Malware

Should I remove “Razy.803724”?

Malware Removal

The Razy.803724 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Razy.803724 virus can do?

  • Possible date expiration check, exits too soon after checking local time
  • Dynamic (imported) function loading detected
  • CAPE extracted potentially suspicious content
  • Unconventionial language used in binary resources: Vietnamese
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid

How to determine Razy.803724?


File Info:

name: 9AFAB70244B84DF30025.mlw
path: /opt/CAPEv2/storage/binaries/c5084b937bd56401392dbbda29f8b741e7e008c08bb3c636f7183e4efcc76b46
crc32: 7E807E6F
md5: 9afab70244b84df30025cef7c4435ff9
sha1: 8f28245c84e14ea9e694483368035635dcd55951
sha256: c5084b937bd56401392dbbda29f8b741e7e008c08bb3c636f7183e4efcc76b46
sha512: 6e9478a5f8570cc7cff1fa20b0724ada96a0199deaa8bd6e0989a3c4cc95923429b44d9960875e527771506daac1fecdfd4a694950cd0b503a80f717459d21ba
ssdeep: 6144:2YfLsu64dJuI3TznFDLPk1YV7OjHK52tlAVE5/wS3q:2TurJ53XNLuYszKcleE1wH
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T150640241FE97D922F5A413F2CA95A1811370D36B35E3E3BEB8CA72B64552BC36401D8E
sha3_384: bd248696e1accc635c13b6f8db95156d0b838ff12b8796da58d9e797fab28cea6ff66e863e020bb2be71ec04ab2a5871
ep_bytes: ff250020400000000000000000000000
timestamp: 2018-07-24 18:53:12

Version Info:

Translation: 0x0000 0x04b0
Comments:
CompanyName:
FileDescription: FishDialect
FileVersion: 1.0.0.0
InternalName: ldHJyZwQUoFdByOhaVhk.exe
LegalCopyright: Copyright © 2018
LegalTrademarks:
OriginalFilename: ldHJyZwQUoFdByOhaVhk.exe
ProductName: ldHJyZwQUoFdByOhaVhk
ProductVersion: 1.0.0.0
Assembly Version: 1.0.0.0

Razy.803724 also known as:

Elasticmalicious (high confidence)
CynetMalicious (score: 100)
FireEyeGeneric.mg.9afab70244b84df3
McAfeeArtemis!9AFAB70244B8
CylanceUnsafe
ZillyaTrojan.Kryptik.Win32.2727783
SangforTrojan.Win32.Wacatac.B
K7AntiVirusTrojan ( 005390d21 )
AlibabaTrojanPSW:MSIL/Kryptik.65f16142
K7GWTrojan ( 005390d21 )
Cybereasonmalicious.244b84
BitDefenderThetaGen:NN.ZemsilF.34182.sq0@aaUyv3jG
CyrenW32/Trojan.ZSUZ-6306
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of MSIL/Kryptik.PBC
Paloaltogeneric.ml
ClamAVWin.Packed.Azorult-9852769-1
KasperskyHEUR:Trojan-PSW.Win32.Agent.gen
BitDefenderGen:Variant.Razy.803724
NANO-AntivirusTrojan.Win32.Kryptik.igfsuk
MicroWorld-eScanGen:Variant.Razy.803724
AvastWin32:Trojan-gen
TencentWin32.Trojan-qqpass.Qqrob.Hyac
ComodoMalware@#3lknhntqcfoxh
VIPRETrojan.Win32.Generic!BT
SentinelOneStatic AI – Malicious PE
EmsisoftGen:Variant.Razy.803724 (B)
APEXMalicious
AviraHEUR/AGEN.1144304
MicrosoftTrojan:Win32/Ymacco.AAC5
GDataGen:Variant.Razy.803724
AhnLab-V3Malware/Win32.RL_Generic.C4298744
VBA32TScope.Trojan.MSIL
ALYacGen:Variant.Razy.803724
MAXmalware (ai score=84)
MalwarebytesMachineLearning/Anomalous.94%
RisingTrojan.Generic/MSIL@AI.100 (RDM.MSIL:wYtIUPiXa4HGUP3KsbNqqA)
IkarusTrojan.MSIL.Crypt
MaxSecureTrojan.Malware.12570143.susgen
FortinetMSIL/Kryptik.PBC!tr
AVGWin32:Trojan-gen
PandaTrj/GdSda.A
CrowdStrikewin/malicious_confidence_90% (W)

How to remove Razy.803724?

Razy.803724 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment