Třída: Trojan-FakeAV
Třída škodlivých programů, která simulují činnost antivirového softwaru nebo částí modulů zabezpečení operačního systému. Tyto programy jsou navrženy tak, aby vyloučily peníze od uživatelů, a to výměnou za údajné odhalení a odstranění hrozeb, které ve skutečnosti neexistují. Obecně řečeno, tento malware zobrazuje mnoho opakujících se vyskakovacích oken, aby se uživatel obával o bezpečnost svého systému a platil za falešný AV software. Navíc programy Trojan-FakeAV zabraňují správnému fungování počítače, ale ne úplně zabraňují operačnímu systému, aby uživatel uvěřil, že hrozba je důvěryhodná.Platfoma: Win32
Win32 je rozhraní API v operačních systémech Windows NT (Windows XP, Windows 7 atd.), Které podporují provádění 32bitových aplikací. Jedna z nejrozšířenějších programovacích platforem na světě.Family: Trojan-FakeAV.Win32.RegistrySmart
No family descriptionExamples
A9A49E0D5CB7A3EE2E739E51AE171B3A3D6691C09D30F85D7E11BCA1A7489946
843912A5CA6FA16E423F16E6387481D6
24B49DEB8F9C6F54E81C798BEFBA88E6
8CE9843D7E7F4792F7A816DBEBBAA0BC
Tactics and Techniques: Mitre*
TA0002
Execution
The adversary is trying to run malicious code.
Execution consists of techniques that result in adversary-controlled code running on a local or remote system. Techniques that run malicious code are often paired with techniques from all other tactics to achieve broader goals, like exploring a network or stealing data. For example, an adversary might use a remote access tool to run a PowerShell script that does Remote System Discovery.
Execution consists of techniques that result in adversary-controlled code running on a local or remote system. Techniques that run malicious code are often paired with techniques from all other tactics to achieve broader goals, like exploring a network or stealing data. For example, an adversary might use a remote access tool to run a PowerShell script that does Remote System Discovery.
T1204.002
User Execution: Malicious File
An adversary may rely upon a user opening a malicious file in order to gain execution. Users may be subjected to social engineering to get them to open a file that will lead to code execution. This user action will typically be observed as follow-on behavior from Spearphishing Attachment. Adversaries may use several types of files that require a user to execute them, including .doc, .pdf, .xls, .rtf, .scr, .exe, .lnk, .pif, and .cpl.
Adversaries may employ various forms of Masquerading and Obfuscated Files or Information to increase the likelihood that a user will open and successfully execute a malicious file. These methods may include using a familiar naming convention and/or password protecting the file and supplying instructions to a user on how to open it.(Citation: Password Protected Word Docs)
While Malicious File frequently occurs shortly after Initial Access it may occur at other phases of an intrusion, such as when an adversary places a file in a shared directory or on a user's desktop hoping that a user will click on it. This activity may also be seen shortly after Internal Spearphishing.
Adversaries may employ various forms of Masquerading and Obfuscated Files or Information to increase the likelihood that a user will open and successfully execute a malicious file. These methods may include using a familiar naming convention and/or password protecting the file and supplying instructions to a user on how to open it.(Citation: Password Protected Word Docs)
While Malicious File frequently occurs shortly after Initial Access it may occur at other phases of an intrusion, such as when an adversary places a file in a shared directory or on a user's desktop hoping that a user will click on it. This activity may also be seen shortly after Internal Spearphishing.
* © 2026 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation.