Malware

Lazy.439767 removal instruction

Malware Removal

The Lazy.439767 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Lazy.439767 virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Sample contains Overlay data
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Creates a copy of itself
  • Deletes executed files from disk
  • Yara rule detections observed from a process memory dump/dropped files/CAPE

How to determine Lazy.439767?


File Info:

name: 343EF318A8938D884C73.mlw
path: /opt/CAPEv2/storage/binaries/222b0f7e5c7843ff2d3e4ddc8b46922d7a690f5653cd3f29bce67ba00d82cd5d
crc32: 2375D1A2
md5: 343ef318a8938d884c73fa765dca8b36
sha1: 9d20b64a1d377929117ca1237d8011dc954b7da0
sha256: 222b0f7e5c7843ff2d3e4ddc8b46922d7a690f5653cd3f29bce67ba00d82cd5d
sha512: fb3940f7e8be631ca3919a2985adf928d47c0cc0943160cc14f703f68dfaac663450189d775151af959dd57a131738f5703e61ec38cd0f1bdc0373858e62c64c
ssdeep: 12288:dTqUIxoH8IOAPVQ5zCD4VZRDGWF1m3aYhOA6eXVg:naoHjOAPVQ5zY431CaYAeXVg
type: PE32 executable (console) Intel 80386, for MS Windows
tlsh: T1E6D49CA8FF5F0A60CCAB797F17B9B44091D6E25A4FEEC094E8A00D642C75984BF244D7
sha3_384: 6c9cd3245ca99b0088bc9da8e1c69b9d59574409a24bbb14229c0603d9fec2e8ef2a2398b7b28ecf33e8cf6a9fb13d7b
ep_bytes: 60176577307ee1f0359fe86127dd80db
timestamp: 1974-02-09 00:00:00

Version Info:

0: [No Data]

Lazy.439767 also known as:

BkavW32.AIDetectMalware
MicroWorld-eScanGen:Variant.Lazy.439767
ClamAVWin.Packed.Razy-9828382-0
SkyhighBehavesLike.Win32.Glupteba.jc
McAfeeTrojan-FVOQ!343EF318A893
MalwarebytesCrypt.Trojan.MSIL.DDS
VIPREGen:Variant.Lazy.439767
SangforTrojan.Win32.Save.a
CrowdStrikewin/malicious_confidence_100% (W)
K7GWTrojan ( 005a45ef1 )
K7AntiVirusTrojan ( 005a45ef1 )
ArcabitTrojan.Lazy.D6B5D7
SymantecML.Attribute.HighConfidence
Elasticmalicious (high confidence)
ESET-NOD32a variant of Win32/Kryptik_AGen.BGU
APEXMalicious
CynetMalicious (score: 100)
KasperskyUDS:Trojan.Win32.Copak.asjun
BitDefenderGen:Variant.Lazy.439767
NANO-AntivirusTrojan.Win32.Kryptik.ffotqo
AvastWin32:TrojanX-gen [Trj]
EmsisoftApplication.Generic (A)
F-SecureTrojan.TR/Crypt.XPACK.Gen
FireEyeGeneric.mg.343ef318a8938d88
SophosTroj/Agent-BFEY
SentinelOneStatic AI – Malicious PE
JiangminTrojan.Generic.ctfwj
GoogleDetected
AviraTR/Crypt.XPACK.Gen
MAXmalware (ai score=82)
Antiy-AVLTrojan/Win32.Kryptik.girh
Kingsoftmalware.kb.a.998
XcitiumTrojWare.Win32.Kryptik.TLS@812zm8
MicrosoftTrojan:Win32/Glupteba.MT!MTB
ZoneAlarmUDS:Trojan.Win32.Copak.asjun
GDataGen:Variant.Lazy.439767
VaristW32/Trojan.NJGF-3047
AhnLab-V3Packed/Win.FJB.C5537718
Acronissuspicious
BitDefenderThetaGen:NN.ZexaF.36608.M4Z@aiCqpIk
ALYacGen:Variant.Lazy.439767
TACHYONTrojan/W32.Selfmod
VBA32Trojan.Khalesi
Cylanceunsafe
PandaTrj/Genetic.gen
RisingTrojan.Kryptik!1.BF57 (CLASSIC)
IkarusTrojan.Win32.Glupteba
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/Kryptik.GIFQ!tr
AVGWin32:TrojanX-gen [Trj]
Cybereasonmalicious.a1d377
DeepInstinctMALICIOUS

How to remove Lazy.439767?

Lazy.439767 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment