Categories: Trojan

Trojan:Win32/Ursnif.GM!MTB removal tips

The Trojan:Win32/Ursnif.GM!MTB is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan:Win32/Ursnif.GM!MTB virus can do?

  • Executable code extraction
  • Injection (inter-process)
  • Injection (Process Hollowing)
  • Injection with CreateRemoteThread in a remote process
  • Attempts to connect to a dead IP:Port (4 unique times)
  • Creates RWX memory
  • Possible date expiration check, exits too soon after checking local time
  • Mimics the system’s user agent string for its own requests
  • A process attempted to delay the analysis task.
  • At least one IP Address, Domain, or File Name was found in a crypto call
  • A named pipe was used for inter-process communication
  • Expresses interest in specific running processes
  • Repeatedly searches for a not-found process, may want to run with startbrowser=1 option
  • A process created a hidden window
  • Drops a binary and executes it
  • Performs some HTTP requests
  • Uses Windows utilities for basic functionality
  • Executed a process and injected code into it, probably while unpacking
  • Attempts to repeatedly call a single API many times in order to delay analysis time
  • A system process is generating network traffic likely as a result of process injection
  • Behavior consistent with a dropper attempting to download the next stage.
  • Installs itself for autorun at Windows startup
  • Checks the CPU name from registry, possibly for anti-virtualization
  • Attempts to modify proxy settings
  • Creates a copy of itself
  • Attempts to create or modify system certificates
  • Collects information to fingerprint the system

Related domains:

z.whorecord.xyz
a.tomx.xyz
www.ip-adress.com
ocsp.usertrust.com
crl.comodoca.com
ocsp.comodoca.com

How to determine Trojan:Win32/Ursnif.GM!MTB?


File Info:

crc32: F4D405F0md5: 6c5f500b3c3ce335702bc556899d8f52name: 88888.pngsha1: f89830c669f556f9b079c2052addb51b9a6c83c6sha256: cbabf502ff08c012a7dfeab5d1936f533a0c32981843ff892f4a32f2645f2f4csha512: 5058b38a8eaa1c8b771b052e3dfb6d19e66718c71c7cad3b623edd1f578f9c15c5a0cc115b3c8d9ff1aaeb992221634128122050f2f59bcd30997464f6c46c09ssdeep: 12288:dqWZfABVgs/aL+vF80Cxe9NN71IBTjAhdUU54Kn:IXPFamFhCo9Np1aTkwtype: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

LegalCopyright: xa9 2000-2012 DT Soft Ltd.InternalName: DTProHelper.exeFileVersion: 4.45.4.0315CompanyName: DT Soft LtdProductName: DAEMON Tools LiteProductVersion: 4.45.4.0315FileDescription: DAEMON Tools Lite Helper applicationOriginalFilename: DTProHelper.exeTranslation: 0x0409 0x04e4

Trojan:Win32/Ursnif.GM!MTB also known as:

MicroWorld-eScan Gen:Variant.Zusy.302928
Cylance Unsafe
BitDefender Gen:Variant.Zusy.302928
Cybereason malicious.669f55
APEX Malicious
GData Gen:Variant.Zusy.302928
Ad-Aware Gen:Variant.Zusy.302928
Emsisoft Gen:Variant.Zusy.302928 (B)
Comodo TrojWare.Win32.Qbot.AS@8rff2f
McAfee-GW-Edition BehavesLike.Win32.Rimecud.tz
Trapmine suspicious.low.ml.score
FireEye Generic.mg.6c5f500b3c3ce335
SentinelOne DFI – Malicious PE
Avira TR/AD.Qbot.ftmkk
Antiy-AVL GrayWare/Win32.Kryptik.ehls
Endgame malicious (high confidence)
Arcabit Trojan.Zusy.D49F50
Microsoft Trojan:Win32/Ursnif.GM!MTB
BitDefenderTheta Gen:NN.ZexaF.34108.@n0@aOluAvei
MAX malware (ai score=82)
ESET-NOD32 Win32/Qbot.CC
Rising Trojan.Kryptik!1.C427 (C64:YzY0Oud1pGoLZANn)
eGambit Unsafe.AI_Score_83%
Fortinet W32/Ursnif.CZ!tr
CrowdStrike win/malicious_confidence_100% (D)
Qihoo-360 HEUR/QVM20.1.0D5D.Malware.Gen

How to remove Trojan:Win32/Ursnif.GM!MTB?

  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.
Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Recent Posts

MSIL/GenKryptik.GXIZ information

The MSIL/GenKryptik.GXIZ is considered dangerous by lots of security experts. When this infection is active,…

2 days ago

Malware.AI.2789448175 (file analysis)

The Malware.AI.2789448175 is considered dangerous by lots of security experts. When this infection is active,…

2 days ago

Jalapeno.1878 removal instruction

The Jalapeno.1878 is considered dangerous by lots of security experts. When this infection is active,…

2 days ago

What is “Trojan.Heur3.LPT.YmKfaKBcBekib”?

The Trojan.Heur3.LPT.YmKfaKBcBekib is considered dangerous by lots of security experts. When this infection is active,…

2 days ago

How to remove “Worm.Win32.Vobfus.exmt”?

The Worm.Win32.Vobfus.exmt is considered dangerous by lots of security experts. When this infection is active,…

2 days ago

About “TrojanDownloader:Win32/Beebone.JO” infection

The TrojanDownloader:Win32/Beebone.JO is considered dangerous by lots of security experts. When this infection is active,…

2 days ago