Fake Trojan

Trojan.Win32.MicroFake.bc (file analysis)

Malware Removal

The Trojan.Win32.MicroFake.bc is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Win32.MicroFake.bc virus can do?

  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Dynamic (imported) function loading detected
  • Unconventionial language used in binary resources: Korean
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • The executable is compressed using UPX
  • Authenticode signature is invalid
  • Attempts to modify proxy settings
  • Harvests cookies for information gathering

How to determine Trojan.Win32.MicroFake.bc?


File Info:

name: 6B0293AFE67E18DEB21A.mlw
path: /opt/CAPEv2/storage/binaries/f3e13143ab8ea1dcb309554e6eb704b7ee2c4aa981c7e084126c06bb8b623868
crc32: 0B7FCB17
md5: 6b0293afe67e18deb21a973c10e49560
sha1: 4c148a1cf932dce63368ce40f0286c87abdd2496
sha256: f3e13143ab8ea1dcb309554e6eb704b7ee2c4aa981c7e084126c06bb8b623868
sha512: 7acace90530906208e207bc1dec3a28d0c13f6941c7436b3fecffb1bb5d90a35add9d51314fed8f8a48366de796a53f7327813358b21917255eb22fbbe4ed17a
ssdeep: 384:3DD+l646DFunJTCH8tEXZxxN8eSeKnycdMOn9S5bWGGYXeZ1hA+FiLyOXWYpd:TD+ldCH8yv8euycdMOnKbWhTy+F6nP
type: PE32 executable (console) Intel 80386, for MS Windows
tlsh: T128F2C0447BE8C5E2E63A57720AF64F079A5BFD22C668D54E37DC18492B72A20BE30701
sha3_384: f5b21641e42d83fa801bb793a08ea1b940f4257edbedcd7a281f241b9ebf1b40fe787473a75959f3fc7d8ac5d62bbe2f
ep_bytes: 60be00c040008dbe0050ffff57eb0b90
timestamp: 2010-05-26 11:22:40

Version Info:

Comments:
CompanyName: Microsoft Corporation
FileDescription: TCP/IP Netstat Command
FileVersion: 5, 0, 0, 0
InternalName: netstat.exe
LegalCopyright: ⓒ Microsoft Corporation. All rights reserved.
LegalTrademarks:
OriginalFilename: netstat.exe
PrivateBuild:
ProductName: netstat.exe
ProductVersion: 5.1.2600.5512 (xpsp.080413-0852)
SpecialBuild:
Translation: 0x0409 0x04b0

Trojan.Win32.MicroFake.bc also known as:

BkavW32.AIDetect.malware2
LionicTrojan.Win32.MicroFake.4!c
Elasticmalicious (high confidence)
MicroWorld-eScanTrojan.GenericKD.47475749
FireEyeGeneric.mg.6b0293afe67e18de
McAfeeArtemis!6B0293AFE67E
ZillyaTrojan.MicroFake.Win32.105
K7AntiVirusRiskware ( 0040eff71 )
AlibabaTrojan:Win32/MicroFake.14ff9909
K7GWRiskware ( 0040eff71 )
SymantecML.Attribute.HighConfidence
APEXMalicious
KasperskyTrojan.Win32.MicroFake.bc
BitDefenderTrojan.GenericKD.47475749
NANO-AntivirusTrojan.Win32.MicroFake.voybo
AvastWin32:Malware-gen
TencentWin32.Trojan.Microfake.Wnwc
Ad-AwareTrojan.GenericKD.47475749
SophosMal/Generic-S
ComodoMalware@#erpamnk8wazr
VIPRETrojan.Win32.Generic!BT
McAfee-GW-EditionBehavesLike.Win32.Fake.nt
EmsisoftTrojan.GenericKD.47475749 (B)
SentinelOneStatic AI – Malicious PE
GDataTrojan.GenericKD.47475749
AviraTR/MicroFake.kuqro
Antiy-AVLTrojan/Generic.ASMalwS.3E3DFB
KingsoftWin32.Troj.MicroFake..(kcloud)
GridinsoftRansom.Win32.Wacatac.sa
MicrosoftTrojan:Win32/Wacatac.B!ml
CynetMalicious (score: 100)
Acronissuspicious
BitDefenderThetaGen:NN.ZexaF.34294.cmMfaiOxReoG
MAXmalware (ai score=88)
TrendMicro-HouseCallTROJ_GEN.R002H0CKN21
FortinetW32/MicroFake.BC!tr
AVGWin32:Malware-gen
PandaTrj/CI.A
CrowdStrikewin/malicious_confidence_90% (W)

How to remove Trojan.Win32.MicroFake.bc?

Trojan.Win32.MicroFake.bc removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment