Malware

Lazy.205042 removal

Malware Removal

The Lazy.205042 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Lazy.205042 virus can do?

  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Behavioural detection: Executable code extraction – unpacking
  • Sample contains Overlay data
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Possible date expiration check, exits too soon after checking local time
  • Creates RWX memory
  • NtSetInformationThread: attempt to hide thread from debugger
  • Dynamic (imported) function loading detected
  • Expresses interest in specific running processes
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • Drops a binary and executes it
  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid
  • Checks for the presence of known windows from debuggers and forensic tools
  • Checks for the presence of known windows from debuggers and forensic tools
  • Created a process from a suspicious location
  • The following process appear to have been packed with Themida: build.exe
  • Checks for the presence of known devices from debuggers and forensic tools
  • Checks for the presence of known devices from debuggers and forensic tools
  • Detects the presence of Wine emulator via registry key
  • Checks the version of Bios, possibly for anti-virtualization
  • Detects VirtualBox through the presence of a registry key
  • Harvests cookies for information gathering

How to determine Lazy.205042?


File Info:

name: BB6B7046A3D9A8859C35.mlw
path: /opt/CAPEv2/storage/binaries/125fb563e61fb18d158996995d94c5cf0207ca9dc03d3472da033ab5008402df
crc32: F4899E2C
md5: bb6b7046a3d9a8859c3519f37ca0afc9
sha1: 43b2da661521d7b72d25732e3f7852beb9016992
sha256: 125fb563e61fb18d158996995d94c5cf0207ca9dc03d3472da033ab5008402df
sha512: 9214b5ea7de12fa43a3d84160cb605903db241fdf4957109b318eb58061a8ff66fe25e5ee3f02c8d60b1386396b1bcbe47ad2d6227de4d0986c83291e3f749be
ssdeep: 393216:4I3rWidvFC3DgEzMXzDjaJPIQzmWBjsHL50CuRxcQpn:4QteDgEzMzaJPIQzmKj8LDuz9n
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T18DD63304B5D11632D465C573AAEC5A2D22387F823B0489CF7FD18A2E57B59B8B23CE74
sha3_384: e622d723f8904452f7bd4b4672c9bb7a3cd17441a8a36245118adb5851efe9c507c50d02a96a13803b952e8b9178a5c9
ep_bytes: e866050000e978feffffcccccccccccc
timestamp: 2022-03-03 13:15:57

Version Info:

0: [No Data]

Lazy.205042 also known as:

BkavW32.AIDetect.malware2
Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.Lazy.205042
VIPREGen:Variant.Lazy.205042
BitDefenderGen:Variant.Lazy.205042
Cybereasonmalicious.61521d
ArcabitTrojan.Lazy.D320F2
CyrenW32/S-f2662838!Eldorado
ESET-NOD32a variant of Win32/Packed.Themida.HFL
APEXMalicious
KasperskyUDS:DangerousObject.Multi.Generic
RisingTrojan.Generic@AI.90 (RDML:gFeCG/8jpM8DHGpnKQkohQ)
EmsisoftGen:Variant.Lazy.205042 (B)
DrWebTrojan.Packed.193
McAfee-GW-EditionBehavesLike.Win32.Generic.rc
Trapminesuspicious.low.ml.score
FireEyeGeneric.mg.bb6b7046a3d9a885
SophosGeneric ML PUA (PUA)
IkarusTrojan.Win32.Themida
MicrosoftTrojan:Win32/Wacatac.B!ml
GDataGen:Variant.Lazy.205042
CynetMalicious (score: 100)
Acronissuspicious
ALYacGen:Variant.Lazy.205042
MAXmalware (ai score=88)
MalwarebytesSpyware.PasswordStealer
ZonerProbably Heur.ExeHeaderL
TrendMicro-HouseCallTROJ_GEN.R002H0CGO22
SentinelOneStatic AI – Malicious SFX
AVGWin32:Malware-gen
AvastWin32:Malware-gen

How to remove Lazy.205042?

Lazy.205042 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment