Malware

Lazy.433198 removal instruction

Malware Removal

The Lazy.433198 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Lazy.433198 virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Sample contains Overlay data
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Attempts to modify proxy settings
  • Creates a copy of itself
  • Deletes executed files from disk
  • Yara rule detections observed from a process memory dump/dropped files/CAPE

How to determine Lazy.433198?


File Info:

name: 77F90708B7E2F9907C11.mlw
path: /opt/CAPEv2/storage/binaries/4cf3df57de773f0dba60a93a1d0b81c5ab1b8e687b45a177483ba6e545c98b3e
crc32: 3241A78C
md5: 77f90708b7e2f9907c111f4adc2e8eae
sha1: 80d5540a83001cbfcb3e16b964a5727026850ef8
sha256: 4cf3df57de773f0dba60a93a1d0b81c5ab1b8e687b45a177483ba6e545c98b3e
sha512: fb42171df5eb2ab687efa80c35052cfae9e174c5b15032ec98a6a824eb44b415b6dc06f3621e1fc53341af0a6b890957078eab89927ddc4eaad480660d6121c8
ssdeep: 24576:HkLXKdwsCvA+j2b5tvL9y6Fa/ZSJCXHZsY/77sFZTDleyJohauNb0TEz:TpCvAi2Fq6FgNXHCY/ghcyJokuN4oz
type: PE32 executable (console) Intel 80386, for MS Windows
tlsh: T1B365EFA927C31753C049137D7D0D9AABC2063CBC23E7F262B1C4B76F3465B89A664672
sha3_384: 7cf4f18e37a5e68cbbfd007969abd2d376a30fbbfd0d2f315c218e809ed760ece450d1c6dd59b7e5f64e10d32ff6b1c3
ep_bytes: a695f9b2f6fc7d35f31d74a471571c1e
timestamp: 1971-05-16 00:00:00

Version Info:

0: [No Data]

Lazy.433198 also known as:

BkavW32.AIDetectMalware
Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.Lazy.433198
SkyhighBehavesLike.Win32.Packed.tc
McAfeeTrojan-FVOQ!77F90708B7E2
Cylanceunsafe
ZillyaTrojan.Generic.Win32.70038
SangforTrojan.Win32.Save.a
K7AntiVirusTrojan ( 005a45ef1 )
K7GWTrojan ( 005a45ef1 )
CrowdStrikewin/malicious_confidence_100% (D)
SymantecML.Attribute.HighConfidence
tehtrisGeneric.Malware
ESET-NOD32a variant of Win32/Kryptik_AGen.BGD
CynetMalicious (score: 100)
APEXMalicious
ClamAVWin.Packed.Razy-9807389-0
KasperskyVHO:Trojan.Win32.Khalesi.gen
BitDefenderGen:Variant.Lazy.433198
NANO-AntivirusTrojan.Win32.Kryptik.ffrhag
AvastWin32:Evo-gen [Trj]
TencentTrojan.Win32.Selfmod.ka
EmsisoftGen:Variant.Lazy.433198 (B)
F-SecureHeuristic.HEUR/AGEN.1369103
DrWebTrojan.PackedENT.183
VIPREGen:Variant.Lazy.433198
SophosTroj/Agent-BFEY
IkarusTrojan-Downloader.Win32.FakeAlert
GDataWin32.Trojan.PSE.1B28NHU
JiangminTrojan.Generic.cqpse
VaristW32/Trojan.MJSE-7842
AviraHEUR/AGEN.1369103
Antiy-AVLTrojan/Win32.Kryptik.gify
XcitiumTrojWare.Win32.Kryptik.TLS@812zm8
ArcabitTrojan.Lazy.D69C2E
ZoneAlarmVHO:Trojan.Win32.Khalesi.gen
MicrosoftTrojan:Win32/Cerber.MPI!MTB
GoogleDetected
AhnLab-V3Packed/Win.FJB.C5537717
Acronissuspicious
BitDefenderThetaGen:NN.ZexaF.36680.x9Z@ayg6f7h
ALYacGen:Variant.Lazy.433198
TACHYONTrojan/W32.Selfmod
VBA32Trojan.Copak
MalwarebytesGeneric.Malware.AI.DDS
PandaTrj/Genetic.gen
RisingTrojan.Kryptik!1.BF57 (CLASSIC)
SentinelOneStatic AI – Malicious PE
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/Kryptik.GIFQ!tr
AVGWin32:Evo-gen [Trj]
Cybereasonmalicious.a83001
DeepInstinctMALICIOUS

How to remove Lazy.433198?

Lazy.433198 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment