Malware

Should I remove “Lazy.328293”?

Malware Removal

The Lazy.328293 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Lazy.328293 virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Sample contains Overlay data
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Attempts to modify proxy settings
  • Creates a copy of itself
  • Deletes executed files from disk
  • Yara rule detections observed from a process memory dump/dropped files/CAPE

How to determine Lazy.328293?


File Info:

name: 4D95676D3B855AB24B5F.mlw
path: /opt/CAPEv2/storage/binaries/03d389090922c980469f79415f4c43a428a5ddde83029619a12f71fc21ad5b23
crc32: B1120C89
md5: 4d95676d3b855ab24b5f04cb20be4ef1
sha1: fd3919fc88498b40ee5cb8fd8201d69fafeb1ac9
sha256: 03d389090922c980469f79415f4c43a428a5ddde83029619a12f71fc21ad5b23
sha512: 9989fa70505371720458267186cba86133b69efdadb54566cda0370a3026508f76a97abc2cd7b5b2f41222206728920825fec5596f158701f5e4b2072cffe2b7
ssdeep: 24576:6K+TrH4YiL4sqHMfLbKTTwj5a/ZSE0E77sFZTDleyVVv:+4TBLbKwVgl0EghcyVVv
type: PE32 executable (console) Intel 80386, for MS Windows
tlsh: T13B55E11E7220079FC80E0F76BC1EE6B613A139782E6BF2663464FABB7541781D177660
sha3_384: 0e9bc37457f33bd1caea58c3f8f1514fe3c007d4f441ce9665fcd006312c1fb38e5a8da479a59ceda58dd001cf44e02d
ep_bytes: 4cf5c2c61c9c4641197d4fd09b37276a
timestamp: 1971-05-16 00:00:00

Version Info:

0: [No Data]

Lazy.328293 also known as:

BkavW32.AIDetectMalware
tehtrisGeneric.Malware
MicroWorld-eScanGen:Variant.Lazy.328293
FireEyeGeneric.mg.4d95676d3b855ab2
SkyhighBehavesLike.Win32.Packed.tc
ALYacGen:Variant.Lazy.328293
MalwarebytesGeneric.Malware.AI.DDS
VIPREGen:Variant.Lazy.328293
SangforTrojan.Win32.Save.a
K7AntiVirusTrojan ( 005a45ef1 )
K7GWTrojan ( 005a45ef1 )
Cybereasonmalicious.c88498
BitDefenderThetaGen:NN.ZexaF.36608.r9Z@aS75Qdi
SymantecML.Attribute.HighConfidence
Elasticmalicious (high confidence)
ESET-NOD32a variant of Win32/Kryptik_AGen.BGD
APEXMalicious
CynetMalicious (score: 100)
KasperskyVHO:Trojan.Win32.Copak.gen
BitDefenderGen:Variant.Lazy.328293
TencentTrojan.Win32.Selfmod.ka
SophosTroj/Agent-BFEY
F-SecureHeuristic.HEUR/AGEN.1369103
DrWebTrojan.Siggen12.42976
ZillyaTrojan.Kryptik.Win32.3646650
Trapminemalicious.moderate.ml.score
EmsisoftGen:Variant.Lazy.328293 (B)
SentinelOneStatic AI – Malicious PE
JiangminTrojan.Selfmod.apjn
VaristW32/Trojan.MJSE-7842
AviraHEUR/AGEN.1369103
MAXmalware (ai score=82)
Antiy-AVLTrojan/Win32.Kryptik.gify
Kingsoftmalware.kb.a.954
XcitiumTrojWare.Win32.Kryptik.TLS@812zm8
ArcabitTrojan.Lazy.D50265
ZoneAlarmVHO:Trojan.Win32.Copak.gen
GDataWin32.Trojan.PSE.1B28NHU
GoogleDetected
AhnLab-V3Packed/Win.FJB.R621039
Acronissuspicious
VBA32Trojan.Copak
TACHYONTrojan/W32.Selfmod
Cylanceunsafe
PandaTrj/Genetic.gen
RisingTrojan.Kryptik!1.BF57 (CLASSIC)
IkarusTrojan-Downloader.Win32.FakeAlert
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/Kryptik.GIFQ!tr
DeepInstinctMALICIOUS
CrowdStrikewin/malicious_confidence_100% (D)

How to remove Lazy.328293?

Lazy.328293 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment