Trojan:W32/Ursnif
Summary
Ursnif steals system information and attempts to steal banking and online account credentials.
Removal
Based on the settings of your F-Secure security product, it will either move the file to the quarantine where it cannot spread or cause harm, or remove it.
A False Positive is when a file is incorrectly detected as harmful, usually because its code or behavior resembles known harmful programs. A False Positive will usually be fixed in a subsequent database update without any action needed on your part. If you wish, you may also:
- Check for the latest database updates
First check if your F-Secure security program is using the latest updates, then try scanning the file again.
- Submit a sample
After checking, if you still believe the file is incorrectly detected, you can submit a sample of it for re-analysis.
Note: If the file was moved to quarantine, you need to collect the file from quarantine before you can submit it.
- Exclude a file from further scanning
If you are certain that the file is safe and want to continue using it, you can exclude it from further scanning by the F-Secure security product.
Note: You need administrative rights to change the settings.
Technical Details
Behavior
Upon execution, Ursnif checks for the presence of any virtual or debugging environments; if found, it will show a fake alert message box with the text, "Error Initializing Client App!". It also performs process hollowing on svchost.exe or explorer.exe and injects a dll file (client.dll) based on the system enviornment (whether it is 32- or 64-bit).
Afterwards, it tries to steal multiple pieces of information from the system and store them in a file. It then connects to a malicious command and control (C&C) server.
Infection Vector
Ursnif is typically encountered when the user inadvertently opens a malicious file attachment that arrives via a spam email message.
Files Added
- Create a copy of itself at "%appdata%\[Random_Folder]\[Dropped_Filename].exe" where "Dropped_Filename" is a combination of strings taken from %system32% directory filenames.
- Creates a batch file at "%temp%\[Random_Folder]\[Random_File].bat" to execute and delete itself.
- Creates a storage file at %temp%\[Random_Hex].bin to store the stolen data. Stolen data is in cab file format, which is created by executing makecab.exe. The storage file contains the following information:
Registry Changes
Adds the following registry key to run at startup:
- HKCU\Software\Microsoft\Windows\CurrentVersion\Run\[Dropped_Filename]: "%appdata%\[Random_Folder]\[Dropped_Filename].exe
- HKCU\Software\AppDataLow\Software\Microsoft\{GUID}\Vars
- HKCU\Software\AppDataLow\Software\Microsoft\{GUID}\Files
- HKCU\Software\AppDataLow\Software\Microsoft\{GUID}\Config
Network Activity
It connects to the following server:
- bergesoma[.]com/images/[encryted_data]/[.jpeg|.gif|.bmp]
- polinodara[.]com/images/[encryted_data]/[.jpeg|.gif|.bmp]
Where encrypted_data contains the Username, Compute Name, Version of Injected process, System IP address and malware specific configuration details.
Other Behavior
The malware also has the capability to:
- Steal email data, which is collected by parsing different email file formats and applications (.wab, .pst)
- Intercept the data and web-forms of the following browsers: Chrome, Internet explorer, Thunderbird, Firefox
- Check for the presence of a virtual environment by checking the Device Informaton string against "vbox", "qemu", "vmware", "virtual hd"
- Detect Phishwall software
Analysis on file: b3764e1a3d0f7d164436d565226800f3c06a58ec
More Support
Community
Ask questions in our Community.
User guides
Check the user guide for instructions.
Contact Support
Chat with with or call an agent.
Submit a Sample
Submit a file or URL for analysis.