Malware

Ursu.838489 (file analysis)

Malware Removal

The Ursu.838489 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Ursu.838489 virus can do?

  • Executable code extraction
  • Injection (inter-process)
  • Injection (Process Hollowing)
  • Creates RWX memory
  • A process created a hidden window
  • Drops a binary and executes it
  • The binary likely contains encrypted or compressed data.
  • Uses Windows utilities for basic functionality
  • Sniffs keystrokes
  • Executed a process and injected code into it, probably while unpacking
  • Creates a copy of itself
  • Interacts with known DarkComet registry keys
  • Creates known Fynloski/DarkComet mutexes
  • Uses suspicious command line tools or Windows utilities

Related domains:

bagus342.hopto.org

How to determine Ursu.838489?


File Info:

crc32: 5958EE3A
md5: 0cdabb3adfd35a8bfefe1df1b5401fb7
name: 0CDABB3ADFD35A8BFEFE1DF1B5401FB7.mlw
sha1: 92833e5e8ee627baa12ede5d884e0f2855acf66b
sha256: ca0cbc59b6d457a29fa85f23200a5582d33eba89409d485639dcd17f7c5690bb
sha512: a4bf080391eb9b00d41d104ffea0a1a24f840e25ec1c40ed8a2294e893869fd4cc1f213e7ba5b30dd903fea9a0567cd31728749b07b6adaf695994b8b3e4ceac
ssdeep: 12288:S21XZ10gCEeMv0EvrNcoa8XyayM/9KKlyouSIF2185Jv4hQbDRTszs:SKXwg6BEv1a8iavwKly/52xQVH
type: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows

Version Info:

Translation: 0x0000 0x04b0
LegalCopyright:
Assembly Version: 0.0.0.0
InternalName: crypted2.EXE
FileVersion: 0.0.0.0
ProductVersion: 0.0.0.0
FileDescription:
OriginalFilename: crypted2.EXE

Ursu.838489 also known as:

Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.Ursu.838489
FireEyeGeneric.mg.0cdabb3adfd35a8b
CAT-QuickHealTrojan.Generic
ALYacGen:Variant.Ursu.838489
CylanceUnsafe
VIPRETrojan.Win32.Generic!BT
AegisLabTrojan.Win32.Generic.4!c
SangforMalware
K7AntiVirusTrojan ( 0053564e1 )
BitDefenderGen:Variant.Ursu.838489
K7GWTrojan ( 0053564e1 )
Cybereasonmalicious.adfd35
BitDefenderThetaGen:NN.ZemsilF.34804.Rm0@a8tYejc
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of MSIL/Injector.NIK
APEXMalicious
AvastWin32:Malware-gen
KasperskyHEUR:Trojan.Win32.Generic
AlibabaVirTool:MSIL/Injector.79d2d76f
NANO-AntivirusTrojan.Win32.Razy.encmhe
ViRobotTrojan.Win32.Z.Injector.712704.FJ
Ad-AwareGen:Variant.Ursu.838489
EmsisoftGen:Variant.Ursu.838489 (B)
ComodoTrojWare.MSIL.Injector.MJL@7e5w7d
F-SecureTrojan.TR/Dropper.Gen7
DrWebBackDoor.Comet.2020
TrendMicroTROJ_GEN.R002C0DA821
McAfee-GW-EditionBehavesLike.Win32.Generic.jc
SophosML/PE-A + Troj/MSIL-GIH
IkarusTrojan.MSIL.Injector
WebrootW32.Gen.BT
AviraTR/Dropper.Gen7
MAXmalware (ai score=82)
Antiy-AVLTrojan/Win32.AGeneric
MicrosoftVirTool:MSIL/Injector.VF!bit
ArcabitTrojan.Ursu.DCCB59
ZoneAlarmHEUR:Trojan.Win32.Generic
GDataGen:Variant.Ursu.838489
CynetMalicious (score: 100)
Acronissuspicious
McAfeeArtemis!0CDABB3ADFD3
VBA32CIL.StupidPInvoker-2.Heur
MalwarebytesMachineLearning/Anomalous.100%
PandaTrj/GdSda.A
TrendMicro-HouseCallTROJ_GEN.R002C0DA821
YandexTrojan.Injector!Qc46bzl0Rbc
SentinelOneStatic AI – Malicious PE
MaxSecureTrojan.Malware.300983.susgen
FortinetMSIL/Injector.NIK!tr
AVGWin32:Malware-gen
Paloaltogeneric.ml
CrowdStrikewin/malicious_confidence_100% (D)
Qihoo-360Win32/Trojan.50e

How to remove Ursu.838489?

Ursu.838489 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment