Malware

Ser.Razy.5696 information

Malware Removal

The Ser.Razy.5696 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Ser.Razy.5696 virus can do?

  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Executed a command line with /C or /R argument to terminate command shell on completion which can be used to hide execution
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • Guard pages use detected – possible anti-debugging.
  • Dynamic (imported) function loading detected
  • Reads data out of its own binary image
  • A process created a hidden window
  • CAPE extracted potentially suspicious content
  • Drops a binary and executes it
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Uses Windows utilities for basic functionality
  • Behavioural detection: Injection (Process Hollowing)
  • Executed a process and injected code into it, probably while unpacking
  • Sniffs keystrokes
  • Behavioural detection: Injection (inter-process)
  • Created a process from a suspicious location
  • Installs itself for autorun at Windows startup
  • CAPE detected the njRat malware family
  • Creates a copy of itself

How to determine Ser.Razy.5696?


File Info:

name: 43F6BE647BB8F8BA9F1C.mlw
path: /opt/CAPEv2/storage/binaries/80d909bb1b2f1cc1ed4f64ccbe3a8e34f4cee536a22e9b77f519399b3871f140
crc32: 76026B33
md5: 43f6be647bb8f8ba9f1cdb6753ec4f6b
sha1: 01685fea487ec7dd5366e9891f5e703ee9fa5587
sha256: 80d909bb1b2f1cc1ed4f64ccbe3a8e34f4cee536a22e9b77f519399b3871f140
sha512: 5db2c9793d0983f05bfa43e910c7d7eaef911067db9953b2ca9be07101b12c07a51cdb6544d479226bcc8a4d0f606ee0e2e647c41f49f614955e55b4d9db0966
ssdeep: 3072:uMXFcTUxNh9z/ceynBnbOHjT4wEWu0XqpjawX:uwFlf9KnBbOHjTZpu0X+e
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T133D39DDEB58442A0FA684F708037383427B37DAFED25B60AED49B4627FB36D54418D62
sha3_384: 222ca33855edf044cae438716775a4962bd6074da14431f6e575028c13e5459471c7e4166db813a7bc320ed980b57f2c
ep_bytes: ff250020400000000000000000000000
timestamp: 2014-06-24 19:03:47

Version Info:

Translation: 0x0000 0x04b0
Comments: Stueoei Groaongu Zieups Psipso
CompanyName: Huoaaoiu
FileDescription: Gignuua Hessie
FileVersion: 6.0.7.4
InternalName: Wire report Details.exe
LegalCopyright: Copyright © 2014 Huoaaoiu Corporation
LegalTrademarks: Huoaaoiu Corporation
OriginalFilename: Wire report Details.exe
ProductName: Megni
ProductVersion: 6.0.7.4
Assembly Version: 3.3.7.1

Ser.Razy.5696 also known as:

Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.Ser.Razy.5696
FireEyeGeneric.mg.43f6be647bb8f8ba
McAfeeArtemis!43F6BE647BB8
CylanceUnsafe
ZillyaTrojan.Zapchast.Win32.29498
SangforSuspicious.Win32.Save.a
K7AntiVirusTrojan ( 700000121 )
K7GWTrojan ( 700000121 )
Cybereasonmalicious.47bb8f
BitDefenderThetaGen:NN.ZemsilF.34182.im0@aCajY8fG
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of MSIL/Injector.EBV
TrendMicro-HouseCallTROJ_SPNR.32GD14
AvastMSIL:GenMalicious-EJH [Trj]
KasperskyTrojan.MSIL.Zapchast.ddta
BitDefenderGen:Variant.Ser.Razy.5696
TencentMsil.Trojan.Zapchast.Pepy
EmsisoftGen:Variant.Ser.Razy.5696 (B)
ComodoMalware@#340usoewxb4x6
VIPRETrojan.Win32.Generic!BT
TrendMicroTROJ_SPNR.32GD14
McAfee-GW-EditionBehavesLike.Win32.Trojan.ch
SophosMal/Generic-R + Troj/MSILInj-CD
eGambitUnsafe.AI_Score_99%
AviraTR/Dropper.MSIL.Gen8
Antiy-AVLTrojan/Generic.ASMalwS.AEECD5
MicrosoftBackdoor:MSIL/Bladabindi
ZoneAlarmTrojan.MSIL.Zapchast.ddta
GDataGen:Variant.Ser.Razy.5696
CynetMalicious (score: 99)
AhnLab-V3Win-Trojan/MDA.19171308.X1376
VBA32Trojan.MSIL.Zapchast
ALYacGen:Variant.Ser.Razy.5696
MAXmalware (ai score=88)
APEXMalicious
RisingTrojan.Generic/MSIL@AI.100 (RDM.MSIL:uuPqnNJrusuxtEOw2PFhXA)
YandexTrojan.Zapchast!ZFwqWb64OOk
SentinelOneStatic AI – Malicious PE
FortinetMSIL/Injector.ECC!tr
AVGMSIL:GenMalicious-EJH [Trj]
PandaTrj/CI.A
CrowdStrikewin/malicious_confidence_100% (W)

How to remove Ser.Razy.5696?

Ser.Razy.5696 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment