Дата обновления
24/02/2026

Класс: Trojan-FakeAV

Класс вредоносных программ, имитирующих работу антивирусного программного обеспечения или защитных компонентов операционной системы с целью получения от пользователя вознаграждения за обнаружение и удаление несуществующих угроз. Как правило, такие программы показывают множество нежелательных уведомлений, создают дискомфорт, тем самым стимулируя пользователя внести оплату. Иногда препятствуют нормальной работе компьютера, но, как правило, не блокируют систему полностью, чтобы не утратить кредит доверия жертвы.

Подробнее

Платформа: Win32

Win32 - платформа, управляемая операционной системой на базе Windows NT (Windows XP, Windows 7 и т.д.), позволяющей исполнять 32-битные приложения. В настоящее время данная платформа является одной из наиболее распространенных.

Семейство: Trojan-FakeAV.Win32.AdwareGuardian

Нет описания семейства

Примеры

AF403256938570C33082ECE2D6E73BE9
62CD81286705EE846782BCEC5C0E955C
4F3262CDBD90B1005AAE4671A6F05532
2D73026A05D829F490161467866F0962
A7E4E93825046CAB9B62EF20343F2E87

Тактики и Техники: Mitre*

TA0002
Execution
The adversary is trying to run malicious code. Execution consists of techniques that result in adversary-controlled code running on a local or remote system. Techniques that run malicious code are often paired with techniques from all other tactics to achieve broader goals, like exploring a network or stealing data. For example, an adversary might use a remote access tool to run a PowerShell script that does Remote System Discovery.
T1106
Native API
Adversaries may interact with the native OS application programming interface (API) to execute behaviors. Native APIs provide a controlled means of calling low-level OS services within the kernel, such as those involving hardware/devices, memory, and processes. These native APIs are leveraged by the OS during system boot (when other system components are not yet initialized) as well as carrying out tasks and requests during routine operations.
TA0007
Discovery
The adversary is trying to figure out your environment. Discovery consists of techniques an adversary may use to gain knowledge about the system and internal network. These techniques help adversaries observe the environment and orient themselves before deciding how to act. They also allow adversaries to explore what they can control and what's around their entry point in order to discover how it could benefit their current objective. Native operating system tools are often used toward this post-compromise information-gathering objective.
T1010
Application Window Discovery
Adversaries may attempt to get a listing of open application windows. Window listings could convey information about how the system is used. For example, information about application windows could be used identify potential data to collect as well as identifying security tooling (Security Software Discovery) to evade.

* © 2026 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation.

Kaspersky IT Security Calculator:
Оцените ваш профиль кибербезопасности
Узнать больше
Встречай новый Kaspersky!
Каждая минута твоей онлайн-жизни заслуживает топовой защиты.
Узнать больше
Do you want to save your changes?
Your message has been sent successfully.