Malware

Lazy.409426 malicious file

Malware Removal

The Lazy.409426 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Lazy.409426 virus can do?

  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Binary file triggered YARA rule
  • Binary compilation timestomping detected

How to determine Lazy.409426?


File Info:

name: 4B43E732CAFEB874CB73.mlw
path: /opt/CAPEv2/storage/binaries/79996efa6c5bdaffa83b15416ced2b8a500247bcf35eb4e81dc08f093f3ffcda
crc32: AE878511
md5: 4b43e732cafeb874cb73af84dbe2b837
sha1: f1a8c42a7910e92f90cd22ba08ffccc1fb896921
sha256: 79996efa6c5bdaffa83b15416ced2b8a500247bcf35eb4e81dc08f093f3ffcda
sha512: b71f651090b668285fc04ac20072895cd266e31ab4c1552f3561177f213aa3724580e6ef8fae8aeca427ad5aa94ece5d84b12800250c9a409b3ec644e2ca6dab
ssdeep: 12288:TmEmD+PFasrv03AOb80XIRHEdunqUkbAY9V5rUV:qE++t7v03TbbUkgTkcY9VhUV
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T110B4013CDF8AADB0F7FC867EACB4158857B96201EA06C35B5580A97C64877D19E321C3
sha3_384: badffc2b0f511a12872cc9cc40428191511ad9284a266c3f7bb162b7b5bd1af242f694495ff12fff5fb427d559b9c6de
ep_bytes: ff250020400000000000000000000000
timestamp: 2049-12-09 04:39:59

Version Info:

Translation: 0x0000 0x04b0
Comments: Will Detect Consoles Color
CompanyName: Bonjour
FileDescription: Bonosua
FileVersion: 4.0.4.0
InternalName: CmDesigner.exe
LegalCopyright: Copyright © 32321-10803 2023
LegalTrademarks: bonosua
OriginalFilename: CmDesigner.exe
ProductName: Bonosua
ProductVersion: 4.0.4.0
Assembly Version: 4.0.4.0

Lazy.409426 also known as:

BkavW32.AIDetectMalware.CS
LionicTrojan.Win32.APosT.4!c
Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.Lazy.409426
FireEyeGeneric.mg.4b43e732cafeb874
SkyhighBehavesLike.Win32.Generic.hc
McAfeeArtemis!4B43E732CAFE
MalwarebytesBruteForce.HackTool.Stealer.DDS
VIPREGen:Variant.Lazy.409426
SangforSuspicious.Win32.Save.a
K7AntiVirusTrojan ( 0058b9bd1 )
AlibabaTrojan:MSIL/APosT.95478ef2
K7GWTrojan ( 0058b9bd1 )
CrowdStrikewin/malicious_confidence_100% (W)
VirITTrojan.Win32.MSIL_Heur.A
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of MSIL/Packed.DarksProtector.B suspicious
APEXMalicious
TrendMicro-HouseCallTROJ_GEN.R002C0XC524
KasperskyHEUR:Trojan.MSIL.APosT.gen
BitDefenderGen:Variant.Lazy.409426
AvastWin32:TrojanX-gen [Trj]
TencentMalware.Win32.Gencirc.13f279fc
EmsisoftGen:Variant.Lazy.409426 (B)
F-SecureTrojan.TR/APosT.joxal
ZillyaTrojan.APosT.Win32.2664
TrendMicroTROJ_GEN.R002C0XC524
SophosMal/Generic-S
IkarusTrojan.Agent
GoogleDetected
AviraTR/APosT.joxal
VaristW32/ABRisk.BBLX-7144
Antiy-AVLTrojan/Win32.Sabsik
Kingsoftmalware.kb.c.999
MicrosoftTrojan:Win32/Wacatac.B!ml
ArcabitTrojan.Lazy.D63F52
ZoneAlarmHEUR:Trojan.MSIL.APosT.gen
GDataGen:Variant.Lazy.409426
AhnLab-V3Trojan/Win.Bladabindi.C5499513
BitDefenderThetaGen:NN.ZemsilF.36802.Gm0@aaCdgkg
ALYacGen:Variant.Lazy.409426
MAXmalware (ai score=89)
Cylanceunsafe
PandaTrj/Chgt.AD
RisingMalware.Obfus/MSIL@AI.80 (RDM.MSIL2:AhXPWY+ZLc14n4dhfdNYqw)
SentinelOneStatic AI – Malicious PE
MaxSecureTrojan.Malware.73716888.susgen
FortinetMSIL/Kryptik.TRP!tr
AVGWin32:TrojanX-gen [Trj]
Cybereasonmalicious.2cafeb
DeepInstinctMALICIOUS
alibabacloudTrojan:MSIL/APosT.gen

How to remove Lazy.409426?

Lazy.409426 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment