Threat Database Trojans Win32.Ursnif.HA

Win32.Ursnif.HA

By GoldSparrow in Trojans

Threat Scorecard

Threat Level: 90 % (High)
Infected Computers: 4
First Seen: March 20, 2015
Last Seen: November 1, 2021
OS(es) Affected: Windows

The Win32.Ursnif.HA detection is used by security tools to specify a cyber threat that is deployed by hackers as an Adobe Flash Player update as an attempt not to look suspicious and to invite users to run it. When users open the payload of Win32.Ursnif.HA, it disables the Windows Security Center and Windows Firewall in order to monitor the traffic via FTP, IMAP, POP3, and ICQ. Win32.Ursnif.HA is an infostealer trojan that can steal your passwords and send them to specific web page that is governed by its handlers. Malware researchers reveal that Win32.Ursnif.HA uses two files to facilitate its malicious activities. Infected PCs are inserted with '9129837.exe' in the Windows directory and 'abcdefg.bat' where the fake Flash update is run. You might want to know that Win32.Ursnif.HA modifies the compromised system by inserting a registry key named 'ttool' to run the malicious executable '9129837.exe' and stores data in the registry key named 'InetData'. Users can have their banking, social media and email log-in details stolen, and security experts advise the implementation of a renowned anti-malware shield to counter Win32.Ursnif.HA.

Trending

Most Viewed

Loading...