Malware

Razy.660158 (file analysis)

Malware Removal

The Razy.660158 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Razy.660158 virus can do?

  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • CAPE extracted potentially suspicious content
  • .NET file is packed/obfuscated with SmartAssembly
  • Authenticode signature is invalid
  • Creates a copy of itself

How to determine Razy.660158?


File Info:

name: FEE10ADFB94EF24FCF45.mlw
path: /opt/CAPEv2/storage/binaries/575450d1a41c4b5b4a8ea1789a884f19836caf1181ea00dc3bb63c939d9f28e9
crc32: 914AB20B
md5: fee10adfb94ef24fcf45aa6d428dd75e
sha1: 0a88eb275994a38f813748c91051c45b003d26bb
sha256: 575450d1a41c4b5b4a8ea1789a884f19836caf1181ea00dc3bb63c939d9f28e9
sha512: 9de3d4b6750e06aa45b10e6a7b27de1cb7de91d353ca0dd95878b293a3d66f7a1d9e5e47faa308b88402fa6a106d25afc9c21651034c4a02e7459a2db4635edb
ssdeep: 49152:rsoAB7logt5ne5c4/upd8urUO0CZG9d0lx/Ghdulrk+Q5gnqk9kdvvidimNTMuwq:eXnQljurUO4DduBQ5gnqMkdvHmzDuHJc
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T19FD52A46FEC06F7BC02A2533C8736C7D82E9D76E5B01EB0FD1F8522957A23AC9246159
sha3_384: 4287a321b4e969e3db8a8389cbc01cc0b569bfb137a2b5e1ed29bf09038da5ab1bffabdd6785a7434a00e50b006c9e16
ep_bytes: ff250020400000000000000000000000
timestamp: 2014-04-16 22:44:59

Version Info:

Translation: 0x0000 0x04b0
Comments: 3U§L/?A)Xs8Vs
CompanyName: UN2F59v6PpYNp
FileDescription: UN2F59v6PpYNp
FileVersion: 4.1.5.​0
InternalName: 1.exe
LegalCopyright: UN2F59v6PpYNp
LegalTrademarks: 3U§L/?A)Xs8Vs
OriginalFilename: 1.exe
ProductName: 3U§L/?A)Xs8Vs
ProductVersion: 4.1.5.​0
Assembly Version: 4.2.4.5

Razy.660158 also known as:

LionicTrojan.Win32.Generic.4!c
DrWebWin32.HLLW.Autoruner.25074
MicroWorld-eScanGen:Variant.Razy.660158
FireEyeGeneric.mg.fee10adfb94ef24f
McAfeeTrojan-FDWX!FEE10ADFB94E
CylanceUnsafe
ZillyaTrojan.Zapchast.Win32.24499
SangforSuspicious.Win32.Save.a
K7AntiVirusTrojan ( 700000121 )
K7GWTrojan ( 700000121 )
Cybereasonmalicious.fb94ef
BitDefenderThetaAI:Packer.8B38F19225
CyrenW32/MSIL_Kryptik.CSU.gen!Eldorado
SymantecML.Attribute.HighConfidence
Elasticmalicious (high confidence)
ESET-NOD32a variant of MSIL/Injector.DBQ
APEXMalicious
Paloaltogeneric.ml
KasperskyHEUR:Backdoor.MSIL.Generic
BitDefenderGen:Variant.Razy.660158
NANO-AntivirusTrojan.Win32.DBQ.cygagt
AvastMSIL:Agent-BZJ [Trj]
TencentMsil.Trojan.Zapchast.Eiuz
Ad-AwareGen:Variant.Razy.660158
EmsisoftGen:Variant.Razy.660158 (B)
ComodoMalware@#23fj9l5gp1lk4
VIPREGen:Variant.Razy.660158
McAfee-GW-EditionBehavesLike.Win32.Dropper.vm
SophosMal/Generic-S
SentinelOneStatic AI – Malicious PE
GDataGen:Variant.Razy.660158
JiangminTrojan.Generic.hqvm
GoogleDetected
AviraHEUR/AGEN.1208612
MAXmalware (ai score=82)
Antiy-AVLTrojan/Generic.ASMalwS.7EB
MicrosoftBackdoor:MSIL/Bladabindi
CynetMalicious (score: 99)
AhnLab-V3Trojan/Win32.Bladabindi.C930991
ALYacGen:Variant.Razy.660158
RisingTrojan.Generic/MSIL@AI.98 (RDM.MSIL:9DRvWZ3W7qg0RhcjgxOuQg)
YandexTrojan.Zapchast!zjCP7royFH4
IkarusTrojan.Jintor
MaxSecureTrojan.Malware.300983.susgen
FortinetMSIL/Injector.DBQ!tr
AVGMSIL:Agent-BZJ [Trj]
PandaTrj/CI.A
CrowdStrikewin/malicious_confidence_100% (W)

How to remove Razy.660158?

Razy.660158 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment