Malware

About “Lazy.251493” infection

Malware Removal

The Lazy.251493 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Lazy.251493 virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • The binary contains an unknown PE section name indicative of packing
  • Executable file is packed/obfuscated with ASPack
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Anomalous binary characteristics

How to determine Lazy.251493?


File Info:

name: 9F59BE9FC2A047796F61.mlw
path: /opt/CAPEv2/storage/binaries/de6c42faf4bbebe5d2c2e13a3c4e783946948cc23c40b68c1b449dc301651cde
crc32: 1AF670AB
md5: 9f59be9fc2a047796f61dba8c3f36636
sha1: 0c089c17945b80e956a205208e73fe4fd842a6d5
sha256: de6c42faf4bbebe5d2c2e13a3c4e783946948cc23c40b68c1b449dc301651cde
sha512: cf9fa21a4c64cbb4ea60c91d77230ba04615532de08aab086d86392f095ecb02acc12b755dc6b0342aeff4e7303a0c80bd2b4aef5dc8d939c209d85c6a87dfca
ssdeep: 1536:ife70DSE5DlNfT5C2zQRXG1n0GJ0+5U1:cI0uERlNb5XQE5L5U1
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1D743F1499E88C07BCD9F4F78695B1D178A567C6057B2D36BF2FB080E285B710D50CE62
sha3_384: d388533b90a2569669637164f53220b21bb87238262a031a9577080d4e16c0fbff2b0438eea380e6ebe2ae920db32abd
ep_bytes: 60e803000000e9eb045d4555c3e80100
timestamp: 2010-08-25 12:46:23

Version Info:

Translation: 0x0409 0x04b0
CompanyName: BKHN
ProductName: Project1
FileVersion: 1.00
ProductVersion: 1.00
InternalName: Project1
OriginalFilename: Project1.exe

Lazy.251493 also known as:

LionicTrojan.Win32.Calac.a!c
tehtrisGeneric.Malware
MicroWorld-eScanGen:Variant.Lazy.251493
FireEyeGeneric.mg.9f59be9fc2a04779
CylanceUnsafe
K7AntiVirusUnwanted-Program ( 004d38111 )
K7GWUnwanted-Program ( 004d38111 )
Cybereasonmalicious.7945b8
CyrenW32/Trojan.IRIV-2734
SymantecML.Attribute.HighConfidence
Elasticmalicious (high confidence)
ESET-NOD32a variant of Win32/HackTool.Inject.C potentially unsafe
APEXMalicious
ClamAVWin.Trojan.Peed-1553
KasperskyUDS:DangerousObject.Multi.Generic
BitDefenderGen:Variant.Lazy.251493
NANO-AntivirusTrojan.Win32.Calac.bbfmhe
SUPERAntiSpywareTrojan.Agent/Gen-Patcher
AvastFileRepMalware [Trj]
RisingTrojan.Win32.Generic.123CCC6B (C64:YzY0OoRJoTf7I7AA)
Ad-AwareGen:Variant.Lazy.251493
SophosGeneric ML PUA (PUA)
ComodoMalware@#qo6s88es2hqw
F-SecureTrojan.TR/Dropper.Gen
DrWebTrojan.DownLoad3.16772
ZillyaDownloader.Calac.Win32.1124
TrendMicroTROJ_GEN.R067C0PJ422
McAfee-GW-EditionBehavesLike.Win32.Generic.qc
Trapminemalicious.high.ml.score
EmsisoftGen:Variant.Lazy.251493 (B)
SentinelOneStatic AI – Malicious PE
WebrootTrojan:Win32/Provis!rts
GoogleDetected
AviraTR/Dropper.Gen
MicrosoftTrojan:Win32/Wacatac.B!ml
GDataGen:Variant.Lazy.251493
CynetMalicious (score: 100)
McAfeeArtemis!9F59BE9FC2A0
MAXmalware (ai score=86)
MalwarebytesMalware.Heuristic.1003
TrendMicro-HouseCallTROJ_GEN.R067C0PJ422
IkarusVirus.Win32.VBInject
MaxSecureTrojan.Malware.300983.susgen
FortinetRiskware/Inject.C!tr
BitDefenderThetaAI:Packer.19EA846A1C
AVGFileRepMalware [Trj]
PandaGeneric Malware
CrowdStrikewin/malicious_confidence_70% (W)

How to remove Lazy.251493?

Lazy.251493 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment