This is a Trojan detection. Unlike viruses, trojans do not self-replicate. They are spread manually, often under the premise that they are beneficial or wanted. The most common installation methods involve system or security exploitation, and unsuspecting users manually executing unknown programs. Distribution channels include email, malicious or hacked web pages, Internet Relay Chat (IRC), peer-to-peer networks, etc.
6984 (2013-02-12)Updated DAT
“FakeAlert-WinWebSec!env.h “is a malicious Trojan that may represent security risk for the compromised system and/or its network environment. The Trojan displays fake alert messages. And the Trojan informs the user that they need to pay money to register the software in order to remove threats.
Upon execution, Trojan connects to the following URL’s
After execution, it creates the following files in below location:
And creates directories in the below location to the system:
After execution the Trojan displays the following Fake Alert messages:
Upon execution, the Trojan adds the following registry keys to the system:
The following are the registry key values have been added to the system:
The above mentioned registry ensures that, the Trojan executes itself upon system boot.
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial. Distribution channels include IRC, peer-to-peer networks, newsgroup postings, email spam, etc.
Use current engine and DAT files for detection and removal.
Modifications made to the system Registry and/or INI files for the purposes of hooking system startup, will be successfully removed if cleaning with the recommended engine and DAT combination (or higher).