Malware

Should I remove “Lazy.328293”?

Malware Removal

The Lazy.328293 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Lazy.328293 virus can do?

  • Sample contains Overlay data
  • Reads data out of its own binary image
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Deletes executed files from disk
  • Yara rule detections observed from a process memory dump/dropped files/CAPE

How to determine Lazy.328293?


File Info:

name: 634721E34502486E3D60.mlw
path: /opt/CAPEv2/storage/binaries/092da969025d9b60e8a3a03990311e2b7a490004d99a7a0a2fbe8227bbbea957
crc32: 2887B2D7
md5: 634721e34502486e3d607b2056a0b479
sha1: f623a104f8e0316e24572b4ec1fa71023af57ea6
sha256: 092da969025d9b60e8a3a03990311e2b7a490004d99a7a0a2fbe8227bbbea957
sha512: c9c934f2792589ecd191563bb43202353992ab1d5f4d5a2e0ca183e72e8211fc54393aaf0b1dd6bece8320e9679da619e28d70ae22b2562993ba57d9e263a0a6
ssdeep: 24576:d9UeY227ub+7mP5k+xXSjqr53FIPa/ZSC77Jh7:d9jR2KvPqIlYgl77
type: PE32 executable (console) Intel 80386, for MS Windows
tlsh: T1B725CF3CFA53C187CD49963EDA2EDF9564126D387E17C2A130507A6BBE7B7988007A70
sha3_384: 2ac4fb1184db48cbbacf47e8efa82cd06d7d2d32bbf363ed2f23ff51e4695b0e3e6c0edd3f483bbf4450104c8448ed96
ep_bytes: 8c443286dc2db601d9ccbf905b86d72a
timestamp: 1971-05-16 00:00:00

Version Info:

0: [No Data]

Lazy.328293 also known as:

BkavW32.AIDetectMalware
tehtrisGeneric.Malware
DrWebTrojan.Siggen12.42976
MicroWorld-eScanGen:Variant.Lazy.328293
ClamAVWin.Packed.Razy-9836307-0
FireEyeGeneric.mg.634721e34502486e
SkyhighBehavesLike.Win32.Generic.dc
ALYacGen:Variant.Lazy.328293
MalwarebytesGeneric.Malware.AI.DDS
VIPREGen:Variant.Lazy.328293
SangforTrojan.Win32.Save.a
K7AntiVirusTrojan ( 005a45ef1 )
K7GWTrojan ( 005a15b21 )
Cybereasonmalicious.4f8e03
ArcabitTrojan.Lazy.D50265
BitDefenderThetaGen:NN.ZexaF.36608.78Z@aGR3Qvf
SymantecML.Attribute.HighConfidence
Elasticmalicious (high confidence)
ESET-NOD32a variant of Win32/Kryptik_AGen.BGD
APEXMalicious
CynetMalicious (score: 100)
KasperskyVHO:Trojan.Win32.Khalesi.gen
BitDefenderGen:Variant.Lazy.328293
NANO-AntivirusTrojan.Win32.Selfmod.jsxaqj
AvastWin32:Evo-gen [Trj]
TencentTrojan.Win32.Selfmod.ka
EmsisoftGen:Variant.Lazy.328293 (B)
F-SecureHeuristic.HEUR/AGEN.1369103
ZillyaTrojan.Kryptik.Win32.2283517
Trapminemalicious.moderate.ml.score
SophosTroj/Agent-BFEY
IkarusTrojan.Win32.Glupteba
JiangminTrojan.Selfmod.asmj
GoogleDetected
AviraHEUR/AGEN.1369103
MAXmalware (ai score=80)
Antiy-AVLTrojan/Win32.Kryptik.gify
Kingsoftmalware.kb.a.929
XcitiumTrojWare.Win32.Kryptik.TLS@812zm8
MicrosoftTrojan:Win32/Cerber.MPI!MTB
ZoneAlarmVHO:Trojan.Win32.Khalesi.gen
GDataWin32.Trojan.PSE.1B28NHU
VaristW32/Trojan.MJSE-7842
AhnLab-V3Packed/Win.FJB.R621241
Acronissuspicious
McAfeeTrojan-FVOQ!634721E34502
TACHYONTrojan/W32.Selfmod
VBA32Trojan.Copak
Cylanceunsafe
PandaTrj/Genetic.gen
RisingTrojan.Kryptik!1.B34D (CLASSIC)
SentinelOneStatic AI – Malicious PE
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/Kryptik.GIFQ!tr
AVGWin32:Evo-gen [Trj]
DeepInstinctMALICIOUS
CrowdStrikewin/malicious_confidence_100% (D)

How to remove Lazy.328293?

Lazy.328293 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment