UCBrowser.exe

UC Browser

TAOBAO (CHINA) SOFTWARE CO.,LTD.

The application UCBrowser.exe by TAOBAO (CHINA) SOFTWARE CO.,LTD has been detected as a potentially unwanted program by 1 anti-malware scanner with very strong indications that the file is a potential threat. While running, it connects to the Internet address server-54-230-150-57.sin2.r.cloudfront.net on port 443.
Publisher:
UCWeb Inc.  (signed by TAOBAO (CHINA) SOFTWARE CO.,LTD.)

Product:
UC Browser

Version:
6.0.1308.1003

MD5:
142c3337b1324b47868be805dc9c1f5e

SHA-1:
9c5cf8dbf1a1f338e82ced2495b0455c6ef83b21

SHA-256:
364c82513aedbe8d6d661b8007483b2909dcbdb76acfbd445478f5109defa0b4

Scanner detections:
1 / 68

Status:
Potentially unwanted

Analysis date:
11/23/2024 2:07:37 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Taobao (L)
16.12.20.8

File size:
1.2 MB (1,207,696 bytes)

Product version:
6.0.1308.1003

Copyright:
Copyright 2008-2014 UCWeb Inc. All rights reserved.

Original file name:
UCBrowser.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\Program Files\ucbrowser\application\ucbrowser.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
6/16/2016 2:00:00 AM

Valid to:
7/15/2018 1:59:59 AM

Subject:
CN="TAOBAO (CHINA) SOFTWARE CO.,LTD.", OU=RDC, O="TAOBAO (CHINA) SOFTWARE CO.,LTD.", L=Hangzhou, S=Zhejiang, C=CN

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
780A0032A6CE7D0B5D5452F5CDE520DC

File PE Metadata
Compilation timestamp:
12/19/2016 8:44:02 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
14.0

Entry address:
0x75779

Entry point:
E8, 42, 09, 00, 00, E9, 80, FE, FF, FF, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, 57, 56, 53, 33, FF, 8B, 44, 24, 14, 0B, C0, 7D, 14, 47, 8B, 54, 24, 10, F7, D8, F7, DA, 83, D8, 00, 89, 44, 24, 14, 89, 54, 24, 10, 8B, 44, 24, 1C, 0B, C0, 7D, 14, 47, 8B, 54, 24, 18, F7, D8, F7, DA, 83, D8, 00, 89, 44, 24, 1C, 89, 54, 24, 18, 0B, C0, 75, 18, 8B, 4C, 24, 18, 8B, 44, 24, 14, 33, D2, F7, F1, 8B, D8, 8B, 44, 24, 10, F7, F1, 8B, D3, EB, 41, 8B, D8, 8B, 4C, 24, 18, 8B, 54, 24, 14, 8B, 44, 24, 10, D1, EB...
 
[+]

Code size:
622 KB (636,928 bytes)

Windows Firewall Allowed Program
Name:
390b6fcf-d655-4775-87a9-36a4a3dfe52c


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP SSL):
Connects to server-54-230-151-201.sin2.r.cloudfront.net  (54.230.151.201:443)

TCP (HTTP SSL):
Connects to 94.31.29.64.IPYX-077437-ZYO.above.net  (94.31.29.64:443)

TCP (HTTP SSL):
Connects to server-54-230-148-153.sin2.r.cloudfront.net  (54.230.148.153:443)

TCP (HTTP SSL):
Connects to server-54-192-150-45.sin2.r.cloudfront.net  (54.192.150.45:443)

TCP (HTTP SSL):
Connects to a104-93-119-69.deploy.static.akamaitechnologies.com  (104.93.119.69:443)

TCP (HTTP):
Connects to urs-ext-vip1.phx2.cbsig.net  (216.239.120.224:80)

TCP (HTTP):
Connects to tp00-hk2.everesttech.net  (66.117.25.36:80)

TCP (HTTP SSL):
Connects to server-54-230-150-57.sin2.r.cloudfront.net  (54.230.150.57:443)

TCP (HTTP):
Connects to nfy-rubicon-hk2.everesttech.net  (66.117.25.58:80)

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):
Connects to a104-93-101-46.deploy.static.akamaitechnologies.com  (104.93.101.46:80)

TCP (HTTP):
Connects to phx2-dw-cbsi-xw-lb.cnet.com  (216.239.120.246:80)

TCP (HTTP):
Connects to a104-93-203-72.deploy.static.akamaitechnologies.com  (104.93.203.72:80)

TCP (HTTP):
Connects to a104-93-115-90.deploy.static.akamaitechnologies.com  (104.93.115.90:80)

TCP (HTTP):

TCP (HTTP SSL):
Connects to a104-93-211-225.deploy.static.akamaitechnologies.com  (104.93.211.225:443)

TCP (HTTP):
Connects to a104-93-105-194.deploy.static.akamaitechnologies.com  (104.93.105.194:80)

Remove UCBrowser.exe - Powered by Reason Core Security