Malware

What is “Razy.637366 (B)”?

Malware Removal

The Razy.637366 (B) is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Razy.637366 (B) virus can do?

  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Behavioural detection: Executable code extraction – unpacking
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • Possible date expiration check, exits too soon after checking local time
  • Anomalous file deletion behavior detected (10+)
  • Guard pages use detected – possible anti-debugging.
  • Dynamic (imported) function loading detected
  • Enumerates the modules from a process (may be used to locate base addresses in process injection)
  • CAPE extracted potentially suspicious content
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Anomalous .NET characteristics
  • Uses Windows utilities for basic functionality
  • Behavioural detection: Injection (Process Hollowing)
  • Executed a process and injected code into it, probably while unpacking
  • Behavioural detection: Injection (inter-process)
  • Created a process from a suspicious location
  • CAPE detected the RedLine malware family
  • Uses csc.exe C# compiler to build and execute code
  • Uses suspicious command line tools or Windows utilities

How to determine Razy.637366 (B)?


File Info:

name: BAF181F3C7318695AC31.mlw
path: /opt/CAPEv2/storage/binaries/2e363cff0e5579880704f090e7fae56e9bd014ae27c9e2a04151fa15c21c45c6
crc32: A5A84F16
md5: baf181f3c7318695ac31774882abb7b9
sha1: bf6d3ab71c33dc97c5525888b20991df0f6b2547
sha256: 2e363cff0e5579880704f090e7fae56e9bd014ae27c9e2a04151fa15c21c45c6
sha512: 5aa62630c0f656e4468d64d50213023c02928d5478e378bd4b9f82dbd2d086185fa3f603f7aa9470fe294dabc10467fb55838ff00d369a2812badf884c2868b3
ssdeep: 6144:6P2LWv/Q6cciynyaMkQ48WoK0LqU+MTwMSv5qYM:6P2LGQ6dRzQWor+GSoT
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T12574D0E0D214BBABF6E5D6BB0075136D3FA606D58D105877A838A5441CDB3BC83CEE51
sha3_384: 2ff0168006ceea4c157da399669cef04dbbc99b40fd0bb89e24b96de4be4ee0375329ee7eb104e56adac1f3b2c83031e
ep_bytes: ff250020400000000000000000000000
timestamp: 2022-06-28 22:57:08

Version Info:

Translation: 0x0000 0x04b0
FileDescription:
FileVersion: 0.0.0.0
InternalName: testt.exe
LegalCopyright:
OriginalFilename: testt.exe
ProductVersion: 0.0.0.0
Assembly Version: 0.0.0.0

Razy.637366 (B) also known as:

BkavW32.AIDetectNet.01
Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.Razy.637366
FireEyeGeneric.mg.baf181f3c7318695
ALYacGen:Variant.Razy.637366
CylanceUnsafe
SangforSuspicious.Win32.Save.a
K7AntiVirusTrojan ( 700000121 )
K7GWTrojan ( 700000121 )
Cybereasonmalicious.3c7318
CyrenW32/MSIL_Injector.XJ.gen!Eldorado
SymantecML.Attribute.HighConfidence
tehtrisGeneric.Malware
ESET-NOD32a variant of MSIL/Injector.HN
APEXMalicious
ClamAVWin.Packed.Gamarue-6817673-0
KasperskyHEUR:Trojan.Win32.Generic
BitDefenderGen:Variant.Razy.637366
AvastMSIL:GenMalicious-AQH [Trj]
Ad-AwareGen:Variant.Razy.637366
SophosML/PE-A
DrWebTrojan.Inject3.16685
Trapminemalicious.moderate.ml.score
EmsisoftGen:Variant.Razy.637366 (B)
IkarusTrojan-Dropper.Small
GDataGen:Variant.Razy.637366
JiangminTrojan/Jorik.rss
AviraTR/Dropper.MSIL.Gen
ArcabitTrojan.Razy.D9B9B6
ZoneAlarmHEUR:Trojan.Win32.Generic
MicrosoftBackdoor:Win32/Bladabindi!ml
CynetMalicious (score: 100)
Acronissuspicious
MAXmalware (ai score=89)
MalwarebytesMalware.AI.3417075117
RisingTrojan.Generic@AI.99 (RDML:BQXUNFWjBjeIEp+KuIreIg)
SentinelOneStatic AI – Malicious PE
MaxSecureTrojan.Malware.300983.susgen
FortinetMSIL/Injector.HN!tr
BitDefenderThetaGen:NN.ZemsilF.34742.vq0@aOZSJpi
AVGMSIL:GenMalicious-AQH [Trj]
CrowdStrikewin/malicious_confidence_100% (D)

How to remove Razy.637366 (B)?

Razy.637366 (B) removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment