Malware

Lazy.423828 removal tips

Malware Removal

The Lazy.423828 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Lazy.423828 virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Sample contains Overlay data
  • Reads data out of its own binary image
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Attempts to modify proxy settings
  • Creates a copy of itself
  • Deletes executed files from disk
  • Yara rule detections observed from a process memory dump/dropped files/CAPE

How to determine Lazy.423828?


File Info:

name: A5F13D431FEFF0BB7845.mlw
path: /opt/CAPEv2/storage/binaries/10a264f6b6639beb1039841040d3bac6b05dd82f6d95a4a994dfc6bdf5b6f32c
crc32: E3C6CE90
md5: a5f13d431feff0bb78456927aa5d46ce
sha1: 926234fc3f49e0e768313012a28285891309f0a7
sha256: 10a264f6b6639beb1039841040d3bac6b05dd82f6d95a4a994dfc6bdf5b6f32c
sha512: 4f809d3a53db2a954f0da28c704332f7244b83e3757a610c43b924669e58801d1ebdd2630ce5e93cf7efad9acb9ff8712b2d8392be7408628b1cd86e5eff1401
ssdeep: 49152:IdTQ7ItbgCHFpbq4TTJbiAgE1+EZJQ6Wghbq4TTNT06lgP:IdomhHFphT95m6HhTpT06lgP
type: PE32 executable (console) Intel 80386, for MS Windows
tlsh: T174C5E01C231A6983C423577AEC5FCF7B454229FC7A97D72C34A034EAF6267D0A942636
sha3_384: 954885150988d3b37d7920ddcffe98a662bb1aa168bf4adb98b1650de5500a9525e051edbba7fcf480b0cacf9eff4f0d
ep_bytes: 24540760743d83e771dc8a76f396e2cc
timestamp: 1972-09-27 00:00:00

Version Info:

0: [No Data]

Lazy.423828 also known as:

BkavW32.AIDetectMalware
tehtrisGeneric.Malware
DrWebTrojan.Siggen12.42976
MicroWorld-eScanGen:Variant.Lazy.423828
SkyhighBehavesLike.Win32.Generic.vc
ALYacGen:Variant.Lazy.423828
MalwarebytesGeneric.Malware.AI.DDS
ZillyaTrojan.Generic.Win32.354390
SangforTrojan.Win32.Save.a
K7AntiVirusTrojan ( 005a45ef1 )
K7GWTrojan ( 005a45ef1 )
CrowdStrikewin/malicious_confidence_100% (D)
ArcabitTrojan.Lazy.D67794
BitDefenderThetaGen:NN.ZexaF.36608.L6Z@aqPQx@k
SymantecML.Attribute.HighConfidence
Elasticmalicious (high confidence)
ESET-NOD32a variant of Win32/Kryptik_AGen.BGV
CynetMalicious (score: 100)
APEXMalicious
ClamAVWin.Packed.Razy-9785185-0
KasperskyVHO:Trojan.Win32.Khalesi.gen
BitDefenderGen:Variant.Lazy.423828
NANO-AntivirusTrojan.Win32.Kryptik.fknvjq
AvastWin32:RATX-gen [Trj]
RisingTrojan.Kryptik!1.BF57 (CLASSIC)
EmsisoftGen:Variant.Lazy.423828 (B)
F-SecureHeuristic.HEUR/AGEN.1369103
VIPREGen:Variant.Lazy.423828
Trapminesuspicious.low.ml.score
FireEyeGeneric.mg.a5f13d431feff0bb
SophosTroj/Agent-BFEY
IkarusTrojan.Win32.Glupteba
JiangminTrojan.Generic.cuddj
VaristW32/Trojan.ULNO-1867
AviraHEUR/AGEN.1369103
MAXmalware (ai score=87)
Antiy-AVLTrojan/Win32.Kryptik.gify
XcitiumTrojWare.Win32.Kryptik.TLS@812zm8
MicrosoftTrojan:Win32/Glupteba.MT!MTB
ZoneAlarmVHO:Trojan.Win32.Khalesi.gen
GDataWin32.Trojan.PSE.11XGYE9
GoogleDetected
AhnLab-V3Trojan/Win.BG.C5400712
Acronissuspicious
McAfeeTrojan-FVOQ!A5F13D431FEF
TACHYONTrojan/W32.Selfmod
VBA32Trojan.Copak
Cylanceunsafe
PandaTrj/Genetic.gen
TencentTrojan.Win32.Selfmod.ka
SentinelOneStatic AI – Malicious PE
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/Kryptik.GIFQ!tr
AVGWin32:RATX-gen [Trj]
Cybereasonmalicious.c3f49e
DeepInstinctMALICIOUS

How to remove Lazy.423828?

Lazy.423828 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment