Malware

Lazy.336445 (file analysis)

Malware Removal

The Lazy.336445 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Lazy.336445 virus can do?

  • Sample contains Overlay data
  • Reads data out of its own binary image
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • CAPE detected the shellcode get eip malware family
  • Deletes executed files from disk
  • Anomalous binary characteristics
  • Yara detections observed in process dumps, payloads or dropped files

How to determine Lazy.336445?


File Info:

name: 18A3C88A69E4B77F445D.mlw
path: /opt/CAPEv2/storage/binaries/7c9281daf3128626a44f6b3fc008140591a31f4348b52e647f3e51c72502a62b
crc32: E30B4DBE
md5: 18a3c88a69e4b77f445d0f92a3ae6b48
sha1: 6de583c349359a3091df6bda599344a157e6f409
sha256: 7c9281daf3128626a44f6b3fc008140591a31f4348b52e647f3e51c72502a62b
sha512: f80eca985fe0e4021cce96f15a1d7ed27b38e8d4c7242011d91695745c8db36680bc617505479f832cfc8c793a2c11f80ae7ecd00e7148e8d5ef496bf410a15c
ssdeep: 6144:f9PUDUEMwncnS8iTg0quDygOrLNec23MF97Vw/XcdU:dUIwc8q+c23476/Xcm
type: PE32 executable (console) Intel 80386, for MS Windows
tlsh: T1F054A05EBAD81772EA860A76122A10D3EB3C4C353377C9A87575802F133EA74D27A3D5
sha3_384: 9e65fc41d08f84938738fef0ea62c132ca4a698fc3849c5eac10dce8621b73090d6727fc8490ac6609234c508eb68384
ep_bytes: aeb85746fed1d3c1fb30da50e972b2ea
timestamp: 1970-01-01 00:00:00

Version Info:

0: [No Data]

Lazy.336445 also known as:

BkavW32.AIDetectMalware
MicroWorld-eScanGen:Variant.Lazy.336445
ClamAVWin.Packed.Zpack-10001780-0
FireEyeGeneric.mg.18a3c88a69e4b77f
SkyhighBehavesLike.Win32.Ctsinf.dc
McAfeeTrojan-FVOQ!18A3C88A69E4
MalwarebytesCrypt.Trojan.MSIL.DDS
VIPREGen:Variant.Lazy.336445
SangforSuspicious.Win32.Save.a
K7AntiVirusTrojan ( 005a45ef1 )
K7GWTrojan ( 005a45ef1 )
BitDefenderThetaGen:NN.ZexaF.36744.r8Z@a4kX8Mg
SymantecML.Attribute.HighConfidence
Elasticmalicious (high confidence)
ESET-NOD32a variant of Win32/Kryptik.GIFY
APEXMalicious
CynetMalicious (score: 100)
KasperskyHEUR:Trojan.Win32.Copak.pef
BitDefenderGen:Variant.Lazy.336445
NANO-AntivirusTrojan.Win32.Selfmod.kgioiv
AvastWin32:Evo-gen [Trj]
RisingTrojan.Kryptik!1.B34D (CLASSIC)
EmsisoftGen:Variant.Lazy.336445 (B)
F-SecureTrojan.TR/Crypt.XPACK.Gen
TrendMicroTROJ_GEN.R03BC0DBJ24
Trapminemalicious.moderate.ml.score
SophosMal/Inject-GJ
SentinelOneStatic AI – Malicious PE
GDataGen:Variant.Lazy.336445
JiangminTrojan.Copak.cpjf
GoogleDetected
AviraTR/Crypt.XPACK.Gen
MAXmalware (ai score=89)
Antiy-AVLTrojan/Win32.Kryptik.girh
Kingsoftmalware.kb.a.1000
XcitiumTrojWare.Win32.Kryptik.TLS@812zm8
ArcabitTrojan.Lazy.D5223D
ZoneAlarmHEUR:Trojan.Win32.Copak.pef
MicrosoftTrojan:Win32/Glupteba.MT!MTB
VaristW32/Trojan.NJGF-3047
AhnLab-V3Packed/Win.FJB.C5394144
Acronissuspicious
VBA32Trojan.Khalesi
ALYacGen:Variant.Lazy.336445
TACHYONTrojan/W32.Selfmod
Cylanceunsafe
PandaTrj/Genetic.gen
TrendMicro-HouseCallTROJ_GEN.R03BC0DBJ24
TencentTrojan.Win32.Copak.kf
IkarusTrojan.Win32.Cerber
FortinetW32/Kryptik.GIFQ!tr
AVGWin32:Evo-gen [Trj]
DeepInstinctMALICIOUS
CrowdStrikewin/malicious_confidence_100% (W)

How to remove Lazy.336445?

Lazy.336445 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment