Malware

About “Lazy.49363” infection

Malware Removal

The Lazy.49363 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Lazy.49363 virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • Guard pages use detected – possible anti-debugging.
  • Dynamic (imported) function loading detected
  • Starts servers listening on 127.0.0.1:64242
  • Enumerates running processes
  • Expresses interest in specific running processes
  • Repeatedly searches for a not-found process, may want to run with startbrowser=1 option
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Attempts to stop active services
  • A process attempted to delay the analysis task by a long amount of time.
  • Steals private information from local Internet browsers
  • Installs itself for autorun at Windows startup
  • Detects Bochs through the presence of a registry key
  • Attempts to disable Windows Defender
  • Harvests cookies for information gathering
  • Attempts to modify user notification settings

How to determine Lazy.49363?


File Info:

name: A1E72757AB40334DDEC7.mlw
path: /opt/CAPEv2/storage/binaries/0546fcc28a66be8840a0d04df9787bdd5eeaa260e9acf43b562c61407f488e8f
crc32: DD44C92A
md5: a1e72757ab40334ddec7d0123b61547f
sha1: 52f9f1019673459b8afad1485f5c170708480ace
sha256: 0546fcc28a66be8840a0d04df9787bdd5eeaa260e9acf43b562c61407f488e8f
sha512: f9e9829801d0cb901479021ff4ec87dbeb0f0d81a3c44742f43b80f6b9688d4d61916a3978df8f025031ad75a3af457d33c930383133a325073d99888dc8223a
ssdeep: 196608:85r5r5r5r5r5r5r5r5r5r5r5r5r5r5r5r5r5r5r5r5r5r5r5r5r5r5r5r5r5r5r5:85r5r5r5r5r5r5r5r5r5r5r5r5r5r5r5
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T171960160D83BCC2AF3F68A309CC6C22CA57800B3B71455EF565016EAE251BD17E7F999
sha3_384: 68f43b5166658bcc56261eff4100e0ff0b2c18079e5b0ea6a0892805523dd4798e813c0527e70e5167e421600fc28db5
ep_bytes: 558bff8bec81ec640400008d85c0fcff
timestamp: 2005-11-14 13:51:58

Version Info:

0: [No Data]

Lazy.49363 also known as:

BkavW32.AIDetect.malware1
Elasticmalicious (high confidence)
DrWebBackDoor.Gbot.1154
MicroWorld-eScanGen:Variant.Lazy.49363
FireEyeGeneric.mg.a1e72757ab40334d
McAfeeBackDoor-EXI.gen.x
CylanceUnsafe
ZillyaTrojan.Jorik.Win32.30845
SangforTrojan.Win32.Save.a
K7AntiVirusBackdoor ( 003210941 )
K7GWBackdoor ( 003210941 )
Cybereasonmalicious.7ab403
ArcabitTrojan.Lazy.DC0D3
BitDefenderThetaGen:NN.ZexaF.34294.@tZ@aeHhzXii
CyrenW32/Goolbot.O.gen!Eldorado
SymantecBackdoor.Cycbot!gen8
ESET-NOD32a variant of Win32/Kryptik.UQY
TrendMicro-HouseCallTROJ_KAZY.SMO
CynetMalicious (score: 100)
KasperskyHoax.Win32.FlashApp.HEUR
BitDefenderGen:Variant.Lazy.49363
NANO-AntivirusRiskware.Win32.FlashApp.fdignm
AvastWin32:Cybota [Trj]
TencentTrojan.Win32.BitCoinMiner.la
Ad-AwareGen:Variant.Lazy.49363
SophosML/PE-A + Mal/FakeAV-IS
ComodoBackdoor.Win32.Gbot.QAT@4k3skb
VIPRETrojan.Win32.FakeAV.IS (v)
TrendMicroTROJ_KAZY.SMO
McAfee-GW-EditionBehavesLike.Win32.VirRansom.rc
EmsisoftGen:Variant.Lazy.49363 (B)
IkarusBackdoor.Win32.Agent
AviraBDS/Sinowal.uhak
MAXmalware (ai score=82)
Antiy-AVLTrojan/Generic.ASMalwS.5A8E4B
MicrosoftBackdoor:Win32/Cycbot.B
GDataWin32.Trojan.Repno.A@gen
AhnLab-V3Trojan/Win32.Jorik.R14821
Acronissuspicious
VBA32Trojan.Gbot
MalwarebytesBackdoor.Bot
APEXMalicious
RisingTrojan.Lvvm!1.990B (CLASSIC)
YandexTrojan.GenAsa!3f+NpEWjJaw
SentinelOneStatic AI – Malicious PE
eGambitUnsafe.AI_Score_73%
FortinetW32/Gbot.QAU!tr
AVGWin32:Cybota [Trj]
CrowdStrikewin/malicious_confidence_100% (D)

How to remove Lazy.49363?

Lazy.49363 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment