Malware

Lazy.433198 (file analysis)

Malware Removal

The Lazy.433198 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Lazy.433198 virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Sample contains Overlay data
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Attempts to modify proxy settings
  • Creates a copy of itself
  • Deletes executed files from disk
  • Yara rule detections observed from a process memory dump/dropped files/CAPE

How to determine Lazy.433198?


File Info:

name: B5C95D576EB2D6278AA6.mlw
path: /opt/CAPEv2/storage/binaries/d6efa76b25561a4bc703327fa7829114fc7bd5163ac3fced89eae46235789080
crc32: C9759D97
md5: b5c95d576eb2d6278aa68a61f56089f1
sha1: 6c1395bd31b314de6bdd40393400d71cb734b4a9
sha256: d6efa76b25561a4bc703327fa7829114fc7bd5163ac3fced89eae46235789080
sha512: 6edb9b0de65bffe5c843585bd1a7ee86e643cb86963f8df1bda3e71959b92ea51f90faef64b304cc462032e29e72b2446ed6513c9194536dc9379fda8d3683e2
ssdeep: 24576:kfyaFFcYxLixKLqAKDtMIDa/ZSJCXHZsY/77sFZTDleyJohauNb0TEz:kf5F9x7BogNXHCY/ghcyJokuN4oz
type: PE32 executable (console) Intel 80386, for MS Windows
tlsh: T12B65E0C83A84051BC49933BEAE6EA68E657B79BC66BBD7F1743072CF342135410B6274
sha3_384: 71ddbe11ff40d3e5e96b166fff2d05b7b5d3086180bd0ef41e4dfce4d9a510c118856753974b03fbb96c4f26c930d58f
ep_bytes: 993c0e19c9558a9eccb4830f4efeebb5
timestamp: 1971-05-16 00:00:00

Version Info:

0: [No Data]

Lazy.433198 also known as:

BkavW32.AIDetectMalware
tehtrisGeneric.Malware
MicroWorld-eScanGen:Variant.Lazy.433198
SkyhighBehavesLike.Win32.Trojan.tc
McAfeeTrojan-FVOQ!B5C95D576EB2
MalwarebytesGeneric.Malware.AI.DDS
ZillyaTrojan.Kryptik.Win32.2793586
SangforTrojan.Win32.Save.a
K7AntiVirusTrojan ( 005a45ef1 )
K7GWTrojan ( 005a45ef1 )
Cybereasonmalicious.d31b31
ArcabitTrojan.Lazy.D69C2E
SymantecML.Attribute.HighConfidence
Elasticmalicious (high confidence)
ESET-NOD32a variant of Win32/Kryptik_AGen.BGD
CynetMalicious (score: 100)
APEXMalicious
ClamAVWin.Packed.Razy-9830439-0
KasperskyVHO:Trojan.Win32.Khalesi.gen
BitDefenderGen:Variant.Lazy.433198
NANO-AntivirusTrojan.Win32.Selfmod.kczdbw
AvastWin32:Evo-gen [Trj]
RisingTrojan.Kryptik!1.BF57 (CLASSIC)
EmsisoftGen:Variant.Lazy.433198 (B)
F-SecureTrojan.TR/Crypt.XPACK.Gen2
DrWebTrojan.Siggen12.42976
VIPREGen:Variant.Lazy.433198
SophosTroj/Agent-BFEY
IkarusTrojan-Downloader.Win32.FakeAlert
JiangminTrojan.Selfmod.bcmi
VaristW32/Trojan.MJSE-7842
AviraTR/Crypt.XPACK.Gen2
Antiy-AVLTrojan/Win32.Kryptik.gify
XcitiumTrojWare.Win32.Kryptik.TLS@812zm8
MicrosoftTrojan:Win32/Cerber.MPI!MTB
ZoneAlarmVHO:Trojan.Win32.Khalesi.gen
GDataWin32.Trojan.PSE.1B28NHU
GoogleDetected
AhnLab-V3Packed/Win.FJB.C5537717
Acronissuspicious
BitDefenderThetaGen:NN.ZexaF.36680.x9Z@ayg6f7h
ALYacGen:Variant.Lazy.433198
TACHYONTrojan/W32.Selfmod
VBA32Trojan.Copak
Cylanceunsafe
PandaTrj/Genetic.gen
TencentTrojan.Win32.Selfmod.ka
SentinelOneStatic AI – Malicious PE
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/Kryptik.GIFQ!tr
AVGWin32:Evo-gen [Trj]
DeepInstinctMALICIOUS
CrowdStrikewin/malicious_confidence_100% (D)

How to remove Lazy.433198?

Lazy.433198 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment