UCBrowser.exe

UC浏览器

TAOBAO (CHINA) SOFTWARE CO.,LTD.

The application UCBrowser.exe by TAOBAO (CHINA) SOFTWARE CO.,LTD has been detected as a potentially unwanted program by 1 anti-malware scanner with very strong indications that the file is a potential threat. While running, it connects to the Internet address 248.199.186.35.bc.googleusercontent.com on port 443.
Publisher:
UCWeb Inc.  (signed by TAOBAO (CHINA) SOFTWARE CO.,LTD.)

Product:
UC浏览器

Version:
6.0.1471.914

MD5:
dd5bf9ed26894c442cb0a11f309af766

SHA-1:
f7eaeaa22f94b5f5599dbfc74ddced5161199350

SHA-256:
f9c37cf7acc543f2990a3ad7e65aa8a273027bb15608162c1f2b9ab17a3aab11

Scanner detections:
1 / 68

Status:
Potentially unwanted

Analysis date:
12/27/2024 3:49:38 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Taobao (L)
17.2.16.9

File size:
1.1 MB (1,172,184 bytes)

Product version:
6.0.1471.914

Copyright:
Copyright 2008-2016 UCWeb Inc. All rights reserved.

Original file name:
UCBrowser.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\Program Files\ucbrowser\application\6.0.1471.914\backup\ucbrowser.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
6/16/2016 3:00:00 AM

Valid to:
7/15/2018 2:59:59 AM

Subject:
CN="TAOBAO (CHINA) SOFTWARE CO.,LTD.", OU=RDC, O="TAOBAO (CHINA) SOFTWARE CO.,LTD.", L=Hangzhou, S=Zhejiang, C=CN

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
780A0032A6CE7D0B5D5452F5CDE520DC

File PE Metadata
Compilation timestamp:
2/14/2017 1:27:58 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
14.0

Entry address:
0x6FD1F

Entry point:
E8, BA, 08, 00, 00, E9, 80, FE, FF, FF, CC, CC, CC, CC, CC, CC, CC, 57, 56, 53, 33, FF, 8B, 44, 24, 14, 0B, C0, 7D, 14, 47, 8B, 54, 24, 10, F7, D8, F7, DA, 83, D8, 00, 89, 44, 24, 14, 89, 54, 24, 10, 8B, 44, 24, 1C, 0B, C0, 7D, 14, 47, 8B, 54, 24, 18, F7, D8, F7, DA, 83, D8, 00, 89, 44, 24, 1C, 89, 54, 24, 18, 0B, C0, 75, 18, 8B, 4C, 24, 18, 8B, 44, 24, 14, 33, D2, F7, F1, 8B, D8, 8B, 44, 24, 10, F7, F1, 8B, D3, EB, 41, 8B, D8, 8B, 4C, 24, 18, 8B, 54, 24, 14, 8B, 44, 24, 10, D1, EB, D1, D9, D1, EA, D1, D8...
 
[+]

Entropy:
6.7370

Code size:
594 KB (608,256 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP SSL):
Connects to a23-7-246-230.deploy.static.akamaitechnologies.com  (23.7.246.230:443)

TCP (HTTP SSL):
Connects to 248.199.186.35.bc.googleusercontent.com  (35.186.199.248:443)

TCP (HTTP SSL):
Connects to any-in-201b.1e100.net  (216.239.32.27:443)

TCP (HTTP SSL):
Connects to mx-ll-110.164.6-222.static.3bb.co.th  (110.164.6.222:443)

TCP (HTTP SSL):
Connects to fra34.ff.avast.com  (77.234.45.44:443)

TCP (HTTP):
Connects to prg05-016.ff.avast.com  (5.45.58.26:80)

TCP (HTTP SSL):
Connects to ec2-52-211-168-31.eu-west-1.compute.amazonaws.com  (52.211.168.31:443)

TCP (HTTP):
Connects to ec2-50-112-247-71.us-west-2.compute.amazonaws.com  (50.112.247.71:80)

TCP (HTTP SSL):
Connects to a72-246-239-119.deploy.akamaitechnologies.com  (72.246.239.119:443)

TCP (HTTP SSL):
Connects to a23-53-87-76.deploy.static.akamaitechnologies.com  (23.53.87.76:443)

TCP (HTTP SSL):
Connects to a23-40-138-36.deploy.static.akamaitechnologies.com  (23.40.138.36:443)

TCP (HTTP SSL):
Connects to ec2-52-86-236-178.compute-1.amazonaws.com  (52.86.236.178:443)

TCP (HTTP):

TCP (HTTP SSL):
Connects to oneads-sspums-adtech-mtc-blue-b.evip.aol.com  (152.163.56.2:443)

TCP (HTTP SSL):
Connects to mx-ll-110.164.10-114.static.3bb.co.th  (110.164.10.114:443)

TCP (HTTP):
Connects to ec2-54-243-69-29.compute-1.amazonaws.com  (54.243.69.29:80)

TCP (HTTP SSL):
Connects to ec2-52-44-64-155.compute-1.amazonaws.com  (52.44.64.155:443)

TCP (HTTP SSL):
Connects to ec2-52-10-47-150.us-west-2.compute.amazonaws.com  (52.10.47.150:443)

TCP (HTTP SSL):
Connects to a104-105-11-69.deploy.static.akamaitechnologies.com  (104.105.11.69:443)

Remove UCBrowser.exe - Powered by Reason Core Security