Fake

What is “W32/FakeFire-G”?

Malware Removal

The W32/FakeFire-G is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What W32/FakeFire-G virus can do?

  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Presents an Authenticode digital signature
  • Creates RWX memory
  • Guard pages use detected – possible anti-debugging.
  • Dynamic (imported) function loading detected
  • Performs HTTP requests potentially not found in PCAP.
  • Enumerates the modules from a process (may be used to locate base addresses in process injection)
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • Authenticode signature is invalid
  • Anomalous binary characteristics

How to determine W32/FakeFire-G?


File Info:

name: 5114F77EAF2771604866.mlw
path: /opt/CAPEv2/storage/binaries/56f5ae8d979844e50688162d936da0e5b06000e97dff3c775fd25c0da236c8dd
crc32: 4A2BF075
md5: 5114f77eaf27716048664d8ab421ebb1
sha1: d589f67f2eb96f4d10bf86c7c7e3a4c8953eef3c
sha256: 56f5ae8d979844e50688162d936da0e5b06000e97dff3c775fd25c0da236c8dd
sha512: a498006a581c4167d98186063a8442840dbbf28075db5ba51fe8a8458a18e9c0b4db618c8f09ad0871f1682a1b7483deefa804855164890409111fc8f231e6f4
ssdeep: 24576:prRoNk7BZpwaewsAjTXVav9MkskCIabjKoh9Wj:prRokpDljkv9M8CIabjKoh9Wj
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1CE654A12B750CD36E16A04F729AA830719A97CA00B1253C7F7547E6E8B32BD1A7F7316
sha3_384: c41329fc1bfb916f6be3fd15eeed349e878e9411a7a6b0fb375b4a09417df404da5753f04851ee35fbc509eec35067ff
ep_bytes: ff250020400000000000000000000000
timestamp: 2006-03-07 06:04:44

Version Info:

Translation: 0x0000 0x04b0
Comments: vsta_ep32.exe
CompanyName: Microsoft Corporation
FileDescription: vsta_ep32.exe
FileVersion: 8.0.50727.146
InternalName: vsta_ep32.exe
LegalCopyright: © Microsoft Corporation. All rights reserved.
OriginalFilename: vsta_ep32.exe
ProductName: Microsoft (R) Visual Studio (R) 2005
ProductVersion: 8.0.50727.146
Assembly Version: 8.0.0.0

W32/FakeFire-G also known as:

BkavW32.AIDetectNet.01
tehtrisGeneric.Malware
MicroWorld-eScanTrojan.Agent.Xiang.A
ALYacTrojan.Agent.Xiang.A
CylanceUnsafe
Sangfor[MICROSOFT VISUAL BASIC 5.0]
Cybereasonmalicious.eaf277
BaiduWin32.Trojan.VB.t
CyrenW32/Emotet.BBS.gen!Eldorado
Elasticmalicious (high confidence)
APEXMalicious
ClamAVWin.Malware.Midie-9866099-0
BitDefenderTrojan.Agent.Xiang.A
AvastWin32:VB-FBX
SophosW32/FakeFire-G
DrWebWin32.HLLW.Autoruner.547
TrendMicroWORM_AUTORUN.BTM
McAfee-GW-EditionBehavesLike.Win32.Generic.th
FireEyeGeneric.mg.5114f77eaf277160
EmsisoftTrojan.Agent.Xiang.A (B)
SentinelOneStatic AI – Malicious PE
GDataMSIL.Worm.Pajetbin.A
JiangminPacked.Krap.gvyf
ArcabitTrojan.Agent.Xiang.A
MicrosoftTrojan:Win32/Wacatac.B!ml
CynetMalicious (score: 100)
Acronissuspicious
McAfeeArtemis!5114F77EAF27
MAXmalware (ai score=80)
VBA32Worm.AutoRun
MalwarebytesVB.Virus.FileInfector.DDS
TrendMicro-HouseCallWORM_AUTORUN.BTM
RisingWorm.VB!1.DA3E (CLASSIC)
YandexTrojan.GenAsa!g8z8LT30jj4
IkarusTrojan.Msil
MaxSecureTrojan.WIN32.msil.pse.1jjgixk_223201
FortinetW32/Ipamor.A5BC!tr
BitDefenderThetaAI:Packer.DFF53E5D1C
AVGWin32:VB-FBX
CrowdStrikewin/malicious_confidence_100% (D)

How to remove W32/FakeFire-G?

W32/FakeFire-G removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment