Malware

Lazy.328293 information

Malware Removal

The Lazy.328293 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Lazy.328293 virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Sample contains Overlay data
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Attempts to modify proxy settings
  • Creates a copy of itself
  • Deletes executed files from disk
  • Yara rule detections observed from a process memory dump/dropped files/CAPE

How to determine Lazy.328293?


File Info:

name: 5116EA09738CB6AA6104.mlw
path: /opt/CAPEv2/storage/binaries/5d61527b459215ff27738fadbd239481879cabb5439634976045807405638f00
crc32: A18DDD09
md5: 5116ea09738cb6aa61042c0c0e6f8bc0
sha1: 7612845d105704edc9ec5ddbba4d34062b304b5d
sha256: 5d61527b459215ff27738fadbd239481879cabb5439634976045807405638f00
sha512: d35fb73e2605e92383d5045899868504eca990e3413acb4369a32e334a390f1d7236e40b5f499466afbea7d168a8ace02fcf6c23789f8d02d545fdc4b290bced
ssdeep: 24576:2GFvgg4TMeiG318pB37IaaX8a/ZSC77Jh7:lz4gLG318jkaaX8gl77
type: PE32 executable (console) Intel 80386, for MS Windows
tlsh: T18A25CF1D2F909583C456973D7E2ECAB0B9227D3D772BD7F170A0B862BC5D7A08626630
sha3_384: c36c7d79141ad23130dcd36f3e5ffae635f494ecd88fa9471fcda2102d52e30f67859e97ddb4aaf8dc35963feda9d393
ep_bytes: 6a9868ec3af1ec6b3f10e5fabd5a8d40
timestamp: 1971-05-16 00:00:00

Version Info:

0: [No Data]

Lazy.328293 also known as:

BkavW32.AIDetectMalware
tehtrisGeneric.Malware
MicroWorld-eScanGen:Variant.Lazy.328293
SkyhighBehavesLike.Win32.Suspicious.dc
McAfeeTrojan-FVOQ!5116EA09738C
MalwarebytesGeneric.Malware.AI.DDS
ZillyaTrojan.Kryptik.Win32.2259642
SangforTrojan.Win32.Save.a
K7AntiVirusTrojan ( 005a45ef1 )
K7GWTrojan ( 005a15b21 )
Cybereasonmalicious.d10570
ArcabitTrojan.Lazy.D50265
BitDefenderThetaGen:NN.ZexaF.36680.78Z@aGR3Qvf
SymantecML.Attribute.HighConfidence
Elasticmalicious (high confidence)
ESET-NOD32a variant of Win32/Kryptik_AGen.BGD
CynetMalicious (score: 100)
APEXMalicious
ClamAVWin.Packed.Razy-9836307-0
KasperskyVHO:Trojan.Win32.Khalesi.gen
BitDefenderGen:Variant.Lazy.328293
NANO-AntivirusTrojan.Win32.Kryptik.fwiozt
AvastWin32:Evo-gen [Trj]
TencentTrojan.Win32.Selfmod.ka
EmsisoftGen:Variant.Lazy.328293 (B)
F-SecureHeuristic.HEUR/AGEN.1369103
VIPREGen:Variant.Lazy.328293
SophosTroj/Agent-BFEY
IkarusTrojan.Win32.Glupteba
JiangminTrojan.Generic.gqena
VaristW32/Trojan.MJSE-7842
AviraHEUR/AGEN.1369103
MAXmalware (ai score=83)
Antiy-AVLTrojan/Win32.Kryptik.gify
Kingsoftmalware.kb.a.875
XcitiumTrojWare.Win32.Kryptik.TLS@812zm8
MicrosoftTrojan:Win32/Cerber.MPI!MTB
ZoneAlarmVHO:Trojan.Win32.Khalesi.gen
GDataWin32.Trojan.PSE.1B28NHU
GoogleDetected
AhnLab-V3Packed/Win.FJB.R621241
Acronissuspicious
VBA32Trojan.Copak
TACHYONTrojan/W32.Selfmod
Cylanceunsafe
PandaTrj/Genetic.gen
RisingTrojan.Kryptik!1.B34D (CLASSIC)
SentinelOneStatic AI – Malicious PE
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/Kryptik.GIFQ!tr
AVGWin32:Evo-gen [Trj]
DeepInstinctMALICIOUS
CrowdStrikewin/malicious_confidence_100% (D)

How to remove Lazy.328293?

Lazy.328293 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment