Malware

About “Lazy.433198” infection

Malware Removal

The Lazy.433198 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Lazy.433198 virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Sample contains Overlay data
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Attempts to modify proxy settings
  • Creates a copy of itself
  • Deletes executed files from disk
  • Yara rule detections observed from a process memory dump/dropped files/CAPE

How to determine Lazy.433198?


File Info:

name: B258C118ABFEDBD1E0C2.mlw
path: /opt/CAPEv2/storage/binaries/f9cc80c7cd1a5f0c90544db4b8cfe9be02734f320d8fdf8e412ea39c2870cdc1
crc32: DAA28F10
md5: b258c118abfedbd1e0c23185db438516
sha1: 8badc3733f645efbbee3121cdccaac9ddecb227f
sha256: f9cc80c7cd1a5f0c90544db4b8cfe9be02734f320d8fdf8e412ea39c2870cdc1
sha512: 07590044bd90da012e92533e9f67f26e97bb8cc7721fe6d7f6ebf0bdd3d5303341d76a96745862fd997249b404148444ff082f8bd24fadb234c4f69efcf4d09f
ssdeep: 24576:z5ptU1UPITEeEj0BF+K2e3CaEEo3nXlDa/ZSJCXHZsY/77sFZTDleyJohauNb0TS:BUqPITjEjKFhBg1gNXHCY/ghcyJokuNT
type: PE32 executable (console) Intel 80386, for MS Windows
tlsh: T13665E1891544EA9BD0FE4176AC0E8A57C360F9381973F376F446BACF3A133A48965B34
sha3_384: c05914b2a4a37b49c422b9de00c80d5ddc7542fd0df3ba26d0342073b1657ffce91b6a5cb854c3fa9bc4ac9f9ff98c95
ep_bytes: ebcf41e0bba6c567be47ccf63c0da44c
timestamp: 1971-05-16 00:00:00

Version Info:

0: [No Data]

Lazy.433198 also known as:

BkavW32.AIDetectMalware
tehtrisGeneric.Malware
MicroWorld-eScanGen:Variant.Lazy.433198
SkyhighBehavesLike.Win32.Malware.tc
McAfeeTrojan-FVOQ!B258C118ABFE
MalwarebytesGeneric.Malware.AI.DDS
ZillyaTrojan.Copak.Win32.179387
SangforTrojan.Win32.Save.a
K7AntiVirusTrojan ( 005a45ef1 )
K7GWTrojan ( 005a45ef1 )
CrowdStrikewin/malicious_confidence_100% (D)
SymantecML.Attribute.HighConfidence
Elasticmalicious (high confidence)
ESET-NOD32a variant of Win32/Kryptik_AGen.BGD
CynetMalicious (score: 100)
APEXMalicious
ClamAVWin.Packed.Razy-9830439-0
KasperskyVHO:Trojan.Win32.Khalesi.gen
BitDefenderGen:Variant.Lazy.433198
AvastWin32:Evo-gen [Trj]
TencentTrojan.Win32.Selfmod.ka
TACHYONTrojan/W32.Selfmod
SophosTroj/Agent-BFEY
F-SecureTrojan.TR/Crypt.XPACK.Gen2
VIPREGen:Variant.Lazy.433198
FireEyeGeneric.mg.b258c118abfedbd1
EmsisoftGen:Variant.Lazy.433198 (B)
IkarusTrojan-Downloader.Win32.FakeAlert
GDataWin32.Trojan.PSE.1B28NHU
VaristW32/Trojan.MJSE-7842
AviraTR/Crypt.XPACK.Gen2
Antiy-AVLTrojan/Win32.Kryptik.gify
Kingsoftmalware.kb.a.989
XcitiumTrojWare.Win32.Kryptik.TLS@812zm8
ArcabitTrojan.Lazy.D69C2E
ZoneAlarmVHO:Trojan.Win32.Khalesi.gen
MicrosoftTrojan:Win32/Cerber.MPI!MTB
GoogleDetected
AhnLab-V3Packed/Win.FJB.C5537717
Acronissuspicious
BitDefenderThetaGen:NN.ZexaF.36608.x9Z@ayg6f7h
ALYacGen:Variant.Lazy.433198
MAXmalware (ai score=88)
VBA32Trojan.Copak
Cylanceunsafe
PandaTrj/Genetic.gen
RisingTrojan.Kryptik!1.BF57 (CLASSIC)
SentinelOneStatic AI – Malicious PE
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/Kryptik.GIFQ!tr
AVGWin32:Evo-gen [Trj]
Cybereasonmalicious.33f645
DeepInstinctMALICIOUS

How to remove Lazy.433198?

Lazy.433198 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment