Categories: Malware

What is “Lazy.185279”?

The Lazy.185279 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Lazy.185279 virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Sample contains Overlay data
  • Presents an Authenticode digital signature
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • Unconventionial language used in binary resources: Punjabi
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • CAPE detected the MetaStealer malware family
  • Anomalous binary characteristics
  • Binary compilation timestomping detected
  • Yara rule detections observed from a process memory dump/dropped files/CAPE

How to determine Lazy.185279?


File Info:

name: E27F5D85174B02FCF104.mlwpath: /opt/CAPEv2/storage/binaries/00bc8d65aee4912d7b97967a3386824077d6b6be42df4dbc9502e71e5897ff69crc32: A1BC8D8Fmd5: e27f5d85174b02fcf10405bba0e00236sha1: ebb54abbd085c7cd06d9c64ebd145a85999e6ceasha256: 00bc8d65aee4912d7b97967a3386824077d6b6be42df4dbc9502e71e5897ff69sha512: fba5c1ca216e0bf3cc070c2797e0932f32f0b2058c66c628b4bf3f752bee98c2c2f669304db1b3d732e5c4772444c5b578b2097eb94babce5bcfd94905e3ff85ssdeep: 49152:ISZJ3P8WGGWGZAFANKxUA45VnsXdjLaJsVf+nYBQcfevRuDbHlXdg3lvR1XHgPTf:IS3PjG5GZAFANKZ3aWVO8QcfevwRy3NStype: PE32 executable (GUI) Intel 80386, for MS Windowstlsh: T1E8B533C0C728170BD0C6AAF0814699135EF3629A9E3BE7CA5599E9BFAF856133D37410sha3_384: 6b9281abd0c2f7c22da8d2425172975f0883b6b6a5ff75193e61168bf5caca47b1b7d266e2a0f7b5d6f0d7ae83b68e70ep_bytes: eb04bd83b24950eb018ce818000000ebtimestamp: 2061-03-29 19:13:10

Version Info:

0: [No Data]

Lazy.185279 also known as:

Bkav W32.AIDetectMalware
Lionic Trojan.Win32.Stealer.l!c
Elastic malicious (high confidence)
DrWeb Trojan.Packed.21790
MicroWorld-eScan Gen:Variant.Lazy.185279
FireEye Generic.mg.e27f5d85174b02fc
Skyhigh Artemis!Trojan
McAfee Artemis!E27F5D85174B
Cylance unsafe
VIPRE Gen:Variant.Lazy.185279
Sangfor Trojan.Win32.Stealer.pef
K7AntiVirus Trojan ( 00592f861 )
Alibaba TrojanSpy:Win32/Stealer.b5991a4d
K7GW Trojan ( 00592f861 )
Cybereason malicious.bd085c
Arcabit Trojan.Lazy.D2D3BF
BitDefenderTheta Gen:NN.ZexaF.36680.tsZ@aacPhxbO
Symantec ML.Attribute.HighConfidence
ESET-NOD32 a variant of Win32/Packed.Obsidium.CT
Cynet Malicious (score: 100)
APEX Malicious
Kaspersky HEUR:Trojan-Spy.Win32.Stealer.pef
BitDefender Gen:Variant.Lazy.185279
NANO-Antivirus Trojan.Win32.Stealer.jozrgu
Avast Win32:PWSX-gen [Trj]
Tencent Malware.Win32.Gencirc.13bb5b9b
Emsisoft Gen:Variant.Lazy.185279 (B)
F-Secure Heuristic.HEUR/AGEN.1304718
Zillya Trojan.Obsidium.Win32.4642
Sophos Mal/Generic-S
Ikarus Trojan.Win32.Obsidium
Jiangmin TrojanSpy.Stealer.vgt
Avira HEUR/AGEN.1304718
Antiy-AVL Trojan[Spy]/Win32.Stealer
Kingsoft malware.kb.a.998
Microsoft Trojan:MSIL/RelineStealer.FO!MTB
ZoneAlarm HEUR:Trojan-Spy.Win32.Stealer.pef
GData Gen:Variant.Lazy.185279
Google Detected
ALYac Gen:Variant.Lazy.185279
Malwarebytes Spyware.RedLineStealer
Rising Trojan.Generic@AI.98 (RDML:QvScGSaX8XVxYM84e0HPEg)
Yandex Trojan.Obsidium!NHwLOi9kI5Y
SentinelOne Static AI – Malicious PE
MaxSecure Trojan.Malware.127521822.susgen
Fortinet W32/PossibleThreat
AVG Win32:PWSX-gen [Trj]
DeepInstinct MALICIOUS
CrowdStrike win/malicious_confidence_100% (W)

How to remove Lazy.185279?

  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.
Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Recent Posts

MSIL/GenKryptik.GXIZ information

The MSIL/GenKryptik.GXIZ is considered dangerous by lots of security experts. When this infection is active,…

2 months ago

Malware.AI.2789448175 (file analysis)

The Malware.AI.2789448175 is considered dangerous by lots of security experts. When this infection is active,…

2 months ago

Jalapeno.1878 removal instruction

The Jalapeno.1878 is considered dangerous by lots of security experts. When this infection is active,…

2 months ago

What is “Trojan.Heur3.LPT.YmKfaKBcBekib”?

The Trojan.Heur3.LPT.YmKfaKBcBekib is considered dangerous by lots of security experts. When this infection is active,…

2 months ago

How to remove “Worm.Win32.Vobfus.exmt”?

The Worm.Win32.Vobfus.exmt is considered dangerous by lots of security experts. When this infection is active,…

2 months ago

About “TrojanDownloader:Win32/Beebone.JO” infection

The TrojanDownloader:Win32/Beebone.JO is considered dangerous by lots of security experts. When this infection is active,…

2 months ago