %HOME%\Local Settings\Application Data\%combinatie de caractere aleatoare%.exe



Sterge copia initiala a virusului.



Sunt create fisierele:

%TEMPDIR%\%combinatie de caractere aleatoare%
%ALLUSERSPROFILE%\Application Data\%combinatie de caractere aleatoare%
%HOME%\Local Settings\Application Data\%combinatie de caractere aleatoare%
%TEMPDIR%\%combinatie de caractere aleatoare%
%HOME%\Templates\%combinatie de caractere aleatoare%

 Registrii sistemului Urmatoarele chei sunt adaugate in registrii sistemului:

[HKLM\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\
   FirewallPolicy\StandardProfile]
   • "DoNotAllowExceptions"=dword:00000000
   • "EnableFirewall"=dword:00000000
   • "DisableNotifications"=dword:00000001

[HKLM\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\
   FirewallPolicy\DomainProfile]
   • "EnableFirewall"=dword:00000000
   • "DoNotAllowExceptions"=dword:00000000
   • "DisableNotifications"=dword:00000001

[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
   • "ctfmon.exe"="%SYSDIR%\ctfmon.exe"

[HKCR\.exe\shell\open\command]
   • "(Default)"="\"%HOME%\Local Settings\Application Data\\%combinatie de caractere aleatoare%.exe\" -a \"%1\" %*"
   • "IsolatedCommand"="\"%1\" %*"

[HKCR\exefile\shell\open\command]
   • "(Default)"="\"%HOME%\Local Settings\Application Data\\%combinatie de caractere aleatoare%.exe\" -a \"%1\" %*"
   • "IsolatedCommand"="\"%1\" %*"

[HKCR\exefile\shell\runas\command]
   • "(Default)"="\"%1\" %*"
   • "IsolatedCommand"="\"%1\" %*"

[HKLM\SOFTWARE\Clients\StartMenuInternet\IEXPLORE.EXE\shell\open\
   command]
   • "(Default)"="\"%HOME%\Local Settings\Application Data\\%combinatie de caractere aleatoare%.exe\" -a \"%PROGRAM FILES%\Intern"



Urmatoarea cheie din registri este modificata:

[HKLM\SOFTWARE\Microsoft\Security Center]
   Noua valoare:
   • "AntiVirusDisableNotify"=dword:00000001
   • "FirewallDisableNotify"=dword:00000001
   • "FirewallOverride"=dword:00000001
   • "UpdatesDisableNotify"=dword:00000001
   • "AntiVirusOverride"=dword:00000001

 Injectarea codului malware in alte procese Se injecteaza ca un thread remote intr-un proces.

    Numele procesului:
   • iexplore.exe


 Alte informatii Acceseaza resurse de pe internet:
   • **********yziriryvi.com/%cateva cifre aleatoare%;
      **********ipemura.com/%cateva cifre aleatoare%;
      **********awekugygil.com/%cateva cifre aleatoare%;
      **********ifyzadiby.com/%cateva cifre aleatoare%;
      **********ijinymut.com/%cateva cifre aleatoare%;
      **********uwemixonav.com/%cateva cifre aleatoare%;
      **********exynogemi.com/%cateva cifre aleatoare%;
      **********elaticik.com/%cateva cifre aleatoare%;
      **********inolecowary.com/%cateva cifre aleatoare%;
      **********ofociv.com/%cateva cifre aleatoare%;
      **********ucerybaqecy.com/%cateva cifre aleatoare%;
      **********upowibi.com/%cateva cifre aleatoare%;
      **********ujykolenuja.com/%cateva cifre aleatoare%;
      **********exyhun.com/%cateva cifre aleatoare%;
      **********oralipijago.com/%cateva cifre aleatoare%;
      **********ykacagatet.com/%cateva cifre aleatoare%;
      **********ulipum.com/%cateva cifre aleatoare%;
      **********isesyf.com/%cateva cifre aleatoare%;
      **********ityvik.com/%cateva cifre aleatoare%;
      **********ejutyhyfu.com/%cateva cifre aleatoare%;
      **********usaseda.com/%cateva cifre aleatoare%;
      **********ehiqino.com/%cateva cifre aleatoare%;
      **********idicawisos.com/%cateva cifre aleatoare%;
      **********ibipaj.com/%cateva cifre aleatoare%;
      **********ixydyf.com/%cateva cifre aleatoare%;
      **********unemymyko.com/%cateva cifre aleatoare%;
      **********upinycom.com/%cateva cifre aleatoare%;
      **********ygizeq.com/%cateva cifre aleatoare%;
      **********emolezala.com/%cateva cifre aleatoare%;
      **********ecolun.com/%cateva cifre aleatoare%

Description inserted by Andrei Ilie on Wednesday, August 24, 2011
Description updated by Andrei Ilie on Wednesday, August 24, 2011

Back . . . .