UCBrowser.exe

UC浏览器

TAOBAO (CHINA) SOFTWARE CO.,LTD.

The application UCBrowser.exe by TAOBAO (CHINA) SOFTWARE CO.,LTD has been detected as a potentially unwanted program by 1 anti-malware scanner with very strong indications that the file is a potential threat. While running, it connects to the Internet address server-54-230-216-121.mrs50.r.cloudfront.net on port 443.
Publisher:
UCWeb Inc.  (signed by TAOBAO (CHINA) SOFTWARE CO.,LTD.)

Product:
UC浏览器

Version:
6.0.1471.913

MD5:
e45d072a7e4220e98c09b48feb7db1f9

SHA-1:
7a4f0bc57d55605d7231d5ba7a2ea480885e0d79

SHA-256:
20acb3bb9630a7739ef08c37325c18fe0dd5b5dc472e06e37fb68e7d85c3f98e

Scanner detections:
1 / 68

Status:
Potentially unwanted

Analysis date:
2/14/2017 8:34:56 AM UTC  (ten months ago)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Taobao (L)
17.2.14.3

File size:
1.1 MB (1,174,416 bytes)

Product version:
6.0.1471.913

Copyright:
Copyright 2008-2016 UCWeb Inc. All rights reserved.

Original file name:
UCBrowser.exe

File type:
Executable application (Win32 EXE)

Common path:
C:\Program Files\ucbrowser\application\ucbrowser.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
6/16/2016 8:00:00 AM

Valid to:
7/15/2018 7:59:59 AM

Subject:
CN="TAOBAO (CHINA) SOFTWARE CO.,LTD.", OU=RDC, O="TAOBAO (CHINA) SOFTWARE CO.,LTD.", L=Hangzhou, S=Zhejiang, C=CN

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
780A0032A6CE7D0B5D5452F5CDE520DC

File PE Metadata
Compilation timestamp:
2/13/2017 6:47:38 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
14.0

Entry address:
0x6FD1F

Entry point:
E8, BA, 08, 00, 00, E9, 80, FE, FF, FF, CC, CC, CC, CC, CC, CC, CC, 57, 56, 53, 33, FF, 8B, 44, 24, 14, 0B, C0, 7D, 14, 47, 8B, 54, 24, 10, F7, D8, F7, DA, 83, D8, 00, 89, 44, 24, 14, 89, 54, 24, 10, 8B, 44, 24, 1C, 0B, C0, 7D, 14, 47, 8B, 54, 24, 18, F7, D8, F7, DA, 83, D8, 00, 89, 44, 24, 1C, 89, 54, 24, 18, 0B, C0, 75, 18, 8B, 4C, 24, 18, 8B, 44, 24, 14, 33, D2, F7, F1, 8B, D8, 8B, 44, 24, 10, F7, F1, 8B, D3, EB, 41, 8B, D8, 8B, 4C, 24, 18, 8B, 54, 24, 14, 8B, 44, 24, 10, D1, EB, D1, D9, D1, EA, D1, D8...
 
[+]

Entropy:
6.7404

Code size:
594 KB (608,256 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to b-app04-09.boldchat.com  (66.150.108.73:80)

TCP (HTTP):
Connects to server-54-230-216-204.mrs50.r.cloudfront.net  (54.230.216.204:80)

TCP (HTTP SSL):
Connects to server-54-230-216-121.mrs50.r.cloudfront.net  (54.230.216.121:443)

TCP (HTTP):

TCP (HTTP SSL):
Connects to ec2-34-196-191-121.compute-1.amazonaws.com  (34.196.191.121:443)

TCP (HTTP):
Connects to c4.3e.559e.ip4.static.sl-reverse.com  (158.85.62.196:80)

TCP (HTTP SSL):
Connects to a23-57-231-5.deploy.static.akamaitechnologies.com  (23.57.231.5:443)

TCP (HTTP SSL):
Connects to server-54-230-96-43.arn1.r.cloudfront.net  (54.230.96.43:443)

TCP (HTTP SSL):
Connects to server-54-230-96-195.arn1.r.cloudfront.net  (54.230.96.195:443)

TCP (HTTP):
Connects to server04.com-2.mobi  (198.143.165.220:80)

TCP (HTTP):
Connects to ec2-34-192-43-0.compute-1.amazonaws.com  (34.192.43.0:80)

TCP (HTTP SSL):
Connects to any-in-203e.1e100.net  (216.239.32.62:443)

TCP (HTTP SSL):
Connects to a88-221-205-217.deploy.akamaitechnologies.com  (88.221.205.217:443)

TCP (HTTP SSL):
Connects to a104-126-161-84.deploy.static.akamaitechnologies.com  (104.126.161.84:443)

TCP (HTTP):
Connects to 186.139.211.130.bc.googleusercontent.com  (130.211.139.186:80)

Remove UCBrowser.exe - Powered by Reason Core Security