Malware

Lazy.439767 removal tips

Malware Removal

The Lazy.439767 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Lazy.439767 virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Sample contains Overlay data
  • Reads data out of its own binary image
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • CAPE detected the shellcode get eip malware family
  • Creates a copy of itself
  • Deletes executed files from disk
  • Yara detections observed in process dumps, payloads or dropped files

How to determine Lazy.439767?


File Info:

name: 9E8D1843048AF75FFD91.mlw
path: /opt/CAPEv2/storage/binaries/4892fed41d313208c879834a95d04847d53ea1491540ae78575a71b44da0a926
crc32: 6DE4387B
md5: 9e8d1843048af75ffd91dc38a7b9638f
sha1: e17d1b4233bd65ca3a5dc3b459483478d99e7f7b
sha256: 4892fed41d313208c879834a95d04847d53ea1491540ae78575a71b44da0a926
sha512: d8ed1d047dcf920ce895bc395a51d434cfbb175623dfd6cdf302a1614fa3f084e782b0d2fe0df040ce9117aa3e5710c47674a743dd10dc05a59715105eb52a28
ssdeep: 12288:ZCyQM0eSKnpaEWCBtWHPVQ5zCD4VZRDGWF1m3aYhOA6eXVg:ZC9eSKnpXt4PVQ5zY431CaYAeXVg
type: PE32 executable (console) Intel 80386, for MS Windows
tlsh: T150D49CDAFCCF4A90CCE7BC3714F1EC44A692E24A5F6A41A4D96436652C31CD07635CEA
sha3_384: 4a435652e116a3c6b914305bfad88ad5aa318a464e3eda05f0c31c0909efc8bf2c86ba6076eb43085a15d1c40c978f5d
ep_bytes: a8f819e6f8919d61fd7094f0ef32fc4a
timestamp: 1974-02-09 00:00:00

Version Info:

0: [No Data]

Lazy.439767 also known as:

BkavW32.AIDetectMalware
DrWebTrojan.PackedENT.123
MicroWorld-eScanGen:Variant.Lazy.439767
FireEyeGeneric.mg.9e8d1843048af75f
SkyhighBehavesLike.Win32.Glupteba.jc
McAfeeTrojan-FVOQ!9E8D1843048A
MalwarebytesCrypt.Trojan.MSIL.DDS
VIPREGen:Variant.Lazy.439767
SangforTrojan.Win32.Save.a
K7AntiVirusTrojan ( 005a45ef1 )
K7GWTrojan ( 005a45ef1 )
Cybereasonmalicious.233bd6
BitDefenderThetaGen:NN.ZexaF.36680.M4Z@aiCqpIk
SymantecML.Attribute.HighConfidence
Elasticmalicious (high confidence)
ESET-NOD32a variant of Win32/Kryptik_AGen.BGU
APEXMalicious
CynetMalicious (score: 100)
KasperskyVHO:Trojan.Win32.Copak.gen
BitDefenderGen:Variant.Lazy.439767
NANO-AntivirusTrojan.Win32.PackedENT.imjlxo
AvastWin32:TrojanX-gen [Trj]
RisingTrojan.Kryptik!1.BF57 (CLASSIC)
EmsisoftApplication.Generic (A)
F-SecureTrojan.TR/Crypt.XPACK.Gen
SophosTroj/Agent-BFEY
IkarusTrojan.Win32.Glupteba
GDataWin32.Trojan.PSE.SNMJGU
JiangminTrojan.Generic.cvyma
GoogleDetected
AviraTR/Crypt.XPACK.Gen
Antiy-AVLTrojan/Win32.Kryptik.girh
Kingsoftmalware.kb.a.998
XcitiumTrojWare.Win32.Kryptik.TLS@812zm8
ArcabitTrojan.Lazy.D6B5D7
ZoneAlarmVHO:Trojan.Win32.Copak.gen
MicrosoftTrojan:Win32/Glupteba.MT!MTB
VaristW32/Trojan.NJGF-3047
AhnLab-V3Packed/Win.FJB.R632556
Acronissuspicious
VBA32Trojan.Khalesi
ALYacGen:Variant.Lazy.439767
TACHYONTrojan/W32.Selfmod
Cylanceunsafe
PandaTrj/Genetic.gen
TencentTrojan.Win32.Copak.hl
SentinelOneStatic AI – Malicious PE
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/Kryptik.GIFQ!tr
AVGWin32:TrojanX-gen [Trj]
DeepInstinctMALICIOUS
CrowdStrikewin/malicious_confidence_100% (D)

How to remove Lazy.439767?

Lazy.439767 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment