Spy Trojan

TrojanSpy:Win32/Lydra!pz (file analysis)

Malware Removal

The TrojanSpy:Win32/Lydra!pz is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What TrojanSpy:Win32/Lydra!pz virus can do?

  • Sample contains Overlay data
  • Reads data out of its own binary image
  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid
  • Operates on local firewall’s policies and settings

How to determine TrojanSpy:Win32/Lydra!pz?


File Info:

name: 97C372E3F304988A33B1.mlw
path: /opt/CAPEv2/storage/binaries/16468ef8a639a259c38dbc794a3fe1ceb7725a4b3c05b80ce2639c373e1ec7e6
crc32: E0382CCE
md5: 97c372e3f304988a33b1f4e53466e7f6
sha1: f611246387790cecba6a6e2be68a3fbbe00f520a
sha256: 16468ef8a639a259c38dbc794a3fe1ceb7725a4b3c05b80ce2639c373e1ec7e6
sha512: a40c317402dd45f632ad84f5191aeaccce59495735706f412f28840b5ff06e4e707ebd667d9c91b04a135567fa3a17bfd9a28106a1c2c2501da34b64ff91c6a2
ssdeep: 6144:tjFRiOcXH6XWD0w1tizmtnktLJ6znvxBcCI+1jDIlnJ9+1aTEPTnOK4JKEli:rRDc3yWDNU+YUznrNjElWaT07NQti
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1FDB46D36B6B18436D16259B8CC4BA7B8A8297D203D24EC473BD5DF4C9F39391352B293
sha3_384: 73e8255144edd5f68421ba4b4a8ef1ca4fd994f65e8cf1a976cab03954e864389758e7ad18da40801930f5b70a509a64
ep_bytes: 558bec83c4e833c08945ec8945e8b8cc
timestamp: 1992-06-19 22:22:17

Version Info:

0: [No Data]

TrojanSpy:Win32/Lydra!pz also known as:

BkavW32.AIDetectMalware
AVGWin32:Lydra-AF [Trj]
Elasticmalicious (high confidence)
MicroWorld-eScanGen:Trojan.Malware.FKY@amhwF3g
FireEyeGeneric.mg.97c372e3f304988a
CAT-QuickHealTrojan.GenericIH.S19648815
SkyhighBehavesLike.Win32.Generic.hh
McAfeegeneric!bg.ng
MalwarebytesGeneric.Malware.AI.DDS
VIPREGen:Trojan.Malware.FKY@amhwF3g
SangforTrojan.Win32.Save.a
K7AntiVirusTrojan ( 0054ffd11 )
K7GWTrojan ( 0054ffd11 )
CrowdStrikewin/malicious_confidence_100% (D)
BitDefenderThetaAI:Packer.D5BCA72A19
VirITTrojan.Win32.WinSpy.CYF
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Spy.Lydra
CynetMalicious (score: 100)
APEXMalicious
ClamAVWin.Malware.Lydra-9982098-0
KasperskyTrojan-Spy.Win32.Lydra.he
BitDefenderGen:Trojan.Malware.FKY@amhwF3g
NANO-AntivirusTrojan.Win32.Lydra.ckpik
AvastWin32:Lydra-AF [Trj]
TencentTrojan.Win32.Lydra.yq
SophosTroj/Lydra-Gen
F-SecureTrojan.TR/Dropper.Gen
DrWebTrojan.WinSpy.88
ZillyaTrojan.Lydra.Win32.804
Trapminemalicious.moderate.ml.score
EmsisoftGen:Trojan.Malware.FKY@amhwF3g (B)
IkarusTrojan.Win32.Delf
JiangminTrojanSpy.Lydra.ux
VaristW32/Lydra.B.gen!Eldorado
AviraTR/Dropper.Gen
Antiy-AVLTrojan[Spy]/Win32.Lydra
Kingsoftmalware.kb.a.1000
MicrosoftTrojanSpy:Win32/Lydra!pz
XcitiumTrojWare.Win32.Trojan.Lydra.~N@40gv3z
ArcabitTrojan.Malware.EFA97D
ZoneAlarmTrojan-Spy.Win32.Lydra.he
GDataWin32.Trojan.PSE.1EJY54W
GoogleDetected
Acronissuspicious
VBA32BScope.Trojan.Renamer
ALYacGen:Trojan.Malware.FKY@amhwF3g
MAXmalware (ai score=81)
Cylanceunsafe
PandaGeneric Malware
RisingSpyware.Lydra!1.6608 (CLASSIC)
SentinelOneStatic AI – Malicious PE
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/Lydra.AF!tr
Cybereasonmalicious.3f3049
DeepInstinctMALICIOUS
alibabacloudTrojan:Win/Delf.EMY

How to remove TrojanSpy:Win32/Lydra!pz?

TrojanSpy:Win32/Lydra!pz removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment