Malware

What is “Lazy.328293”?

Malware Removal

The Lazy.328293 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Lazy.328293 virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Attempts to modify proxy settings
  • Creates a copy of itself
  • Deletes executed files from disk
  • Yara rule detections observed from a process memory dump/dropped files/CAPE

How to determine Lazy.328293?


File Info:

name: F98C4859F022017974C1.mlw
path: /opt/CAPEv2/storage/binaries/899cbe9013190d5bb9bad2875acca8b8a713e47f1af48ba6bd02ef20e9bec0a1
crc32: 9517636A
md5: f98c4859f022017974c19a06581d5ed5
sha1: 489413f0557336722f0d565c54e61d83c1490a46
sha256: 899cbe9013190d5bb9bad2875acca8b8a713e47f1af48ba6bd02ef20e9bec0a1
sha512: 0a2bbfffbc66917b81770aca9d971f2bcc39351b4d92917ca35496a32204493fc592bdebde2bcd7132a5fb8afb971ed1805aa8efe415c1a206c22fbd35bcc4b4
ssdeep: 24576:UGrVGbPnvrTUflxAzGUeCqYnvTER8dba/ZSTeFR:UGrVMv8dxAzGUGYbERSgqeFR
type: PE32 executable (console) Intel 80386, for MS Windows
tlsh: T18B15BE8C679748D3C482B2F54D0DDE301A187DBDEB69D1327440FAAEB933B81654A93E
sha3_384: 479c1cc5b5930fbfca996ee50481a6af6d550b72601c398c957a4061a4d96888b2ede12c9e5e15b02cb02b9a63980f4d
ep_bytes: 2b54d6c77b3d52407edc5bd1fc96336b
timestamp: 1975-06-24 00:00:00

Version Info:

0: [No Data]

Lazy.328293 also known as:

BkavW32.AIDetectMalware
MicroWorld-eScanGen:Variant.Lazy.328293
SkyhighBehavesLike.Win32.Generic.dc
ALYacGen:Variant.Lazy.328293
Cylanceunsafe
ZillyaTrojan.Kryptik.Win32.2515837
SangforTrojan.Win32.Save.a
K7AntiVirusTrojan ( 005a45ef1 )
K7GWTrojan ( 005a14d51 )
Cybereasonmalicious.055733
ArcabitTrojan.Lazy.D50265
BitDefenderThetaGen:NN.ZexaF.36792.48W@aSJ4gId
SymantecML.Attribute.HighConfidence
Elasticmalicious (high confidence)
ESET-NOD32a variant of Win32/Kryptik_AGen.BGV
CynetMalicious (score: 100)
APEXMalicious
ClamAVWin.Packed.Dridex-9860931-1
KasperskyVHO:Trojan.Win32.Khalesi.gen
BitDefenderGen:Variant.Lazy.328293
AvastWin32:Evo-gen [Trj]
TencentTrojan.Win32.Selfmod.ka
TACHYONTrojan/W32.Selfmod
EmsisoftGen:Variant.Lazy.328293 (B)
F-SecureHeuristic.HEUR/AGEN.1369832
DrWebTrojan.PackedENT.183
VIPREGen:Variant.Lazy.328293
FireEyeGeneric.mg.f98c4859f0220179
SophosMal/Inject-GJ
IkarusTrojan.Win32.Glupteba
JiangminTrojan.Generic.gkpry
VaristW32/Trojan.ULNO-1867
AviraHEUR/AGEN.1369832
Antiy-AVLTrojan/Win32.Kryptik.gify
Kingsoftmalware.kb.a.936
XcitiumTrojWare.Win32.Kryptik.TLS@812zm8
MicrosoftTrojan:Win32/Glupteba.MT!MTB
ZoneAlarmVHO:Trojan.Win32.Khalesi.gen
GDataWin32.Trojan.PSE.11YPVZ
GoogleDetected
AhnLab-V3Packed/Win.Generic.R565453
Acronissuspicious
McAfeeTrojan-FVOQ!F98C4859F022
MAXmalware (ai score=80)
VBA32Trojan.Copak
MalwarebytesGeneric.Malware.AI.DDS
PandaTrj/Genetic.gen
RisingTrojan.Kryptik!1.B34D (CLASSIC)
SentinelOneStatic AI – Malicious PE
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/Kryptik.GIFQ!tr
AVGWin32:Evo-gen [Trj]
DeepInstinctMALICIOUS
CrowdStrikewin/malicious_confidence_100% (D)

How to remove Lazy.328293?

Lazy.328293 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment