Malware

About “Lazy.336445” infection

Malware Removal

The Lazy.336445 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Lazy.336445 virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Sample contains Overlay data
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Attempts to modify proxy settings
  • Creates a copy of itself
  • Deletes executed files from disk
  • Yara rule detections observed from a process memory dump/dropped files/CAPE

How to determine Lazy.336445?


File Info:

name: CF86A0DD2241A2423496.mlw
path: /opt/CAPEv2/storage/binaries/a18fc2e180a5c4c07e14eeafd1a8af765683f805e4300673fc28fe9a79ec2ecc
crc32: D5E34B45
md5: cf86a0dd2241a2423496e22228092eaf
sha1: 35da4e7e01d74381b989386703658e79b2db12a4
sha256: a18fc2e180a5c4c07e14eeafd1a8af765683f805e4300673fc28fe9a79ec2ecc
sha512: 38d62cb0e56511d0daa15bf27729cd371bf2bfe31bacafe3be78ffd1fb7bbf64b3a14234fe4c1000f49a4b16c03c97cc810d76c0ab47e68ed21b05ad469239c1
ssdeep: 49152:RMxBgazxEJYgsiTbq4TTow+lsgVy1hySd/Wd:RsmKiThTW81hynd
type: PE32 executable (console) Intel 80386, for MS Windows
tlsh: T1CFA5E01D57561503C9236B77DC2DCBBE00857AFE3A93CA6FB886387EB1727889542630
sha3_384: c2a05456fd99af4818a6440e80eb53639e74a7cb5ac75aa343ab0ad2bf82b8945aa7a2aa967a0b33ff2c8969c7880a5d
ep_bytes: 66c7cb9536ae4f12334f4683b1052e39
timestamp: 1971-05-16 00:00:00

Version Info:

0: [No Data]

Lazy.336445 also known as:

BkavW32.AIDetectMalware
tehtrisGeneric.Malware
MicroWorld-eScanGen:Variant.Lazy.336445
SkyhighBehavesLike.Win32.Generic.vc
McAfeeTrojan-FVOQ!CF86A0DD2241
MalwarebytesGeneric.Malware.AI.DDS
SangforTrojan.Win32.Save.a
K7AntiVirusTrojan ( 005a45ef1 )
K7GWTrojan ( 005a45ef1 )
CrowdStrikewin/malicious_confidence_100% (D)
ArcabitTrojan.Lazy.D5223D
SymantecML.Attribute.HighConfidence
Elasticmalicious (high confidence)
ESET-NOD32a variant of Win32/Kryptik_AGen.BGV
CynetMalicious (score: 100)
APEXMalicious
ClamAVWin.Packed.Razy-9785185-0
KasperskyHEUR:Trojan.Win32.Copak.pef
BitDefenderGen:Variant.Lazy.336445
NANO-AntivirusTrojan.Win32.PackedDownloader.ijxqni
AvastWin32:RATX-gen [Trj]
TencentTrojan.Win32.Selfmod.ka
EmsisoftGen:Variant.Lazy.336445 (B)
F-SecureTrojan.TR/Crypt.XPACK.Gen2
VIPREGen:Variant.Lazy.336445
SophosTroj/Agent-BFEY
SentinelOneStatic AI – Malicious PE
JiangminTrojan.Copak.czdd
VaristW32/Trojan.ULNO-1867
AviraTR/Crypt.XPACK.Gen2
Antiy-AVLTrojan/Win32.Kryptik.gify
XcitiumTrojWare.Win32.Kryptik.TLS@812zm8
MicrosoftTrojan:Win32/Glupteba.MT!MTB
ZoneAlarmHEUR:Trojan.Win32.Copak.pef
GDataWin32.Trojan.PSE.11XGYE9
GoogleDetected
AhnLab-V3Packed/Win.FJB.R623046
Acronissuspicious
BitDefenderThetaGen:NN.ZexaF.36680.a!Z@aGX3NXn
ALYacGen:Variant.Lazy.336445
TACHYONTrojan/W32.Selfmod
VBA32Trojan.Copak
Cylanceunsafe
PandaTrj/Genetic.gen
RisingTrojan.Kryptik!1.BF57 (CLASSIC)
YandexTrojan.Redcap!zbi6EFdgH7I
IkarusTrojan-Downloader.Win32.FakeAlert
FortinetW32/Kryptik.GIFQ!tr
AVGWin32:RATX-gen [Trj]
Cybereasonmalicious.e01d74
DeepInstinctMALICIOUS

How to remove Lazy.336445?

Lazy.336445 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment