luni, 23 decembrie 2019

Wista Antivirus - A variant of SpywareIsolator / SpyEraser

Wista Antivirus is an rogue antivirus which is name is really wista antivirus without any mistake or mispell this rogue is specified a clone of spywareisolator.
When starting the splash screen is loading.
After loading a scan with few non existent things has been loaded.
Interface Look Like This.

Upon this rogue has finished the scan is pop up an warning with an sound incoming look like a siren.

One or more threats are indecent somehow so i check back to settings to check out what he have.
 It said to turn on everything to pay up to 90 USD TO this rogue however i load ollydbg to check out to retrieve an activation key
 And this does every time click it have an sound effect so no pop up payload taskbar.Sounds idle
 And all stuff to turn on it require register of license :
 And if we see the infections of the spyware scan it look like this.
 How i do know the variant of SpywareIsolator and innovagest2000 / Bakasoftware?Mostly it have wav file and dll folder nothing at all include an rogue with large installer MB
The installer of the wista antivirus was identified.
wistaantivirus_setup.exe
MD5 bc73a7bf5758a10e53b6a5928b983c9e 
Adware.SpywareIsolator
Wistaantivirus.s
And now we are making the activation process.The fever of rogues on full version incoming.
 And finally we know what to do the code is 3927306263 with my caps off name as seen it check clipboard this rogue but it require to press the button.
 And finally success.Nice one full version and if we click on any attempt to remove the threats.
 So to have an high protection and threat remove it says to reboot the PC Process so it have glitch if on registred app said invalid key it corrects back to the previous valid.
 Well after restart registred and perfect :) no more false positive and disable the register button
 No found viruses.
 Turned on everything hmm.
 Then this one is falling on my attempt of full version.
 His name is funny but great thanks to Fedor22.For sharing this sample.
Video Review :
Stay away.This rogue sample was tested in 2018 - 2019 

duminică, 10 noiembrie 2019

System Adware Scanner 2010 - Rogue WinWebSec

System Adware scanner 2010 is a phony rogue which his site template is steal AVG And is installed without a pop up warning.Is a clone from the rogues : Security Tool , Smart Security (Fake) , Windows Smart Security . 2009 , system security 2009 etc.
Is being installer if the user click on a warning pop up :
If we try task manager it saying the following warning :
Affected and blocked exe are taskmgr.exe and the mbam.exe
 Once we click on this warning it installs automatically the system adware scanner 2010 and spawns fake alert about spyware , infected computer etc
The interface of system adware scanner 2010 look like :
Also this pop up will recreate the payload and making them fast itself the malware.
The system adware scanner have a checking and files left from scanning the fake threats once files left 0 all files are scanned and the scan is finished
Unlike this rogueware he have also a CPU Load by his process and GUI.
CPU load from this fake antivirus.
And now after finish all infections are fake but i am still wait for new payloads 
This fake antivirus once running cannot be killed process is behave like a system idle process or access denied to kill the fake antivirus using process explorer
But one more thing is to catch all payloads and other interesting and curious.
Let's try to turn on something
But we cannot enable anything when is activated

Nothing cannot be activated but is still keep to say to activate the aliases : sysadscanner SAS

 
 Continue Unprotected so when i still try to bypass fakealerts but they are more fast right now we cannot also change settings or disable

What about crack or get a license :
 Not too far but we remember attempts and we show more payloads on a infected pc
Lame license check
More payloads i have identifies but more problems and another fake alert 
More payloads i identified but their gui are not applied as system tool and other winwebsec family of rogues
But is blocking only taskmgr.exe nothing interesting from dumb rogueware Few leaks from his html code 
 Pop up ballon messages from taskbar




 Warnings differently any click rediect to payment page.
 SAS?Update maybe is checking around this rogueware

If we try help support there is :
 Saving the report file not too far
We are gonna now to register the software no matter 6 license one year month so here is a serial list dump :

SASNL-LUMUT-AXZCU-JUA55-MANDA
SASNL-LUMUT-AXZUY-JUA51-NBAHD
SASNL-LUMUT-AXUCY-JUA44-90DSA
SASNL-LUMUT-AUZCY-JUA41-20DSA
SASNL-LUMUT-UXZCY-JUA33-YSH2A
SASNL-LUMUT-AXZCU-UHA31-8JSA3
SASNL-LUMUT-AXZUY-UHA22-7HWBA
SASNL-LUMUT-AXUCY-UHA21-1IQBW
SASNL-LUMUT-AUZCY-UHA11-5BDFW
SASNL-LUMUT-UXZCY-UHA01-4JHSQ
SASYL-L2M2T-AXZC2-2HA55-3MDWI
SASYL-L2M2T-AXZ2Y-2HA51-2NJSW
SASYL-L2M2T-AX2CY-2HA44-4NDUW
SASYL-L2M2T-A2ZCY-2HA41-6SBNO
SASYL-L2M2T-2XZCY-2HA33-92NN2
SASYL-L2M2T-AXZC2-2HA31-N27SB
SASYL-L2M2T-AXZ2Y-2HA22-9DIQ9
SASYL-L2M2T-AX2CY-2HA21-72NSB
SASYL-L2M2T-A2ZCY-2HA11-10S9Z
SASYL-L2M2T-2XZCY-2HA01-82NIS
SASYL-L1M1T-AXZC1-JHA55-01KMQ
SASYL-L1M1T-AXZ1Y-JHA51-9W9IX
SASYL-L1M1T-AX1CY-JHA44-NB92M
SASYL-L1M1T-A1ZCY-JHA41-17JS9
SASYL-L1M1T-1XZCY-JHA33-0W9JZ
SASYL-L1M1T-AXZC1-JHA31-MN38D
SASYL-L1M1T-AXZ1Y-JHA22-6DJ93
SASYL-L1M1T-AX1CY-JHA12-P92OC
SASYL-L1M1T-A1ZCY-JHA11-JD72B
SASYL-L1M1T-1XZCY-JHA01-Z1X67
Clipboard check :
 Ok Nice registration but another trick is to create a file with extension .r

 c:\Documents and Settings\All Users\Application Datak4w4x7f7\k4w4x7f7.r
This is an example of trick registration with empty file also serial keys
c:\Documents and Settings\All Users\Application Data\k4w4x7f7
c:\Documents and Settings\All Users\Application Data\k4w4x7f7\k4w4x7f7
c:\Documents and Settings\All Users\Application Data\k4w4x7f7\k4w4x7f7.exe
c:\Documents and Settings\All Users\Application Data\k4w4x7f7\k4w4x7f7.i
c:\WINDOWS\system32\drivers\k4w4x7f7.sys
This is a random character executable you have to use license key but i research this type
of rogue virus antimalware 
 Is said to reboot the pc and the process will be normal after restart
A fake clean up so nothing real i guess.
 Once registred we can enable everything full version


 License type and rogueware warranty
 Enable everything :
 Update registred?Server error maybe online server but last update still change the version
System adware scanner 2010 1.01

Attempts to crack activate rogue and more ways to be smart than rogueav .Video About System Adware Scanner 2010 Here :
                                  

DO NOT TRUST SYSTEM ADWARE SCANNER 2010 ROGUE VIRUS SO A LOT OF WAYS AND ATTEMPTS TO DEFEAT THE FAKE ANTIVIRUS.
                               Thanks to : EnigmaSoft , Emisisoft and Andrew Mickleson
                        All helps to reverse and test the sample of fakeav




1.You can remove the bogus rogue with mbam This rogue will not block the legitimate cleaner
2.The command for uninstaller is buggy
3.Remove any registry entry which is negative and caused by this program

Curious to take the sample? Here is the md5 of the file d9f4025d3ea3cb0a26dabcf6176c45c8

marți, 3 septembrie 2019

Advanced Security Tool 2010 FakeRean

Advanced Security Tool 2010 is a rogue antivirus software once running it start implanting itself using a mof file and batch file to enter the rogue by itself in real legitimate windows security center
Interface GUI Is like this :
This is one not actually reskined by safety Antispyware and WinPC Defender however fakerean is tripled itself rogue family or other multiple times
How he implant itself to legitimate security center
He first open itself a batch file with command wscui.cpl and mofcomp it use the security center resources and command to make the rogue product visible to real security center

Look in trial version
So looking at other payloads and he also drop viruses junk files to be classifited as virus malware backdoor trojan and other it make invalid exe dll reg acebot and other it have random files name.
 If we ignore or click close or later or something to continue unprotected look like that

So i decided to activate the rogue :
 The version of activation is differently too far this rogue does not require email so pretty fragile for a little cracking for his code.
 Once we ignore bypass activation or a payload alert we got this
 And if we wanna to make change to turn off and on we got also this

I forgot once restart pc we get the payload un used by the rogue. replace explorer.
And support ?
 Here is all ingredients from this fakerean they are so located in %appdata%
asectool.exe md5 : a2f34f8c19beaff52730fd438570e133
He drop most of the files
So the payload like firewall alert is sinister :
It use the username of the PC And the ComputerName
Also update black version
This version is not blocking little bit from executables


I am also asked are you sure?


Activation Code after i debug little bit here is code i found :
3547-74831239063-9802

 After activation it show the code that is valid and store into registry Called Advanced Security
The dialog is a braviax looking window.
After i activated i need to cleanup and restart program.WHAT??
Threat removed.

Once activated i can also update but he refresh the inject of security center files because is turned on high protection
 Full version still no threats :
 Let's do an update



 And the legitimate security center was disabled or notify that rogue up to date and scanning virus on
You have to erase him with MBAM

I also tested on windows 10 and higher os but most fully error and compatibility mode to XP
Video Review i release him video review in 2017 and i cracked in 2019: