Malware

About “Lazy.336445” infection

Malware Removal

The Lazy.336445 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Lazy.336445 virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Sample contains Overlay data
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • CAPE detected the shellcode get eip malware family
  • Creates a copy of itself
  • Deletes executed files from disk
  • Anomalous binary characteristics
  • Yara detections observed in process dumps, payloads or dropped files

How to determine Lazy.336445?


File Info:

name: BBEC62979E0F9E473D07.mlw
path: /opt/CAPEv2/storage/binaries/0e9f282ed28142f4ec0509e5a26417a93d069aaa47db804a122c1f82e5164fc9
crc32: 9B6ECD3F
md5: bbec62979e0f9e473d07130f78b2bc9b
sha1: 607e8815d1890a6283542a7f9a3e33a42e649905
sha256: 0e9f282ed28142f4ec0509e5a26417a93d069aaa47db804a122c1f82e5164fc9
sha512: 65d354fb50d2e5fc688f253436c9a02fdce79cff6ab64f11b5a9dfb4a13e516e150dbe5df0795125da5d1d73b14c4dc9db0482d61bdae25fd3536a65c713587b
ssdeep: 6144:R9dWMXwvqLK8Wcjf/MXq8tvF97Vw/XcdU:0qWqnmb76/Xcm
type: PE32 executable (console) Intel 80386, for MS Windows
tlsh: T11D54BF6A7A408B6FF3490333ED0A1DCB7F25657891FA8E770759940ED61AB14A33F290
sha3_384: 235a11a878d4f65388d3b13318b1f7932cb3fa97180a65f5a04d130c75bdd52e025fdce27d24139609caf9315d195d0c
ep_bytes: 0f435bd55f2adf525acbd6c34889be79
timestamp: 1970-01-01 00:00:00

Version Info:

0: [No Data]

Lazy.336445 also known as:

BkavW32.AIDetectMalware
MicroWorld-eScanGen:Variant.Lazy.336445
ClamAVWin.Packed.Zpack-10001780-0
SkyhighBehavesLike.Win32.Trojan.dh
McAfeeTrojan-FVOQ!BBEC62979E0F
MalwarebytesCrypt.Trojan.MSIL.DDS
SangforSuspicious.Win32.Save.a
K7AntiVirusTrojan ( 005a45ef1 )
K7GWTrojan ( 005a45ef1 )
ArcabitTrojan.Lazy.D5223D
BitDefenderThetaGen:NN.ZexaF.36744.r8Z@a4kX8Mg
SymantecML.Attribute.HighConfidence
Elasticmalicious (high confidence)
ESET-NOD32a variant of Win32/Kryptik.GIFY
APEXMalicious
CynetMalicious (score: 100)
KasperskyHEUR:Trojan.Win32.Copak.pef
BitDefenderGen:Variant.Lazy.336445
AvastWin32:Evo-gen [Trj]
TencentTrojan.Win32.Copak.kf
EmsisoftGen:Variant.Lazy.336445 (B)
F-SecureTrojan.TR/Crypt.XPACK.Gen
VIPREGen:Variant.Lazy.336445
Trapminemalicious.moderate.ml.score
FireEyeGeneric.mg.bbec62979e0f9e47
SophosMal/Inject-GJ
IkarusTrojan.Win32.Cerber
JiangminTrojan.Injuke.imy
GoogleDetected
AviraTR/Crypt.XPACK.Gen
MAXmalware (ai score=81)
Antiy-AVLTrojan/Win32.Kryptik.girh
Kingsoftmalware.kb.a.1000
XcitiumTrojWare.Win32.Kryptik.TLS@812zm8
MicrosoftTrojan:Win32/Glupteba.MT!MTB
ZoneAlarmHEUR:Trojan.Win32.Copak.pef
GDataGen:Variant.Lazy.336445
VaristW32/Trojan.NJGF-3047
AhnLab-V3Packed/Win.FJB.C5394144
Acronissuspicious
ALYacGen:Variant.Lazy.336445
TACHYONTrojan/W32.Selfmod
VBA32Trojan.Khalesi
Cylanceunsafe
PandaTrj/Genetic.gen
RisingTrojan.Kryptik!1.BF57 (CLASSIC)
SentinelOneStatic AI – Malicious PE
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/Kryptik.GIFQ!tr
AVGWin32:Evo-gen [Trj]
DeepInstinctMALICIOUS
CrowdStrikewin/malicious_confidence_100% (D)

How to remove Lazy.336445?

Lazy.336445 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment