Trojan

Trojan:Win32/Ulise.AMS!MTB removal guide

Malware Removal

The Trojan:Win32/Ulise.AMS!MTB is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan:Win32/Ulise.AMS!MTB virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Sample contains Overlay data
  • Uses Windows utilities for basic functionality
  • CAPE extracted potentially suspicious content
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Uses Windows utilities to create a scheduled task
  • Deletes executed files from disk
  • Uses suspicious command line tools or Windows utilities
  • Yara rule detections observed from a process memory dump/dropped files/CAPE

How to determine Trojan:Win32/Ulise.AMS!MTB?


File Info:

name: D00B4A4A9ED4365703AA.mlw
path: /opt/CAPEv2/storage/binaries/1ac753554139fe096c9dec8126d89e17623ed0808e457da175d93c05b733a172
crc32: 1E6F74A0
md5: d00b4a4a9ed4365703aaf35efebf3bae
sha1: 802a06642e34356b1da391368a8b311bf9766aac
sha256: 1ac753554139fe096c9dec8126d89e17623ed0808e457da175d93c05b733a172
sha512: fb5a5d16f6d7ceab54c9825a6edb819fd467ee8adf3f7cbe50c3fc02843f48fb9c23f1a0c3c880196e9c1fea8b3ed37672b37f95aac1a095da0500e5d08cce2d
ssdeep: 12288:80iMgQw8mNiehTDTta5Wn5TIsU3EUqaPlT+D8t20:I78mNieVDTdlU0vga8g0
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T194C4F1FF732B83A2C1A36735574225D06390F5B9F37A85B4AA88A058F427B10557EEC3
sha3_384: 7750ddecbba295658641ff5c7c132a5e0c3fd9870a21f0fe665088fd127546e1f1bf5ec91b03ef0786ad7679dcc61bd2
ep_bytes: bf0000000083ec04891c2481e8404f57
timestamp: 1974-02-09 00:00:00

Version Info:

0: [No Data]

Trojan:Win32/Ulise.AMS!MTB also known as:

BkavW32.AIDetectMalware
LionicTrojan.Win32.Khalesi.4!c
MicroWorld-eScanGen:Variant.Babar.247571
ClamAVWin.Malware.Ibbgt-9875218-0
SkyhighBehavesLike.Win32.Ctsinf.hc
McAfeeGlupteba-FTTQ!D00B4A4A9ED4
MalwarebytesMalware.AI.1540371875
ZillyaTrojan.Kryptik.Win32.4355482
SangforSuspicious.Win32.Save.a
K7AntiVirusTrojan ( 0058e60a1 )
AlibabaTrojan:Win32/Khalesi.56579bb0
K7GWTrojan ( 0058e60a1 )
CrowdStrikewin/malicious_confidence_100% (W)
ArcabitTrojan.Babar.D3C713
BitDefenderThetaGen:NN.ZexaE.36680.I4Z@auQLV4
SymantecML.Attribute.HighConfidence
Elasticmalicious (high confidence)
ESET-NOD32a variant of Win32/Kryptik.HTKQ
APEXMalicious
CynetMalicious (score: 100)
KasperskyHEUR:Trojan.Win32.Khalesi.pef
BitDefenderGen:Variant.Babar.247571
NANO-AntivirusVirus.Win32.Gen.ccmw
AvastWin32:Evo-gen [Trj]
SophosMal/Generic-S
F-SecureTrojan.TR/Crypt.XPACK.Gen
VIPREGen:Variant.Babar.247571
TrendMicroTROJ_GEN.R002C0PK223
EmsisoftGen:Variant.Babar.247571 (B)
SentinelOneStatic AI – Malicious PE
GoogleDetected
AviraTR/Crypt.XPACK.Gen
Antiy-AVLTrojan/Win32.Kryptik
Kingsoftmalware.kb.a.996
MicrosoftTrojan:Win32/Ulise.AMS!MTB
ZoneAlarmHEUR:Trojan.Win32.Khalesi.pef
GDataGen:Variant.Babar.247571
VaristW32/Kryptik.JCS.gen!Eldorado
Acronissuspicious
VBA32BScope.Trojan.Wacatac
MAXmalware (ai score=80)
Cylanceunsafe
PandaTrj/Chgt.AC
TrendMicro-HouseCallTROJ_GEN.R002C0PK223
RisingTrojan.Kryptik!1.BF57 (CLASSIC)
IkarusTrojan.Win32.Krypt
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/GenKryptik.CTNW!tr
AVGWin32:Evo-gen [Trj]
Cybereasonmalicious.42e343
DeepInstinctMALICIOUS

How to remove Trojan:Win32/Ulise.AMS!MTB?

Trojan:Win32/Ulise.AMS!MTB removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment