Malware

What is “Ser.Ursu.8216”?

Malware Removal

The Ser.Ursu.8216 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Ser.Ursu.8216 virus can do?

  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Behavioural detection: Executable code extraction – unpacking
  • Executed a command line with /C or /R argument to terminate command shell on completion which can be used to hide execution
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • Guard pages use detected – possible anti-debugging.
  • Dynamic (imported) function loading detected
  • Enumerates running processes
  • Expresses interest in specific running processes
  • Reads data out of its own binary image
  • A process created a hidden window
  • CAPE extracted potentially suspicious content
  • Executed a command line with /V argument which modifies variable behaviour and whitespace allowing for increased obfuscation options
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Uses Windows utilities for basic functionality
  • Behavioural detection: Injection (Process Hollowing)
  • Executed a process and injected code into it, probably while unpacking
  • Code injection with CreateRemoteThread in a remote process
  • Deletes its original binary from disk
  • Behavioural detection: Injection (inter-process)
  • Behavioural detection: Injection with CreateRemoteThread in a remote process
  • Collects and encrypts information about the computer likely to send to C2 server
  • Creates a hidden or system file
  • Collects information to fingerprint the system

How to determine Ser.Ursu.8216?


File Info:

name: 8321580DCCE1B44F85A4.mlw
path: /opt/CAPEv2/storage/binaries/8f3edb385fc5601a7f02a7576e2455b4682deba0ac050a601c757ea29949002e
crc32: 0D848C6A
md5: 8321580dcce1b44f85a4b6997f99d0cd
sha1: f881b9c162e33ead822465dc0d0bdf38883ecee2
sha256: 8f3edb385fc5601a7f02a7576e2455b4682deba0ac050a601c757ea29949002e
sha512: 2dfc3ead360ba8a3268f0cad65ada45aaf1ef31303926012d71396be4aff8d0844c7a48fd099e9fbd9c491574f78039b593ba92e910608b23a417c3eabb490d5
ssdeep: 6144:Sd3h2Cd1lXktWnvlxXMiUB8O30fCJRCx1Gc+IvcrwWx7ho:Etd1lUo0iM8/1x1adq
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1C874EFD3E190AA2BDD9C37B05A19813CA362131D9B19C1977EC9D0C21AD37C59D3EA8F
sha3_384: 2e422f262140072562f0fde175d59c4f7169c21a2d7949f9242041bdd5a023c43d5c9c28e587dd819ee54da8393b0a1e
ep_bytes: ff250020400000000000000000000000
timestamp: 2014-10-01 11:15:34

Version Info:

Translation: 0x0000 0x04b0
Comments: XXNxyLuBLhmu
FileDescription: XXNxyLuBLhmu
FileVersion: 3.0.0.0
InternalName: iZKWxCz.exe
LegalCopyright: (C) XXNxyLuBLhmu
OriginalFilename: iZKWxCz.exe
ProductVersion: 3.0.0.0
Assembly Version: 3.0.0.0

Ser.Ursu.8216 also known as:

Elasticmalicious (high confidence)
DrWebTrojan.PWS.Panda.5676
MicroWorld-eScanGen:Variant.Ser.Ursu.8216
FireEyeGeneric.mg.8321580dcce1b44f
CAT-QuickHealTrojan.Inject.DN3
McAfeePWSZbot-FAEB!8321580DCCE1
CylanceUnsafe
SangforTrojan.Win32.Zusy.109216
K7AntiVirusTrojan ( 700000121 )
K7GWTrojan ( 700000121 )
Cybereasonmalicious.dcce1b
BitDefenderThetaGen:NN.ZemsilF.34084.vm3@auo3UHl
CyrenW32/Trojan.ZHRK-5765
SymantecML.Attribute.HighConfidence
ESET-NOD32Win32/Spy.Zbot.AAU
TrendMicro-HouseCallTROJ_FORUCON.BME
Paloaltogeneric.ml
ClamAVWin.Trojan.Agent-1364455
KasperskyHEUR:Trojan.Win32.Generic
BitDefenderGen:Variant.Ser.Ursu.8216
NANO-AntivirusTrojan.Win32.Panda.dkjthb
SUPERAntiSpywareTrojan.Agent/Gen-Barys
AvastMSIL:GenMalicious-BLW [Trj]
TencentMalware.Win32.Gencirc.10b6db1e
Ad-AwareGen:Variant.Ser.Ursu.8216
EmsisoftGen:Variant.Ser.Ursu.8216 (B)
ComodoMalware@#az22lxc0oq6n
BaiduMSIL.Trojan.Injector.a
VIPRETrojan.Win32.Generic!BT
TrendMicroTROJ_FORUCON.BME
McAfee-GW-EditionPWSZbot-FAEB!8321580DCCE1
SophosTroj/Msil-ANY
IkarusTrojan-Spy.Zbot
GDataGen:Variant.Ser.Ursu.8216
JiangminTrojan/Inject.auah
MaxSecureTrojan.Malware.300983.susgen
AviraTR/Barys.sltn
Antiy-AVLTrojan/Generic.ASMalwS.C2E11E
KingsoftWin32.Troj.Inject.sl.(kcloud)
ArcabitTrojan.Ser.Ursu.D2018
MicrosoftPWS:Win32/Zbot!rfn
CynetMalicious (score: 99)
AhnLab-V3Trojan/Win32.Backdoor.R120687
VBA32Trojan.Inject
ALYacGen:Variant.Ser.Ursu.8216
MAXmalware (ai score=80)
MalwarebytesTrojan.Injector
APEXMalicious
RisingMalware.FakePDF/ICON!1.9C3A (CLASSIC)
YandexTrojan.Inject!TeGyjpHj9rc
SentinelOneStatic AI – Malicious PE
eGambitUnsafe.AI_Score_99%
FortinetMSIL/Injector.FNO!tr
WebrootW32.Infostealer.Zeus
AVGMSIL:GenMalicious-BLW [Trj]
PandaTrj/Orbond.A
CrowdStrikewin/malicious_confidence_80% (D)

How to remove Ser.Ursu.8216?

Ser.Ursu.8216 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment