Spy Trojan

Should I remove “Trojan-Spy.Win32.Ursnif.zsc”?

Malware Removal

The Trojan-Spy.Win32.Ursnif.zsc is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan-Spy.Win32.Ursnif.zsc virus can do?

  • Executable code extraction
  • Attempts to connect to a dead IP:Port (1 unique times)
  • Creates RWX memory
  • Performs some HTTP requests
  • Unconventionial language used in binary resources: Portuguese (Brazilian)
  • The binary likely contains encrypted or compressed data.
  • Uses Windows utilities for basic functionality
  • Attempts to repeatedly call a single API many times in order to delay analysis time
  • Exhibits possible ransomware file modification behavior
  • Creates a hidden or system file
  • Attempts to modify proxy settings
  • Anomalous binary characteristics

Related domains:

www.bing.com
app.kartop.at

How to determine Trojan-Spy.Win32.Ursnif.zsc?


File Info:

crc32: AA4C091D
md5: 23a1cb3239473579be27a4724d0b9ba3
name: 23A1CB3239473579BE27A4724D0B9BA3.mlw
sha1: ca2ddb66a49ffce1fa2bbe2e47a8bc242f0cddcd
sha256: cddd59dabb070458fb28f3cd1a1b5f18404e96588e97aa86918c4ba9e876e01d
sha512: f9ca0538f2e3fd66175ae881da7b602b95191d8ed6600d1b895e235cc67b429b02da3ff48c8c1b2236ccd7727aa51f190902c9693531fe700196f1fd87dfd7c4
ssdeep: 3072:kfFzW8wHBrxaPHuh+mfcP8aiRazLNzDRcmIKGx7QUiQdJy9e:izNwHBrxDTcLN/RCKGVikJ0e
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

FileVersion: 1.0.0.2
Translation: 0x0809 0x04b0

Trojan-Spy.Win32.Ursnif.zsc also known as:

BkavW32.AIDetect.malware1
K7AntiVirusTrojan ( 0053d5971 )
LionicTrojan.Win32.Ursnif.4!c
Elasticmalicious (high confidence)
DrWebTrojan.Encoder.25976
CynetMalicious (score: 100)
ALYacTrojan.BRMon.Gen.4
CylanceUnsafe
SangforTrojan.Win32.Save.a
CrowdStrikewin/malicious_confidence_80% (D)
AlibabaTrojanSpy:Win32/Ursnif.7d6ecbd5
K7GWTrojan ( 0053d5971 )
Cybereasonmalicious.239473
ESET-NOD32a variant of Win32/Kryptik.GKVF
APEXMalicious
AvastWin32:PWSX-gen [Trj]
KasperskyTrojan-Spy.Win32.Ursnif.zsc
BitDefenderTrojan.BRMon.Gen.4
NANO-AntivirusTrojan.Win32.Ursnif.fhuaka
ViRobotTrojan.Win32.U.GandCrab.173568
MicroWorld-eScanTrojan.BRMon.Gen.4
TencentWin32.Trojan-spy.Ursnif.Hqvh
Ad-AwareTrojan.BRMon.Gen.4
SophosMal/Generic-R + Mal/GandCrab-B
ComodoTrojWare.Win32.TrojanSpy.Ursnif.EM@7vyz23
BitDefenderThetaGen:NN.ZexaF.34126.iu0@amJuJphG
TrendMicroTSPY_URSNIF.THAOOCAH
McAfee-GW-EditionBehavesLike.Win32.Generic.ch
FireEyeGeneric.mg.23a1cb3239473579
EmsisoftTrojan.BRMon.Gen.4 (B)
SentinelOneStatic AI – Malicious PE
JiangminTrojan.PSW.Fareit.vdd
AviraHEUR/AGEN.1106537
eGambitUnsafe.AI_Score_95%
MicrosoftTrojan:Win32/Wacatac.B!ml
ZoneAlarmTrojan-Spy.Win32.Ursnif.zsc
GDataWin32.Trojan-Ransom.GandCrab.O
AhnLab-V3Trojan/Win32.Kryptik.R255366
Acronissuspicious
McAfeeTrojan-FQPW!23A1CB323947
VBA32BScope.TrojanRansom.GandCrypt
MalwarebytesMalware.AI.1996488247
PandaTrj/GdSda.A
TrendMicro-HouseCallTSPY_URSNIF.THAOOCAH
RisingTrojan.Generic@ML.100 (RDML:fHNOCZtc9yxp4wu0nNcb6Q)
YandexTrojan.GenAsa!Z7n54DAc300
IkarusTrojan.Win32.Ranumbot
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/Kryptik.GMSM!tr
AVGWin32:PWSX-gen [Trj]
Paloaltogeneric.ml

How to remove Trojan-Spy.Win32.Ursnif.zsc?

Trojan-Spy.Win32.Ursnif.zsc removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment