Malware

Lazy.328293 malicious file

Malware Removal

The Lazy.328293 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Lazy.328293 virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Sample contains Overlay data
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • CAPE detected the shellcode get eip malware family
  • Attempts to modify proxy settings
  • Creates a copy of itself
  • Deletes executed files from disk
  • Yara detections observed in process dumps, payloads or dropped files

How to determine Lazy.328293?


File Info:

name: 4B744FFB05F5E3A24A26.mlw
path: /opt/CAPEv2/storage/binaries/112de009b8ee162944cb7d47af311442162d0a07e8cc38bb382589049f3351ac
crc32: 741CCEC1
md5: 4b744ffb05f5e3a24a266b8dcaf8fb65
sha1: 87532fe5141a44bedee74e6a80d64d7818ffa1e5
sha256: 112de009b8ee162944cb7d47af311442162d0a07e8cc38bb382589049f3351ac
sha512: 315d54c1e8e53e20d88082ccb304251946b482c362d5420ba2ff09fcaf9f79d201548ff5f5dc4fb0698cdd482f06f038963fe29070ec3a59b41c7b57236aa948
ssdeep: 24576:D/6gHVR8gDh4kqt9JezDa/ZSE0E77sFZTDleyVVv:D6g1RJGD9SDgl0EghcyVVv
type: PE32 executable (console) Intel 80386, for MS Windows
tlsh: T13855D04B13461683C1060ABEE91FBE76A231793DFBB7F631305072AB7D667C88452A35
sha3_384: 38013e12de99848928a4966c7697b294b1e9de1ecc60c4a0b1cbf6552a9817ebf8020194dd8a25edf45d0e6ddf25e3e7
ep_bytes: 9ed7793fcebefdb8cb5ff42949159c93
timestamp: 1971-05-16 00:00:00

Version Info:

0: [No Data]

Lazy.328293 also known as:

BkavW32.AIDetectMalware
Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.Lazy.328293
FireEyeGeneric.mg.4b744ffb05f5e3a2
SkyhighBehavesLike.Win32.Trojan.tc
McAfeeTrojan-FVOQ!4B744FFB05F5
MalwarebytesGeneric.Malware.AI.DDS
VIPREGen:Variant.Lazy.328293
SangforTrojan.Win32.Save.a
K7AntiVirusTrojan ( 005a45ef1 )
K7GWTrojan ( 005a45ef1 )
Cybereasonmalicious.5141a4
BitDefenderThetaGen:NN.ZexaF.36744.r9Z@aS75Qdi
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Kryptik_AGen.BGD
APEXMalicious
ClamAVWin.Packed.Razy-9836307-0
KasperskyVHO:Trojan.Win32.Copak.gen
BitDefenderGen:Variant.Lazy.328293
NANO-AntivirusTrojan.Win32.Selfmod.iqtxhs
AvastWin32:Evo-gen [Trj]
RisingTrojan.Kryptik!1.BF57 (CLASSIC)
F-SecureHeuristic.HEUR/AGEN.1369103
ZillyaTrojan.Kryptik.Win32.2407470
SophosTroj/Agent-BFEY
SentinelOneStatic AI – Malicious PE
JiangminTrojan.Generic.grrtv
VaristW32/Trojan.MJSE-7842
AviraHEUR/AGEN.1369103
MAXmalware (ai score=87)
Antiy-AVLTrojan/Win32.Kryptik.gify
Kingsoftmalware.kb.a.917
XcitiumTrojWare.Win32.Kryptik.TLS@812zm8
ArcabitTrojan.Lazy.D50265
ZoneAlarmVHO:Trojan.Win32.Copak.gen
GDataWin32.Trojan.PSE.1B28NHU
CynetMalicious (score: 100)
AhnLab-V3Packed/Win.FJB.R621039
Acronissuspicious
VBA32Trojan.Copak
ALYacGen:Variant.Lazy.328293
TACHYONTrojan/W32.Selfmod
Cylanceunsafe
PandaTrj/Genetic.gen
TencentTrojan.Win32.Selfmod.ka
IkarusTrojan-Downloader.Win32.FakeAlert
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/Kryptik.GIFQ!tr
AVGWin32:Evo-gen [Trj]
DeepInstinctMALICIOUS
CrowdStrikewin/malicious_confidence_100% (D)

How to remove Lazy.328293?

Lazy.328293 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment