Malware

Kazy.13405 information

Malware Removal

The Kazy.13405 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Kazy.13405 virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • Mimics the system’s user agent string for its own requests
  • Possible date expiration check, exits too soon after checking local time
  • Anomalous file deletion behavior detected (10+)
  • Dynamic (imported) function loading detected
  • At least one IP Address, Domain, or File Name was found in a crypto call
  • Performs HTTP requests potentially not found in PCAP.
  • Starts servers listening on 0.0.0.0:13470, :0
  • Enumerates running processes
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • Unconventionial language used in binary resources: Russian
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • The executable is compressed using UPX
  • Authenticode signature is invalid
  • Uses Windows utilities for basic functionality
  • Code injection with CreateRemoteThread in a remote process
  • Behavioural detection: Injection (inter-process)
  • Behavioural detection: Injection with CreateRemoteThread in a remote process
  • Tries to unhook or modify Windows functions monitored by Cuckoo
  • Steals private information from local Internet browsers
  • Collects and encrypts information about the computer likely to send to C2 server
  • Installs itself for autorun at Windows startup
  • Exhibits behavior characteristics of BlackRemote/BlackRAT RAT
  • Attempts to modify proxy settings
  • Attempts to modify browser security settings
  • Collects information to fingerprint the system
  • Clears web history

How to determine Kazy.13405?


File Info:

name: 885539E00198EE4F1088.mlw
path: /opt/CAPEv2/storage/binaries/f897eea751b79f2356f1d00a88cdec4b19b31052bbdd881eff3073649c7b1100
crc32: 16689DDD
md5: 885539e00198ee4f1088d779692221dd
sha1: db0650adfdfc452f9d1aea22203bff45de7dc5aa
sha256: f897eea751b79f2356f1d00a88cdec4b19b31052bbdd881eff3073649c7b1100
sha512: 5760a75db10667df01f0113b59fd110daf607f3f2876a8729515786d6e66c5e6191595f218e8723f5ec942b92a62e93af42db94ebc3b96bb2f5a65732818c56c
ssdeep: 1536:bKoGLsP+d7P/s4YxRoA+mt9W7XQpF3Ej9GQD9niRIkPMPGLVu+a0jbCew3hQVU2H:bkw6/65+mXQQfUYQxBSMMEMhbLErZi
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1269312DCDE9620ACEDDA1B3576B1F10F28B932D5886823F9F960865CB718D51EBBC404
sha3_384: a96d47e7cff21652aa9a58a4e0672b2bc942e6c365176c8b28fcf4efdf644f690e4e19610847e9e7f55d22b855010a85
ep_bytes: 60be00d040008dbe0040ffff5783cdff
timestamp: 2006-03-11 17:10:49

Version Info:

CompanyName: Oper1 Software
FileDescription: Oper1 Internet Browser
FileVersion: 1190
InternalName: Oper1
LegalCopyright: Copyright © Oper1 Software 1995-2011
OriginalFilename: Oper1.exe
ProductName: Oper1 Internet Browser
ProductVersion: 11.01
Translation: 0x0409 0x04b0

Kazy.13405 also known as:

BkavW32.MosquitoQKK.Fam.Trojan
LionicTrojan.Multi.Generic.4!c
Elasticmalicious (high confidence)
ClamAVWin.Trojan.Agent-1003535
FireEyeGeneric.mg.885539e00198ee4f
ALYacGen:Variant.Kazy.13405
CylanceUnsafe
VIPRETrojan.Win32.Kryptik.lbu (v)
K7AntiVirusTrojan ( f1000f011 )
BitDefenderGen:Variant.Kazy.13405
K7GWTrojan ( f1000f011 )
Cybereasonmalicious.00198e
ArcabitTrojan.Kazy.D345D
BitDefenderThetaGen:NN.ZexaF.34232.fmKfaivyMgcc
VirITTrojan.Win32.Panda.OT
SymantecTrojan.Zbot
ESET-NOD32a variant of Win32/Kryptik.KND
TrendMicro-HouseCallBKDR_QAKBOT.SMG
Paloaltogeneric.ml
CynetMalicious (score: 100)
AlibabaTrojanPSW:Win32/Kryptik.d75f1f8c
NANO-AntivirusVirus.Win32.Gen.ccmw
MicroWorld-eScanGen:Variant.Kazy.13405
Ad-AwareGen:Variant.Kazy.13405
EmsisoftGen:Variant.Kazy.13405 (B)
ComodoMalware@#3fh1jbgg96jkt
DrWebTrojan.PWS.Panda.383
ZillyaTrojan.Zbot.Win32.36608
SophosMal/Generic-R + Mal/FakeAV-BW
APEXMalicious
JiangminTrojanSpy.Zbot.bxqj
AviraTR/Dropper.Gen
MAXmalware (ai score=100)
Antiy-AVLTrojan[Packed]/Win32.Krap
GridinsoftRansom.Win32.Zbot.sa
MicrosoftPWS:Win32/Zbot.gen!Y
SUPERAntiSpywareTrojan.Agent/Gen-Pervaser
ZoneAlarmHEUR:Trojan.Win32.Generic
GDataGen:Variant.Kazy.13405
SentinelOneStatic AI – Malicious PE
AhnLab-V3Trojan/Win32.Zbot.R6725
Acronissuspicious
VBA32Trojan.Zeus.EA.0999
PandaBck/Qbot.AO
TencentWin32.Trojan.Generic.Eand
IkarusTrojan-Spy.Win32.Zbot
FortinetW32/Kryptik.NAS!tr
AVGWin32:Renos-TI [Drp]
CrowdStrikewin/malicious_confidence_90% (W)
MaxSecureTrojan.Malware.300983.susgen

How to remove Kazy.13405?

Kazy.13405 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment