Fake

Win32:FakeAV-EKA [Trj] malicious file

Malware Removal

The Win32:FakeAV-EKA [Trj] is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Win32:FakeAV-EKA [Trj] virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Sample contains Overlay data
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • Authenticode signature is invalid

How to determine Win32:FakeAV-EKA [Trj]?


File Info:

name: AB2C0FDE152068B38980.mlw
path: /opt/CAPEv2/storage/binaries/1c38e0dcd6ef14c21e7b0c31563ec897ea931cc564bb0e7586ee7ced6783af27
crc32: A8226407
md5: ab2c0fde152068b3898034a09101bff0
sha1: e70886f62375585991f5b9a810793a722138e5e0
sha256: 1c38e0dcd6ef14c21e7b0c31563ec897ea931cc564bb0e7586ee7ced6783af27
sha512: 6000ff60f7099188179ebb11747cb40befce4537aff29dea83ff2031999c68d04d51e7b879e2925fbf16954a8cc5979089b5425eb9c85fb9a296a40ccbea0a37
ssdeep: 1536:w/pKkZUoGdhs8DXU3gpmrrcrhLn34+qbE7A7Eo/zGLZjGdhs8DXU3g7:rkP6jDXUHA34+sFid6jDXU0
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T13EA3E1C3B948624EC850A6B3443B1E7D67268E17D55A620FC1C372AB4CD33919FABD1B
sha3_384: ac108bee25435223933a195ef845d3688db670d5f3ba09ef58aa81f53a4f975486164028ade206b24d6931ab67331843
ep_bytes: 68142140005e83c6928b366a5659c1e6
timestamp: 2013-02-03 21:44:44

Version Info:

0: [No Data]

Win32:FakeAV-EKA [Trj] also known as:

BkavW32.AIDetectMalware
LionicTrojan.Win32.Generic.lmka
Elasticmalicious (high confidence)
MicroWorld-eScanTrojan.VIZ.Gen.1
CAT-QuickHealTrojan.Urausy.C
SkyhighBehavesLike.Win32.Dropper.nh
McAfeeBackDoor-FJW
MalwarebytesTrojan.LameShield
ZillyaTrojan.Kryptik.Win32.4356152
SangforTrojan.Win32.Save.a
K7AntiVirusTrojan ( 0040f2c01 )
AlibabaRansom:Win32/Katusha.de6e199c
K7GWTrojan ( 0040f2c01 )
Cybereasonmalicious.623755
SymantecML.Attribute.HighConfidence
tehtrisGeneric.Malware
ESET-NOD32Win32/Kryptik.AUOV
APEXMalicious
CynetMalicious (score: 100)
KasperskyPacked.Win32.Katusha.y
BitDefenderTrojan.VIZ.Gen.1
NANO-AntivirusVirus.Win32.Gen-Crypt.ccnc
SUPERAntiSpywareTrojan.Agent/Gen-RogueRel
AvastWin32:FakeAV-EKA [Trj]
TencentWin32.Packed.Katusha.Xmhl
EmsisoftTrojan.VIZ.Gen.1 (B)
F-SecureTrojan.TR/Rogue.kdzzonw
DrWebTrojan.Inject4.65015
VIPRETrojan.VIZ.Gen.1
TrendMicroTROJ_FAKEAV.SMCC
Trapminemalicious.high.ml.score
FireEyeGeneric.mg.ab2c0fde152068b3
SophosMal/Zbot-KR
SentinelOneStatic AI – Malicious PE
GDataTrojan.VIZ.Gen.1
JiangminTrojan/Tepfer.Gen
GoogleDetected
AviraTR/Rogue.kdzzonw
MAXmalware (ai score=100)
Antiy-AVLTrojan[Packed]/Win32.Katusha
Kingsoftmalware.kb.a.1000
XcitiumTrojWare.Win32.Kryptik.AUOV@4ub47w
ArcabitTrojan.VIZ.Gen.1
ViRobotTrojan.Win32.S.Zbot.98304.BJ
ZoneAlarmPacked.Win32.Katusha.y
MicrosoftRansom:Win32/Urausy.C
VaristW32/FakeAlert.XH.gen!Eldorado
AhnLab-V3Spyware/Win32.Zbot.R52731
Acronissuspicious
VBA32Heur.Trojan.Hlux
ALYacTrojan.VIZ.Gen.1
TACHYONTrojan-PWS/W32.Tepfer.98304.T
Cylanceunsafe
PandaTrj/Tepfer.B
TrendMicro-HouseCallTROJ_FAKEAV.SMCC
RisingBackdoor.Kelihos!1.68F2 (CLASSIC)
YandexTrojan.Kryptik!FnKM1gOaK6k
IkarusTrojan.Win32.Urausy
MaxSecureTrojan.PSW.Tepfer.chmq
FortinetW32/Kryptik.X!tr
BitDefenderThetaGen:NN.ZexaF.36744.gqY@a0LOdvoO
AVGWin32:FakeAV-EKA [Trj]
DeepInstinctMALICIOUS
CrowdStrikewin/malicious_confidence_100% (W)

How to remove Win32:FakeAV-EKA [Trj]?

Win32:FakeAV-EKA [Trj] removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment