Malware

Razy.636297 (file analysis)

Malware Removal

The Razy.636297 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Razy.636297 virus can do?

  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Behavioural detection: Executable code extraction – unpacking
  • Attempts to connect to a dead IP:Port (1 unique times)
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • Possible date expiration check, exits too soon after checking local time
  • Anomalous file deletion behavior detected (10+)
  • Guard pages use detected – possible anti-debugging.
  • Dynamic (imported) function loading detected
  • A process created a hidden window
  • CAPE extracted potentially suspicious content
  • Drops a binary and executes it
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Behavioural detection: Injection (Process Hollowing)
  • Executed a process and injected code into it, probably while unpacking
  • Code injection with CreateRemoteThread in a remote process
  • Sniffs keystrokes
  • Behavioural detection: Injection (inter-process)
  • Behavioural detection: Injection with CreateRemoteThread in a remote process
  • Installs itself for autorun at Windows startup
  • CAPE detected injection into a browser process, likely for Man-In-Browser (MITB) infostealing
  • Creates a copy of itself
  • Creates known SpyNet mutexes and/or registry changes.

How to determine Razy.636297?


File Info:

name: 4E8887D7CAC781082503.mlw
path: /opt/CAPEv2/storage/binaries/fe388ea52d0ded671d2bc77cb064f0b939ee1c20e83aa41d774f9eb6b4740d73
crc32: 9A95CF89
md5: 4e8887d7cac7810825037b3a088ee3a9
sha1: 08cd18a637f5b5990043ee54e24217b49cb8fb85
sha256: fe388ea52d0ded671d2bc77cb064f0b939ee1c20e83aa41d774f9eb6b4740d73
sha512: d8fc8379f712934bddf677d170812136cafbc9c0975dabefffa319dd7323d3089a4ed3a67a4ac8f8ac06fd9a5ddae4afb8870a62c0c81811e6ea9f9f5ffdb964
ssdeep: 6144:JzUSU6WdlAmWS5Kmpvf+eqLIToDG4Kg7BTGI5x57xo4fEuKuk9Zh:KSU6WhWCKmpvSu4KSX5/7dBK/3h
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T15764023F23B2B518DEEE92F70F06ED70352AD62AF9031E5D927D84B056792E053A0257
sha3_384: a8903807477b43224fc381b15e4fdd4019af7fd45822d3c059fc1b6de410c3d03ba31cf30d966f821f4c0e7ad66f65eb
ep_bytes: ff250020400000000000000000000000
timestamp: 2012-12-05 17:08:33

Version Info:

Translation: 0x0000 0x04b0
FileDescription:
FileVersion: 1.8.7.1
InternalName: rup0xg5l.exe
LegalCopyright:
OriginalFilename: rup0xg5l.exe
ProductVersion: 1.8.7.1
Assembly Version: 1.8.7.1

Razy.636297 also known as:

BkavW32.AIDetectNet.01
MicroWorld-eScanGen:Variant.Razy.636297
FireEyeGeneric.mg.4e8887d7cac78108
CylanceUnsafe
VIPREGen:Variant.Razy.636297
SangforSuspicious.Win32.Save.a
Cybereasonmalicious.7cac78
SymantecML.Attribute.HighConfidence
Elasticmalicious (high confidence)
ESET-NOD32a variant of MSIL/Injector.SF
APEXMalicious
KasperskyHEUR:Trojan.Win32.Generic
BitDefenderGen:Variant.Razy.636297
NANO-AntivirusTrojan.Win32.Kazy.fkhnjk
AvastMSIL:GenMalicious-AXL [Trj]
TencentWin32.Trojan.Generic.Pgdk
Ad-AwareGen:Variant.Razy.636297
SophosMal/Generic-S
ComodoMalware@#3oqe22hpkal0j
McAfee-GW-EditionBehavesLike.Win32.Generic.fc
Trapminemalicious.high.ml.score
EmsisoftGen:Variant.Razy.636297 (B)
IkarusTrojan-Dropper.Small
GDataGen:Variant.Razy.636297
AviraTR/Dropper.Gen
Antiy-AVLTrojan/Generic.ASMalwS.37EA
ArcabitTrojan.Razy.D9B589
MicrosoftTrojan:Win32/Wacatac.B!ml
CynetMalicious (score: 99)
Acronissuspicious
ALYacGen:Variant.Razy.636297
MAXmalware (ai score=83)
MalwarebytesMachineLearning/Anomalous.100%
RisingTrojan.Generic/MSIL@AI.100 (RDM.MSIL:s4ZN+728LzQvEuE5l8SjUg)
SentinelOneStatic AI – Malicious PE
MaxSecureTrojan.Malware.300983.susgen
FortinetMSIL/Injector.FN!tr
BitDefenderThetaGen:NN.ZemsilF.34806.tm0@amqNF!n
AVGMSIL:GenMalicious-AXL [Trj]
CrowdStrikewin/malicious_confidence_100% (W)

How to remove Razy.636297?

Razy.636297 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment