Malware

What is “Razy.568027”?

Malware Removal

The Razy.568027 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Razy.568027 virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • Dynamic (imported) function loading detected
  • CAPE extracted potentially suspicious content
  • Unconventionial language used in binary resources: Russian
  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid

How to determine Razy.568027?


File Info:

name: C903E905384B3D92BAD0.mlw
path: /opt/CAPEv2/storage/binaries/43c3b4b97c46ee38af8b8be3a19c6779a6aef7657adc817de89c25506c816021
crc32: 9A11E1B7
md5: c903e905384b3d92bad06ba3befce000
sha1: 5da33acb02ed47264e66fc556db1239fcc977abc
sha256: 43c3b4b97c46ee38af8b8be3a19c6779a6aef7657adc817de89c25506c816021
sha512: 8fabae9b5b2155bd8ba2eebdacd5e912cc9a3b05457b2f8ac51177daae9d9bb3bdf4e460bff9eafa36fc48c8769c9f18cb05a9a038a4a3c51b81e37d548cda6e
ssdeep: 6144:UwhCrn0HudpLUepHnC1OZ1kI7fi65YdTHSTvBvNVQfSwabZnOBmNdC:3CTLjLUetCQZ1/ncTMvpNVFVOBmS
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T152A61231BB8093BBE8305D39FE20699D994FF478713383560B4BE895AFB95D007A5836
sha3_384: 44a1a67299a078db8acdb23d982ace1f2d5cfd8b7b46a14c3cf3ccaa582fc75a6cc6f87bc5eca56130a020a67259aba0
ep_bytes: 558bec83c498686b51544950ff75e0e8
timestamp: 2006-11-02 02:22:08

Version Info:

0: [No Data]

Razy.568027 also known as:

BkavW32.AIDetect.malware1
LionicTrojan.Win32.Generic.4!c
Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.Razy.568027
FireEyeGeneric.mg.c903e905384b3d92
ALYacGen:Variant.Razy.568027
CylanceUnsafe
ZillyaTrojan.Kryptik.Win32.878992
SangforTrojan.Win32.Save.a
K7AntiVirusTrojan ( 0055dd191 )
AlibabaRansom:Win32/Obfuscator.32a153b0
K7GWTrojan ( 0055dd191 )
Cybereasonmalicious.5384b3
VirITTrojan.Win32.Winlock.EBL
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Kryptik.LZL
APEXMalicious
Paloaltogeneric.ml
KasperskyHEUR:Trojan.Win32.Generic
BitDefenderGen:Variant.Razy.568027
NANO-AntivirusTrojan.Win32.Winlock.ecnfcq
AvastWin32:FakeInst-AN [Trj]
TencentWin32.Trojan.Kryptik.Swud
Ad-AwareGen:Variant.Razy.568027
EmsisoftGen:Variant.Razy.568027 (B)
DrWebTrojan.Winlock.2741
VIPREPacked.Win32.PWSZbot.gen (v)
McAfee-GW-EditionBehavesLike.Win32.Trojan.tz
SophosMal/Generic-S
SentinelOneStatic AI – Malicious PE
GDataGen:Variant.Razy.568027
JiangminTrojan/Gimemo.ahd
AviraTR/Crypt.XPACK.Gen2
Antiy-AVLTrojan/Generic.ASMalwS.1839DC0
GridinsoftRansom.Win32.Zbot.sa
ArcabitTrojan.Razy.D8AADB
ViRobotTrojan.Win32.A.Gimemo.371840
ZoneAlarmHEUR:Trojan.Win32.Generic
MicrosoftRansom:Win32/LockScreen.AO
CynetMalicious (score: 100)
McAfeeArtemis!C903E905384B
MAXmalware (ai score=100)
VBA32Trojan.Zeus.EA.0999
RisingRansom.LockScreen!8.83D (C64:YzY0OrvtSwFVgnL+)
YandexTrojan.Agent!1AXlbJgonp4
IkarusTrojan-Ransom.Gimemo
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/Generic.AC.285381!tr
BitDefenderThetaGen:NN.ZexaF.34212.@FX@aWc8ZDhc
AVGWin32:FakeInst-AN [Trj]
PandaTrj/CI.A
CrowdStrikewin/malicious_confidence_100% (W)

How to remove Razy.568027?

Razy.568027 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment