Malware

Lazy.328293 information

Malware Removal

The Lazy.328293 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Lazy.328293 virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Sample contains Overlay data
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • CAPE detected the shellcode get eip malware family
  • Attempts to modify proxy settings
  • Creates a copy of itself
  • Deletes executed files from disk
  • Yara detections observed in process dumps, payloads or dropped files

How to determine Lazy.328293?


File Info:

name: 434D9D6B60B1CC55F037.mlw
path: /opt/CAPEv2/storage/binaries/5c41fdb6f490d486ff60df3b3685de2225d5b03b33fde20d0c63fd2cb8caffaa
crc32: 82DF7C01
md5: 434d9d6b60b1cc55f037bbb271d170d0
sha1: f82f82e859e9a87451f46c9a13a8f8b747d037a7
sha256: 5c41fdb6f490d486ff60df3b3685de2225d5b03b33fde20d0c63fd2cb8caffaa
sha512: 4b79e11456e31aa7d2af8b9590d93dc60d2ec15cc4a58e7979e33e36783c4ffab3ce6800233d032e4ced590656b510924d4fed64718a526752fab9e77e1a8c92
ssdeep: 24576:x0lBP8lJpj+5RfjSxWKH1+aeYMFZm5Ra/ZSE0E77i:K4t+5Rf08aZ4Zm5Rgl0ES
type: PE32 executable (console) Intel 80386, for MS Windows
tlsh: T12E25B0CE165D2253C01E777A692FDE3A4D8E793FAA63E67A7448754B7813382F802530
sha3_384: 7260be63115631aca3f34b270e2ab0c728765c8957c00ba43833f03d6126bad9e3d257c3fb9c2cb1dcecef043cad8c33
ep_bytes: 05487bc75521ff4050c0f6d1d28a9e6b
timestamp: 1971-05-16 00:00:00

Version Info:

0: [No Data]

Lazy.328293 also known as:

BkavW32.AIDetectMalware
AVGWin32:Evo-gen [Trj]
Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.Lazy.328293
FireEyeGeneric.mg.434d9d6b60b1cc55
SkyhighBehavesLike.Win32.Generic.dc
McAfeeTrojan-FVOQ!434D9D6B60B1
MalwarebytesGeneric.Malware.AI.DDS
ZillyaTrojan.Selfmod.Win32.1048
SangforTrojan.Win32.Save.a
K7AntiVirusTrojan ( 005a45ef1 )
K7GWTrojan ( 005a45ef1 )
CrowdStrikewin/malicious_confidence_100% (D)
BitDefenderThetaGen:NN.ZexaF.36744.88Z@aS75Qdi
SymantecML.Attribute.HighConfidence
tehtrisGeneric.Malware
ESET-NOD32a variant of Win32/Kryptik_AGen.BGD
CynetMalicious (score: 100)
APEXMalicious
ClamAVWin.Packed.Razy-9836307-0
KasperskyVHO:Trojan.Win32.Copak.gen
BitDefenderGen:Variant.Lazy.328293
AvastWin32:Evo-gen [Trj]
TencentTrojan.Win32.Selfmod.ka
TACHYONTrojan/W32.Selfmod
EmsisoftGen:Variant.Lazy.328293 (B)
F-SecureHeuristic.HEUR/AGEN.1369103
VIPREGen:Variant.Lazy.328293
Trapminemalicious.moderate.ml.score
SophosTroj/Agent-BFEY
IkarusTrojan-Downloader.Win32.FakeAlert
GDataWin32.Trojan.PSE.1B28NHU
VaristW32/Trojan.MJSE-7842
AviraHEUR/AGEN.1369103
Antiy-AVLTrojan/Win32.Kryptik.gify
Kingsoftmalware.kb.a.900
XcitiumTrojWare.Win32.Kryptik.TLS@812zm8
ArcabitTrojan.Lazy.D50265
ZoneAlarmVHO:Trojan.Win32.Copak.gen
MicrosoftTrojan:Win32/Cerber.MPI!MTB
GoogleDetected
AhnLab-V3Packed/Win.FJB.R626411
Acronissuspicious
VBA32Trojan.Copak
ALYacGen:Variant.Lazy.328293
MAXmalware (ai score=89)
Cylanceunsafe
PandaTrj/Genetic.gen
RisingTrojan.Kryptik!1.B34D (CLASSIC)
SentinelOneStatic AI – Malicious PE
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/Kryptik.GIFQ!tr
Cybereasonmalicious.859e9a
DeepInstinctMALICIOUS

How to remove Lazy.328293?

Lazy.328293 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment