Malware

About “Lazy.328293” infection

Malware Removal

The Lazy.328293 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Lazy.328293 virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Sample contains Overlay data
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Attempts to modify proxy settings
  • Creates a copy of itself
  • Deletes executed files from disk
  • Yara rule detections observed from a process memory dump/dropped files/CAPE

How to determine Lazy.328293?


File Info:

name: 2DADD91369FF5B220776.mlw
path: /opt/CAPEv2/storage/binaries/c29c98e68676288379df0c7a75ace7b3e90116a51f7e25e5753bac0cc2ff3a88
crc32: 2E60AC15
md5: 2dadd91369ff5b220776ba282fed062e
sha1: 473abec2eae939a23a94e2808ec1c8aefba4f64e
sha256: c29c98e68676288379df0c7a75ace7b3e90116a51f7e25e5753bac0cc2ff3a88
sha512: 19b82a586079e5af8e9174aa68a2a6e6efbc9f0d1ecf5d3258ab3c495e3ed4a7df215eca627633c9260846e1393aa388db467b8cf47591a76cbe0d8edf5dbcb5
ssdeep: 24576:mrIDze3KHYdbhvyPXpUGVO11+a/ZSE0E77i:xDzGKHiIvAwgl0ES
type: PE32 executable (console) Intel 80386, for MS Windows
tlsh: T15D25CFCD12F626FFC05A663A6E6ECA7632023035B6A2EB307145BE5B7D607DDD046930
sha3_384: 23423c741f35f43cdcc7ec867a3d7f90da5a995486f1f77ea453ace162d78564fca94fa730fe38cbe8a4003c270331a7
ep_bytes: 2de0a7d37d89235478682ac5fa22427f
timestamp: 1971-05-16 00:00:00

Version Info:

0: [No Data]

Lazy.328293 also known as:

BkavW32.AIDetectMalware
Elasticmalicious (high confidence)
CynetMalicious (score: 100)
SkyhighBehavesLike.Win32.Rontokbro.dc
McAfeeTrojan-FVOQ!2DADD91369FF
MalwarebytesGeneric.Malware.AI.DDS
ZillyaTrojan.Kryptik.Win32.2278669
SangforTrojan.Win32.Save.a
K7AntiVirusTrojan ( 005a45ef1 )
K7GWTrojan ( 005a45ef1 )
CrowdStrikewin/malicious_confidence_100% (D)
SymantecML.Attribute.HighConfidence
tehtrisGeneric.Malware
ESET-NOD32a variant of Win32/Kryptik_AGen.BGD
APEXMalicious
ClamAVWin.Packed.Razy-9836307-0
KasperskyVHO:Trojan.Win32.Copak.gen
BitDefenderGen:Variant.Lazy.328293
MicroWorld-eScanGen:Variant.Lazy.328293
AvastWin32:Evo-gen [Trj]
TencentTrojan.Win32.Selfmod.ka
EmsisoftGen:Variant.Lazy.328293 (B)
F-SecureHeuristic.HEUR/AGEN.1369103
VIPREGen:Variant.Lazy.328293
SophosTroj/Agent-BFEY
IkarusTrojan-Downloader.Win32.FakeAlert
GDataWin32.Trojan.PSE.1B28NHU
AviraHEUR/AGEN.1369103
Antiy-AVLTrojan/Win32.Kryptik.gify
Kingsoftmalware.kb.a.938
XcitiumTrojWare.Win32.Kryptik.TLS@812zm8
ArcabitTrojan.Lazy.D50265
ZoneAlarmVHO:Trojan.Win32.Copak.gen
MicrosoftTrojan:Win32/Cerber.MPI!MTB
VaristW32/Trojan.MJSE-7842
AhnLab-V3Packed/Win.FJB.R626411
Acronissuspicious
VBA32Trojan.Copak
ALYacGen:Variant.Lazy.328293
TACHYONTrojan/W32.Selfmod
Cylanceunsafe
PandaTrj/Genetic.gen
RisingTrojan.Kryptik!1.B34D (CLASSIC)
SentinelOneStatic AI – Malicious PE
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/Kryptik.GIFQ!tr
BitDefenderThetaGen:NN.ZexaF.36680.88Z@aS75Qdi
AVGWin32:Evo-gen [Trj]
Cybereasonmalicious.2eae93
DeepInstinctMALICIOUS

How to remove Lazy.328293?

Lazy.328293 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment