Malware

What is “Lazy.428911”?

Malware Removal

The Lazy.428911 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Lazy.428911 virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Sample contains Overlay data
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Creates a copy of itself
  • Deletes executed files from disk
  • Yara rule detections observed from a process memory dump/dropped files/CAPE

How to determine Lazy.428911?


File Info:

name: EC64A4180000BD3C8561.mlw
path: /opt/CAPEv2/storage/binaries/3067405ef640ae7369f14cd26f70a4cf3b04f2a618675534169f18e1a49cacf2
crc32: BE1115A4
md5: ec64a4180000bd3c8561ed74286d6697
sha1: 6c4d2f5bf91dc34705e04a83f365868a59ed5c2f
sha256: 3067405ef640ae7369f14cd26f70a4cf3b04f2a618675534169f18e1a49cacf2
sha512: 7e7eb23f66d9a9dec64cbec526fc8dbb743c61fca029218359d2e01361e457fa2af31ec2c7e074ad5dee4336dabbbc45faab97c23a1d6fd3d615f17c084684b7
ssdeep: 12288:gMXuk7EvO9deASdRObBV5sAVe91W1BUAn1Mo75VhZ2Q:1Xb7EvO91aRXAVe9YymVhZ2Q
type: PE32 executable (console) Intel 80386, for MS Windows
tlsh: T12CB49DEC6D49CBA1F9E92030DD06E68A41072641D96F4208DCE5757B2D2DAECF2FE913
sha3_384: 38ee67828ad819b737adf6b8b8af12085b16e38e62d6d225cb5c9a6de597581049886e8d38131bf9b65bc65574e38279
ep_bytes: 3501f452656870d56089794472cb11fe
timestamp: 1971-05-16 00:00:00

Version Info:

0: [No Data]

Lazy.428911 also known as:

BkavW32.AIDetectMalware
Elasticmalicious (high confidence)
DrWebTrojan.Siggen23.29992
MicroWorld-eScanGen:Variant.Lazy.428911
SkyhighBehavesLike.Win32.Glupteba.hc
McAfeeTrojan-FVOQ!EC64A4180000
MalwarebytesGeneric.Malware.AI.DDS
VIPREGen:Variant.Lazy.428911
SangforTrojan.Win32.Save.a
K7AntiVirusTrojan ( 005a45ef1 )
K7GWTrojan ( 005a45ef1 )
Cybereasonmalicious.bf91dc
ArcabitTrojan.Lazy.D68B6F
BitDefenderThetaGen:NN.ZexaF.36680.GWZ@aSxTrqd
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Kryptik_AGen.BFL
CynetMalicious (score: 100)
APEXMalicious
ClamAVWin.Packed.Dridex-9775371-1
KasperskyUDS:Trojan.Win32.Copak.ayijc
BitDefenderGen:Variant.Lazy.428911
NANO-AntivirusTrojan.Win32.PackedDownloader.ijxqni
AvastWin32:TrojanX-gen [Trj]
TencentTrojan.Win32.Copak.hm
EmsisoftGen:Variant.Lazy.428911 (B)
F-SecureTrojan.TR/Crypt.XPACK.Gen
SophosTroj/Agent-BFEY
IkarusTrojan-Downloader.Win32.FakeAlert
VaristW32/Trojan.NJGF-3047
AviraTR/Crypt.XPACK.Gen
Antiy-AVLTrojan/Win32.Kryptik.girh
Kingsoftmalware.kb.a.994
XcitiumTrojWare.Win32.Kryptik.TLS@812zm8
MicrosoftTrojan:Win32/Glupteba.MT!MTB
ZoneAlarmUDS:Trojan.Win32.Copak.ayijc
GDataWin32.Trojan.PSE.11XGYE9
GoogleDetected
AhnLab-V3Packed/Win.FJB.C5537157
Acronissuspicious
VBA32Trojan.Khalesi
ALYacGen:Variant.Lazy.428911
TACHYONTrojan/W32.Selfmod
Cylanceunsafe
PandaTrj/Genetic.gen
RisingTrojan.Kryptik!1.B34D (CLASSIC)
SentinelOneStatic AI – Malicious PE
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/Kryptik.GIFQ!tr
AVGWin32:TrojanX-gen [Trj]
DeepInstinctMALICIOUS
CrowdStrikewin/malicious_confidence_100% (W)

How to remove Lazy.428911?

Lazy.428911 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment