Malware

About “Kazy.429418” infection

Malware Removal

The Kazy.429418 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Kazy.429418 virus can do?

  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Creates RWX memory
  • Guard pages use detected – possible anti-debugging.
  • Dynamic (imported) function loading detected
  • Enumerates the modules from a process (may be used to locate base addresses in process injection)
  • CAPE extracted potentially suspicious content
  • Authenticode signature is invalid
  • Anomalous .NET characteristics

How to determine Kazy.429418?


File Info:

name: C8849F782EA3ECB48450.mlw
path: /opt/CAPEv2/storage/binaries/29778a5681062b1b5fcdc1fb18f091b0af3c2d3920d55f953c75aed0d2390764
crc32: 6046C238
md5: c8849f782ea3ecb484504e6b7ffe219d
sha1: c38f3b9866bef4849b9e5bff60e4b62c9ab3facd
sha256: 29778a5681062b1b5fcdc1fb18f091b0af3c2d3920d55f953c75aed0d2390764
sha512: e52138be8e48720f13f1cf03658eddd24994e2093b4762542f9bb3e97fd7f9fd11ab1cb7ad722bda063f6a0d952bd34dce30f4f4479584994cfbba304c99ff0a
ssdeep: 1536:S9BOd3EO6xu5Vxq643peBDNzuyxNZ9lkhCgFiZ6seHfr0pgKhY0:uBOSRYN43E6yx7ATsGrrK
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T17C93088DB7679C5DC3AC5B7BC487604C41B78567D122E22FAADA0DAC1E226C9C4CFE50
sha3_384: f736918aba811c2593af90e8157fc7d7eb5e2ab28323a861d4cb5fd31bc5f1578c4ab280af570bcd651512b526f4febc
ep_bytes: ff250020400000000000000000000000
timestamp: 2021-11-26 14:08:28

Version Info:

0: [No Data]

Kazy.429418 also known as:

LionicTrojan.Win32.Generic.4!c
Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.Kazy.429418
FireEyeGeneric.mg.c8849f782ea3ecb4
ALYacGen:Variant.Kazy.429418
CylanceUnsafe
K7AntiVirusTrojan ( 700000121 )
AlibabaBackdoor:MSIL/Bladabindi.321bd64b
K7GWTrojan ( 700000121 )
CrowdStrikewin/malicious_confidence_100% (W)
BitDefenderThetaGen:NN.ZemsilF.34294.fmW@aWmdU5f
CyrenW32/MSIL_Bladabindi.C.gen!Eldorado
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of MSIL/Bladabindi.BG
BaiduMSIL.Backdoor.Bladabindi.a
TrendMicro-HouseCallTROJ_GEN.R002C0DKQ21
Paloaltogeneric.ml
ClamAVWin.Packed.Bladabindi-6917466-0
KasperskyHEUR:Trojan.Win32.Generic
BitDefenderGen:Variant.Kazy.429418
AvastMSIL:GenMalicious-EA [Trj]
RisingBackdoor.Njrat!1.9E49 (CLASSIC)
Ad-AwareGen:Variant.Kazy.429418
EmsisoftGen:Variant.Kazy.429418 (B)
ComodoTrojWare.MSIL.Bladabindi.BGS@7lngf6
DrWebBackDoor.BladabindiNET.19
TrendMicroTROJ_GEN.R002C0DKQ21
McAfee-GW-EditionBehavesLike.Win32.Generic.nm
SophosML/PE-A + Troj/Bbindi-W
IkarusTrojan.MSIL2
GDataGen:Variant.Kazy.429418
JiangminTrojanDropper.Autoit.dce
eGambitUnsafe.AI_Score_100%
AviraTR/Dropper.Gen7
MAXmalware (ai score=87)
GridinsoftRansom.Win32.Bladabindi.sa
ViRobotTrojan.Win32.Z.Bladabindi.97280.MS
APEXMalicious
MicrosoftBackdoor:MSIL/Bladabindi.AL
CynetMalicious (score: 100)
AhnLab-V3Trojan/Win32.Bladabindi.C231440
Acronissuspicious
McAfeeBackDoor-FDNN!C8849F782EA3
MalwarebytesBackdoor.Bladabindi
TencentWin32.Trojan.Generic.Szlc
SentinelOneStatic AI – Malicious PE
MaxSecureTrojan.Malware.300983.susgen
FortinetMSIL/Bladabindi.BG!tr
AVGMSIL:GenMalicious-EA [Trj]
Cybereasonmalicious.82ea3e
PandaTrj/GdSda.A

How to remove Kazy.429418?

Kazy.429418 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment