Home / malwarePDF  

Rogue:VBS/FakePAV


First posted on 21 February 2014.
Source: Microsoft

Aliases :

There are no other names known for Rogue:VBS/FakePAV.

Explanation :

Threat behavior

This threat is a malicious VBE file with encoded VBScript that is used to download a copy of the FakePAV family.

When run, this threat tries to connect to a server and download a file. The name of the server and the file to is hardcoded into the threat, and differs between samples. We have seen it use the following URLs:

  • http://9aad47979865a49c8dae-7e5e590511867516e679d8131e8f65d1.r13.cf2.rackcdn.com/b661d395113bc6c61ef19ba9062e6352.exe
  • http://a13a18e1774547ca2dc5-a941e09a8ebc3a85367c1ba4d545bd67.r11.cf2.rackcdn.com/7b46a66b3ce37eb916e5e89b76968f48.exe
  • http://a13a18e1774547ca2dc5-a941e09a8ebc3a85367c1ba4d545bd67.r11.cf2.rackcdn.com/c9b969ce1676e613b12357501d9aa80a.exe
  • http://d3d2366d8762287e8257-19dc26c51ead3b4fd8eb395f59b15bcb.r59.cf2.rackcdn.com/setup.exe


We have seen the threat download the file to the %TEMP% folder with the file name file.exe or Setup.exe.vbe.

Additional information

This threat uses the document object model (DOM) controls MSXML2.XMLHTTP and ADODB.Stream for communication and file transfer purposes when downloading the .exe file.



Analysis by Wei Li

Symptoms

Alerts from your security software may be the only symptom.

Also see the FakePAV description for information about the software that this threat downloads onto your PC.

Last update 21 February 2014

 

TOP