Malware

Lazy.340414 (B) (file analysis)

Malware Removal

The Lazy.340414 (B) is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Lazy.340414 (B) virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Attempts to modify proxy settings
  • Creates a copy of itself
  • Deletes executed files from disk
  • Yara rule detections observed from a process memory dump/dropped files/CAPE

How to determine Lazy.340414 (B)?


File Info:

name: E0E9079F0DF0A0EC0E07.mlw
path: /opt/CAPEv2/storage/binaries/2c879dafc52f57ae7b8e93dc07b65fbf1b934d658191bdb6553d9e89e66214bb
crc32: 17EAC390
md5: e0e9079f0df0a0ec0e07e3336f686f01
sha1: c58be170056a7fbefbc7d05b3aa0bf2bc14d02e0
sha256: 2c879dafc52f57ae7b8e93dc07b65fbf1b934d658191bdb6553d9e89e66214bb
sha512: 08a509e844757cdb60ea5f40955288b707683559c56820982c5c28ca7e768b5293d0ecff78e53fba327c3830f4f57981d6a670293931fc4887867d81cbc2adef
ssdeep: 12288:7RGmWk2JNetVELuNYvzxuSE9v+RpdjWHwrThQnIio8HrDUiVjVDa/ZSTeFR:7smb2rentnnvg7hQRHrJa/ZSTeFR
type: PE32 executable (console) Intel 80386, for MS Windows
tlsh: T1FA15BF7C56204643CC0CA676A94EDF7544CB2E3D669BE7F03809FBA3B6B17D0A0964B1
sha3_384: c3aab3477b283975d76a9fb0f82ca29b5193397a17ce193d030d16bec7c60bf7edfc448968e9a9113cf5aa0b52a8c838
ep_bytes: df98426a8ff1c6ed8a10cf7c085aa7c6
timestamp: 1975-06-24 00:00:00

Version Info:

0: [No Data]

Lazy.340414 (B) also known as:

MicroWorld-eScanGen:Variant.Lazy.340414
ClamAVWin.Packed.Tiggre-9801540-0
FireEyeGeneric.mg.e0e9079f0df0a0ec
ALYacGen:Variant.Lazy.340414
Cylanceunsafe
ZillyaTrojan.Generic.Win32.93455
SangforTrojan.Win32.Save.a
K7AntiVirusTrojan ( 005a45ef1 )
K7GWTrojan ( 005a14d51 )
Cybereasonmalicious.f0df0a
BitDefenderThetaGen:NN.ZexaF.36196.48W@aSJ4gId
CyrenW32/Copak.E.gen!Eldorado
SymantecML.Attribute.HighConfidence
Elasticmalicious (high confidence)
ESET-NOD32a variant of Win32/Kryptik_AGen.BGV
APEXMalicious
CynetMalicious (score: 100)
KasperskyVHO:Trojan.Win32.Khalesi.gen
BitDefenderGen:Variant.Lazy.340414
NANO-AntivirusTrojan.Win32.Kryptik.fhvvmm
AvastWin32:Evo-gen [Trj]
TencentTrojan.Win32.Selfmod.ka
TACHYONTrojan/W32.Selfmod
EmsisoftGen:Variant.Lazy.340414 (B)
DrWebTrojan.PackedENT.183
VIPREGen:Variant.Lazy.340414
McAfee-GW-EditionBehavesLike.Win32.FakeAVSecurityTool.dc
SophosMal/Inject-GJ
SentinelOneStatic AI – Malicious PE
GDataWin32.Trojan.PSE.11YPVZ
JiangminTrojan.Generic.gfuxq
Antiy-AVLTrojan/Win32.Kryptik.GIFY
XcitiumTrojWare.Win32.Kryptik.TLS@812zm8
ArcabitTrojan.Lazy.D531BE
ZoneAlarmVHO:Trojan.Win32.Khalesi.gen
MicrosoftTrojan:Win32/Glupteba.MT!MTB
GoogleDetected
AhnLab-V3Packed/Win.Generic.R565453
McAfeePacked-FJB!E0E9079F0DF0
MAXmalware (ai score=85)
VBA32Trojan.Copak
MalwarebytesCrypt.Trojan.MSIL.DDS
PandaTrj/Genetic.gen
RisingTrojan.Kryptik!1.BF57 (CLASSIC)
IkarusTrojan.Win32.Crypt
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/Kryptik.GIFQ!tr
AVGWin32:Evo-gen [Trj]
DeepInstinctMALICIOUS
CrowdStrikewin/malicious_confidence_100% (D)

How to remove Lazy.340414 (B)?

Lazy.340414 (B) removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment