Malware

Ursu.21180 (B) (file analysis)

Malware Removal

The Ursu.21180 (B) is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Ursu.21180 (B) virus can do?

  • Executable code extraction
  • Creates RWX memory
  • Expresses interest in specific running processes
  • Reads data out of its own binary image
  • Creates an excessive number of UDP connection attempts to external IP addresses
  • The binary likely contains encrypted or compressed data.
  • Uses Windows utilities for basic functionality
  • Attempts to delete volume shadow copies
  • Exhibits behavior characteristic of Cerber ransomware
  • EternalBlue behavior
  • Generates some ICMP traffic
  • Collects information to fingerprint the system
  • Anomalous binary characteristics

How to determine Ursu.21180 (B)?


File Info:

crc32: A54D9563
md5: 63b817a62aa2a645635390c7c52381ed
name: 63B817A62AA2A645635390C7C52381ED.mlw
sha1: eca9ca49d7573461a2920ed9b80d2738b7badc04
sha256: c0f389be47635b896828f5a52af3319afec26b9869f82f04cf807b2417d320b3
sha512: 934c1da52c9292f3d4715827c5d8579262d6a852a071967a3c278c469c816ba6396233102954646188b81191f15783d2252c28773bca0fe9557e500760d3cda7
ssdeep: 6144:gRss1/LYR/F2Klw4nHQlwvHeAce8kBWFS8+FmAt6k1z4YPiIjjjjjJINWAU9:wHupF2KlwW0wWA1BWSlFmm6k1z4YPdIE
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

LegalCopyright: Copyright xa9 2013. All rights reserved. The Audacity Team
InternalName: Submitting House
FileVersion: 8.8.6.4
CompanyName: The Audacity Team
FileDescription: Impersonate Populating Hilty The Dgpx2019s Toolprovider
LegalTrademarks: Copyright xa9 2013. All rights reserved. The Audacity Team
ProductName: Submitting House
ProductVersion: 8.8.6.4
PrivateBuild: 8.8.6.4
Translation: 0x0409 0x04b0

Ursu.21180 (B) also known as:

K7AntiVirusTrojan ( 004e16c11 )
LionicTrojan.Multi.Generic.4!c
Elasticmalicious (high confidence)
DrWebTrojan.MulDrop6.65196
CynetMalicious (score: 100)
ALYacGen:Variant.Ursu.21180
CylanceUnsafe
ZillyaTrojan.Cerber.Win32.109
CrowdStrikewin/malicious_confidence_100% (D)
AlibabaTrojan:Win32/Cerber.a4b098bb
K7GWTrojan ( 004e16c11 )
Cybereasonmalicious.62aa2a
SymantecML.Attribute.HighConfidence
ESET-NOD32Win32/Filecoder.Cerber.B
APEXMalicious
AvastWin32:Trojan-gen
KasperskyUDS:DangerousObject.Multi.Generic
BitDefenderGen:Variant.Ursu.21180
NANO-AntivirusTrojan.Win32.Agent.eihhkr
MicroWorld-eScanGen:Variant.Ursu.21180
TencentMalware.Win32.Gencirc.10bc8bf1
Ad-AwareGen:Variant.Ursu.21180
SophosMal/Generic-S
ComodoMalware@#3a04vjd8r1t53
BitDefenderThetaGen:NN.ZexaF.34170.xq1@aCQ7@pei
VIPRETrojan.Win32.Generic!BT
TrendMicroRansom_CERBER.F116KB
McAfee-GW-EditionBehavesLike.Win32.Generic.fc
FireEyeGeneric.mg.63b817a62aa2a645
EmsisoftGen:Variant.Ursu.21180 (B)
SentinelOneStatic AI – Malicious PE
WebrootW32.Ransom.Gen
AviraTR/Crypt.ZPACK.Gen7
Antiy-AVLTrojan/Generic.ASMalwS.1C5E88C
MicrosoftTrojan:Win32/Dynamer!ac
ArcabitTrojan.Ursu.D52BC
GDataGen:Variant.Ursu.21180
Acronissuspicious
McAfeeGeneric.aqi
MAXmalware (ai score=84)
VBA32Trojan.Agent
MalwarebytesMachineLearning/Anomalous.100%
PandaTrj/GdSda.A
TrendMicro-HouseCallRansom_CERBER.F116KB
RisingTrojan.Generic@ML.100 (RDML:GFKisF/NnEWq7n7pNUECWA)
YandexTrojan.Agent!sW8EmiPh9r8
IkarusTrojan-Ransom.Crysis
FortinetW32/Generic.AC.3A0C50!tr
AVGWin32:Trojan-gen
Paloaltogeneric.ml

How to remove Ursu.21180 (B)?

Ursu.21180 (B) removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment