UCBrowser.exe

UC浏览器

TAOBAO (CHINA) SOFTWARE CO.,LTD.

The application UCBrowser.exe by TAOBAO (CHINA) SOFTWARE CO.,LTD has been detected as a potentially unwanted program by 1 anti-malware scanner with very strong indications that the file is a potential threat. While running, it connects to the Internet address unknown.telstraglobal.net on port 80 using the HTTP protocol.
Publisher:
UCWeb Inc.  (signed by TAOBAO (CHINA) SOFTWARE CO.,LTD.)

Product:
UC浏览器

Version:
6.1.2107.8

MD5:
7c3fdd62051325b894e33a293c4734f6

SHA-1:
0cdcf9fe14473f9e24252fd83ab52bf5286b0a36

SHA-256:
610020afa193b948c3ef8b1c8240113e926e19d26316a7366c6183d2dfbe68da

Scanner detections:
1 / 68

Status:
Potentially unwanted

Analysis date:
12/25/2024 11:45:53 PM UTC  (a few moments ago)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Taoboa (L)
17.2.23.13

File size:
1.1 MB (1,174,416 bytes)

Product version:
6.1.2107.8

Copyright:
Copyright 2008-2016 UCWeb Inc. All rights reserved.

Original file name:
UCBrowser.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\Program Files\ucbrowser\application\ucbrowser.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
6/15/2016 9:00:00 PM

Valid to:
7/14/2018 8:59:59 PM

Subject:
CN="TAOBAO (CHINA) SOFTWARE CO.,LTD.", OU=RDC, O="TAOBAO (CHINA) SOFTWARE CO.,LTD.", L=Hangzhou, S=Zhejiang, C=CN

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
780A0032A6CE7D0B5D5452F5CDE520DC

File PE Metadata
Compilation timestamp:
2/23/2017 7:20:14 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
14.0

Entry address:
0x6FD1F

Entry point:
E8, BA, 08, 00, 00, E9, 80, FE, FF, FF, CC, CC, CC, CC, CC, CC, CC, 57, 56, 53, 33, FF, 8B, 44, 24, 14, 0B, C0, 7D, 14, 47, 8B, 54, 24, 10, F7, D8, F7, DA, 83, D8, 00, 89, 44, 24, 14, 89, 54, 24, 10, 8B, 44, 24, 1C, 0B, C0, 7D, 14, 47, 8B, 54, 24, 18, F7, D8, F7, DA, 83, D8, 00, 89, 44, 24, 1C, 89, 54, 24, 18, 0B, C0, 75, 18, 8B, 4C, 24, 18, 8B, 44, 24, 14, 33, D2, F7, F1, 8B, D8, 8B, 44, 24, 10, F7, F1, 8B, D3, EB, 41, 8B, D8, 8B, 4C, 24, 18, 8B, 54, 24, 14, 8B, 44, 24, 10, D1, EB, D1, D9, D1, EA, D1, D8...
 
[+]

Code size:
594 KB (608,256 bytes)

Windows Firewall Allowed Program
Name:
chromium (mdns-in)


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to unknown.telstraglobal.net  (202.127.76.232:80)

TCP (HTTP SSL):
Connects to a104-108-45-109.deploy.static.akamaitechnologies.com  (104.108.45.109:443)

TCP (HTTP):
Connects to c7.3e.559e.ip4.static.sl-reverse.com  (158.85.62.199:80)

TCP (HTTP):
Connects to c4.3e.559e.ip4.static.sl-reverse.com  (158.85.62.196:80)

Remove UCBrowser.exe - Powered by Reason Core Security