Malware

What is “Lazy.44486 (B)”?

Malware Removal

The Lazy.44486 (B) is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Lazy.44486 (B) virus can do?

  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • Guard pages use detected – possible anti-debugging.
  • Dynamic (imported) function loading detected
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • Drops a binary and executes it
  • Authenticode signature is invalid
  • Behavioural detection: Injection (Process Hollowing)
  • Executed a process and injected code into it, probably while unpacking
  • Behavioural detection: Injection (inter-process)
  • Created a process from a suspicious location
  • CAPE detected the njRat malware family
  • Creates a copy of itself
  • Creates known Njrat/Bladabindi RAT registry keys

How to determine Lazy.44486 (B)?


File Info:

name: CA3FDD3F4FA6313BE72F.mlw
path: /opt/CAPEv2/storage/binaries/016d891a992ee8d1f8a00aa5aa7cc576eedae9d806b27218e605f0b98188b325
crc32: 8E48D877
md5: ca3fdd3f4fa6313be72f708721e74cdb
sha1: dff16bc1902c9f6b6f320dc53aed526905edf749
sha256: 016d891a992ee8d1f8a00aa5aa7cc576eedae9d806b27218e605f0b98188b325
sha512: feb54b2af66d2a70131d03dbeced05e96a454430491b519732dbd91d34cd7a5ad3b5911c83d550c2dbd9f2304190e4605e402f983da6e2826672fda22728df64
ssdeep: 1536:wd4viZUP2zcEHKUa0PCekYgYKD7dlH8lZRla5XKlyXXa76HLyNIra0mXpleo5Ok:saCUdNOEXK+MNSiXvnn
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1A4A3592337E4DB58E2BD67B20523964052F5F51B8636E36C3D4C918CC97AAC2D2927E3
sha3_384: 38b7ee10f9651aa26cd0e819465b9346a17d9f4253747b6e6ee4cf101c540abc29e30622f348b617293d4e8d76f8ac45
ep_bytes: ff250020400000000000000000000000
timestamp: 2021-11-23 13:30:12

Version Info:

Translation: 0x0000 0x04b0
Comments: ӔЖ難おкяЗみかЌлзгひа与へ難аӧへ亊く亊ҍへлҍФл
CompanyName: 五рめきき四予きзḆふлӔЉ難оЊうまг予лтб五あЗсқк
FileDescription: мϚ争うьҶоддҍзлへЗо亊иώḒЊ六ӧみ亊うҍьЗдけ
FileVersion: 5.6.7.8
InternalName: Server.exe
LegalCopyright: Copyright © мϚ争うьҶоддҍзлへЗо亊иώḒЊ六ӧみ亊うҍьЗдけ 2014
LegalTrademarks:
OriginalFilename: Server.exe
ProductName: めは五дальятϐзあа革ъ亊ЀӧрҶЉо骨いώл六тえ争
ProductVersion: 5.6.7.8
Assembly Version: 1.2.3.4

Lazy.44486 (B) also known as:

Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.Lazy.44486
FireEyeGeneric.mg.ca3fdd3f4fa6313b
ALYacGen:Variant.Bulz.231369
Cybereasonmalicious.f4fa63
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of MSIL/Injector.CMQ
APEXMalicious
ClamAVWin.Packed.Generic-9865070-0
KasperskyTrojan.MSIL.Disfa.nunt
BitDefenderGen:Variant.Lazy.44486
NANO-AntivirusTrojan.Win32.Dwn.edsxss
AvastWin32:InjectorX-gen [Trj]
Ad-AwareGen:Variant.Lazy.44486
SophosMal/Generic-S
DrWebTrojan.DownLoader12.28002
McAfee-GW-EditionArtemis
EmsisoftGen:Variant.Lazy.44486 (B)
SentinelOneStatic AI – Malicious PE
AviraTR/AD.Bladabindi.kdiqj
MAXmalware (ai score=81)
GDataGen:Variant.Lazy.44486
CynetMalicious (score: 100)
AhnLab-V3Trojan/Win32.RL_Generic.C4265994
McAfeeArtemis!CA3FDD3F4FA6
IkarusTrojan.MSIL.Injector
FortinetMSIL/Injector.CMQ!tr
BitDefenderThetaGen:NN.ZemsilF.34294.gm0@aeuhx9l
AVGWin32:InjectorX-gen [Trj]
PandaTrj/GdSda.A
CrowdStrikewin/malicious_confidence_90% (W)

How to remove Lazy.44486 (B)?

Lazy.44486 (B) removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment