Malware

What is “Lazy.14737 (B)”?

Malware Removal

The Lazy.14737 (B) is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Lazy.14737 (B) virus can do?

  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Creates RWX memory
  • Guard pages use detected – possible anti-debugging.
  • Dynamic (imported) function loading detected
  • Enumerates the modules from a process (may be used to locate base addresses in process injection)
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • The binary likely contains encrypted or compressed data.
  • .NET file is packed/obfuscated with SmartAssembly
  • Authenticode signature is invalid

How to determine Lazy.14737 (B)?


File Info:

name: 6C0CB24AE1CCE0A59297.mlw
path: /opt/CAPEv2/storage/binaries/b8aa18fd5adcadcbb41ac8369ad4c99a04cd75d3aa7c075a01269649cf7e0873
crc32: FF1C22DF
md5: 6c0cb24ae1cce0a59297db338cee2434
sha1: 6d83a7561f8b921e3936cf65d356e8cf67dc67ab
sha256: b8aa18fd5adcadcbb41ac8369ad4c99a04cd75d3aa7c075a01269649cf7e0873
sha512: 4b5c0afd142ee7efdf815855c4fd9bdc5607b2748935e1b2c82a1b72e5c4b6c65b1fd6296eb7f7847b51a2cbeadd1e012ebcbebb3989e1efae602ab406667aa9
ssdeep: 768:caEQC+mxQXclbbQjKG4EqMtIC05IBnrH8YYncw8gkMbH4G8zaxMaDmAWXUZZ4gYn:caN6QXCfQjKpg706BrH8/nbH4G8zaxM6
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T13A138D10D7EC9261FED007BF6D3F4B242B98A65E1037BFCB24884728352326156B67A7
sha3_384: 788bfafdd5cfeb493f821f43ce2eeae1074e6a90fc0d15b662d475d75db37a03500a26227702ae2b4c9bafc133b43e83
ep_bytes: ff25d446400000005f436f724578654d
timestamp: 2021-11-17 14:34:49

Version Info:

Translation: 0x0000 0x04b0
CompanyName: damnation
FileDescription: chaosbinocular
FileVersion: 19.14.10.4
InternalName: forkeyetooth.exe
LegalCopyright: carcass © vibrator
OriginalFilename: forkeyetooth.exe
ProductName: helmet
ProductVersion: 19.14.10.4
Assembly Version: 19.14.10.4

Lazy.14737 (B) also known as:

Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.Lazy.14737
FireEyeGeneric.mg.6c0cb24ae1cce0a5
ALYacGen:Variant.Lazy.14737
CylanceUnsafe
K7AntiVirusTrojan ( 0053e5881 )
K7GWTrojan ( 0053e5881 )
CrowdStrikewin/malicious_confidence_80% (W)
BitDefenderThetaGen:NN.ZemsilF.34084.cm0@amGLgnb
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of MSIL/Kryptik.PSV
APEXMalicious
KasperskyHEUR:Backdoor.MSIL.Bladabindi.gen
BitDefenderGen:Variant.Lazy.14737
AvastWin32:MalwareX-gen [Trj]
TencentMsil.Backdoor.Bladabindi.Wogi
Ad-AwareGen:Variant.Lazy.14737
SophosML/PE-A
DrWebTrojan.PWS.StealerNET.101
TrendMicroTROJ_GEN.R014C0WKK21
McAfee-GW-EditionRDN/Generic.rp
EmsisoftGen:Variant.Lazy.14737 (B)
IkarusTrojan.MSIL.Crypt
GDataGen:Variant.Lazy.14737
AviraTR/Kryptik.gtzao
Antiy-AVLTrojan/Generic.ASMalwS.34E745D
MicrosoftBackdoor:Win32/Bladabindi!ml
CynetMalicious (score: 100)
AhnLab-V3Trojan/Win.Generic.C4776033
McAfeeRDN/Generic.rp
MAXmalware (ai score=84)
VBA32TScope.Trojan.MSIL
MalwarebytesBackdoor.Bladabindi
TrendMicro-HouseCallTROJ_GEN.R014C0WKK21
SentinelOneStatic AI – Malicious PE
eGambitUnsafe.AI_Score_97%
FortinetMSIL/Kryptik.PSV!tr
AVGWin32:MalwareX-gen [Trj]
Cybereasonmalicious.61f8b9
PandaTrj/GdSda.A

How to remove Lazy.14737 (B)?

Lazy.14737 (B) removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment