Malware

Lazy.328293 (file analysis)

Malware Removal

The Lazy.328293 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Lazy.328293 virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Sample contains Overlay data
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Attempts to modify proxy settings
  • Creates a copy of itself
  • Deletes executed files from disk
  • Yara rule detections observed from a process memory dump/dropped files/CAPE

How to determine Lazy.328293?


File Info:

name: B8D5CDF25710E50A428F.mlw
path: /opt/CAPEv2/storage/binaries/3560563f1f0dd5c36b8c4b1a42d1384d852f7c16b29fe974e5e71239e021e094
crc32: 93EAD126
md5: b8d5cdf25710e50a428fec4fd5e4e348
sha1: 9c0f5b75bfaf07411ec36871f4e38b580f8bcad1
sha256: 3560563f1f0dd5c36b8c4b1a42d1384d852f7c16b29fe974e5e71239e021e094
sha512: ea41ee06661defcedb6b07c1539f5fb46d451d5e62de9312b7b768ffe685d8c85aee7e6a95b41d8c4edf8967e19fb1ee892298807aa2e97468141466d4bc2109
ssdeep: 24576:NXMkzxK2hNjkFr1NbNhMpEZH5vk51Ea/ZSE0E77sFZTDleyVVv:hhfToV8kgl0EghcyVVv
type: PE32 executable (console) Intel 80386, for MS Windows
tlsh: T18155D08D13DC0203D419123EAB6EDE9EA262B83CB577F2B03525718B7731B759D4EA21
sha3_384: ea1e0ed5649a03acac3f559f0daa96f37db75257447ec5a3b6eb338086f8f5fe2dcb8f003cf02de80c7848f9325896ce
ep_bytes: 83529571d33b11f6d6da1867549070dd
timestamp: 1971-05-16 00:00:00

Version Info:

0: [No Data]

Lazy.328293 also known as:

BkavW32.AIDetectMalware
tehtrisGeneric.Malware
DrWebTrojan.Siggen12.42976
MicroWorld-eScanGen:Variant.Lazy.328293
ClamAVWin.Packed.Razy-9836307-0
SkyhighBehavesLike.Win32.Packed.tc
McAfeeTrojan-FVOQ!B8D5CDF25710
MalwarebytesGeneric.Malware.AI.DDS
VIPREGen:Variant.Lazy.328293
SangforTrojan.Win32.Save.a
K7AntiVirusTrojan ( 005a45ef1 )
K7GWTrojan ( 005a45ef1 )
Cybereasonmalicious.5bfaf0
ArcabitTrojan.Lazy.D50265
BitDefenderThetaGen:NN.ZexaF.36680.r9Z@aS75Qdi
SymantecML.Attribute.HighConfidence
Elasticmalicious (high confidence)
ESET-NOD32a variant of Win32/Kryptik_AGen.BGD
APEXMalicious
CynetMalicious (score: 100)
KasperskyVHO:Trojan.Win32.Copak.gen
BitDefenderGen:Variant.Lazy.328293
NANO-AntivirusTrojan.Win32.Kryptik.jvrtbh
AvastWin32:Evo-gen [Trj]
RisingTrojan.Kryptik!1.BF57 (CLASSIC)
EmsisoftGen:Variant.Lazy.328293 (B)
F-SecureHeuristic.HEUR/AGEN.1369103
ZillyaTrojan.Kryptik.Win32.3659414
SophosTroj/Agent-BFEY
IkarusTrojan-Downloader.Win32.FakeAlert
JiangminTrojan.Selfmod.apxe
GoogleDetected
AviraHEUR/AGEN.1369103
Antiy-AVLTrojan/Win32.Kryptik.gify
XcitiumTrojWare.Win32.Kryptik.TLS@812zm8
MicrosoftTrojan:Win32/Cerber.MPI!MTB
ZoneAlarmVHO:Trojan.Win32.Copak.gen
GDataWin32.Trojan.PSE.1B28NHU
VaristW32/Trojan.MJSE-7842
AhnLab-V3Packed/Win.FJB.R621039
Acronissuspicious
VBA32Trojan.Copak
TACHYONTrojan/W32.Selfmod
Cylanceunsafe
PandaTrj/Genetic.gen
TencentTrojan.Win32.Selfmod.ka
SentinelOneStatic AI – Malicious PE
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/Kryptik.GIFQ!tr
AVGWin32:Evo-gen [Trj]
DeepInstinctMALICIOUS
CrowdStrikewin/malicious_confidence_100% (D)

How to remove Lazy.328293?

Lazy.328293 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment