Categories: Malware

Ursu.152098 (B) removal guide

The Ursu.152098 (B) is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Ursu.152098 (B) virus can do?

  • Attempts to connect to a dead IP:Port (4 unique times)
  • Creates RWX memory
  • Possible date expiration check, exits too soon after checking local time
  • A process attempted to delay the analysis task.
  • Reads data out of its own binary image
  • ‘Google Drive’ in HTML Title but connection is not HTTPS. Possibly indicative of phishing.
  • Drops a binary and executes it
  • Performs some HTTP requests
  • Unconventionial language used in binary resources: Turkish
  • The binary likely contains encrypted or compressed data.
  • Network activity contains more than one unique useragent.
  • Installs itself for autorun at Windows startup
  • Creates a hidden or system file
  • Attempts to modify proxy settings
  • Creates a copy of itself
  • Anomalous binary characteristics

Related domains:

z.whorecord.xyz
a.tomx.xyz
xred.mooo.com
freedns.afraid.org
ocsp.pki.goog

How to determine Ursu.152098 (B)?


File Info:

crc32: 96F16873md5: fe788f5565c4b0afbff28073f7b5ff12name: vs_community__2141795133.1574218114.exesha1: 89b8da84193eb007f171496bae2b8068a47b3ba6sha256: dff9c048ef9de9c3fa8a148e8cc4d848f1ab58fbb7b6319598f24946f84dc247sha512: 43af28e777d33cb97f72db6ca582e98a98bec07444597d75473afef90f37c777b1c0a97945c9dae1655e793438bfa8dfe9fda77958b8a78e26d3654baf6f7dbbssdeep: 49152:VnsHyjtk2MYC5GDj22xfVHZq+SvKA1ox4oXRAfdGDa4LHbV35WJ:Vnsmtk2as22xfVHo+IzCx9imvVsJtype: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

LegalCopyright: InternalName: FileVersion: 1.0.0.4CompanyName: SynapticsLegalTrademarks: Comments: ProductName: Synaptics Pointing Device DriverProductVersion: 1.0.0.0FileDescription: Synaptics Pointing Device DriverOriginalFilename: Translation: 0x041f 0x04e6

Ursu.152098 (B) also known as:

MicroWorld-eScan Gen:Variant.Ursu.152098
FireEye Generic.mg.fe788f5565c4b0af
McAfee GenericRXCB-VC!FE788F5565C4
Cylance Unsafe
VIPRE BehavesLike.Win32.Malware.eah (mx-v)
Sangfor Malware
K7AntiVirus Riskware ( 0040eff71 )
BitDefender Gen:Variant.Ursu.152098
K7GW Riskware ( 0040eff71 )
Cybereason malicious.565c4b
Invincea heuristic
Cyren PP97M/Script.gen
Symantec ML.Attribute.HighConfidence
APEX Malicious
ClamAV Win.Malware.Delf-6899401-0
GData Gen:Variant.Ursu.152098
Kaspersky Backdoor.Win32.DarkKomet.hqxy
NANO-Antivirus Trojan.Win32.DarkKomet.fazbwq
Avast Win32:Zorex-E [Wrm]
Endgame malicious (high confidence)
Emsisoft Gen:Variant.Ursu.152098 (B)
Comodo Virus.Win32.Agent.DE@74b38h
F-Secure Trojan:W97M/MaliciousMacro.GEN
DrWeb Trojan.DownLoader22.9658
Zillya Trojan.Delf.Win32.76144
TrendMicro TROJ_SYMMI_GA250982.UVPM
McAfee-GW-Edition BehavesLike.Win32.Dropper.vc
Sophos ElReceptor Keyboard Hook (PUA)
Ikarus Virus.Win32.Delf
F-Prot PP97M/Script.gen
Jiangmin Trojan.Generic.bhoqf
Webroot W32.Malware.gen
Avira JS/Dldr.Agent.gqrxn
Arcabit HEUR.VBA.Trojan.d
ZoneAlarm Backdoor.Win32.DarkKomet.hqxy
Microsoft Worm:Win32/AutoRun.XXY!bit
AhnLab-V3 Win32/Zorex
Acronis suspicious
BitDefenderTheta AI:Packer.F5AF03D517
ALYac Gen:Variant.Ursu.152098
MAX malware (ai score=82)
VBA32 BScope.Backdoor.DarkKomet
Malwarebytes Trojan.Agent
ESET-NOD32 Win32/Delf.NBX
TrendMicro-HouseCall TROJ_SYMMI_GA250982.UVPM
Rising Backdoor.Agent!1.BF3D (CLASSIC)
Yandex BackDoor.Optix!
SentinelOne DFI – Malicious PE
MaxSecure Trojan.Malware.121218.susgen
Fortinet W32/Delf.NBX!tr
Ad-Aware Gen:Variant.Ursu.152098
AVG Win32:Zorex-E [Wrm]
Panda Trj/Genetic.gen
CrowdStrike win/malicious_confidence_100% (D)
Qihoo-360 HEUR/QVM41.1.9003.Malware.Gen

How to remove Ursu.152098 (B)?

  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.
Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Recent Posts

MSIL/GenKryptik.GXIZ information

The MSIL/GenKryptik.GXIZ is considered dangerous by lots of security experts. When this infection is active,…

2 weeks ago

Malware.AI.2789448175 (file analysis)

The Malware.AI.2789448175 is considered dangerous by lots of security experts. When this infection is active,…

2 weeks ago

Jalapeno.1878 removal instruction

The Jalapeno.1878 is considered dangerous by lots of security experts. When this infection is active,…

2 weeks ago

What is “Trojan.Heur3.LPT.YmKfaKBcBekib”?

The Trojan.Heur3.LPT.YmKfaKBcBekib is considered dangerous by lots of security experts. When this infection is active,…

2 weeks ago

How to remove “Worm.Win32.Vobfus.exmt”?

The Worm.Win32.Vobfus.exmt is considered dangerous by lots of security experts. When this infection is active,…

2 weeks ago

About “TrojanDownloader:Win32/Beebone.JO” infection

The TrojanDownloader:Win32/Beebone.JO is considered dangerous by lots of security experts. When this infection is active,…

2 weeks ago