Malware

Zusy.2585 information

Malware Removal

The Zusy.2585 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Zusy.2585 virus can do?

  • Sample contains Overlay data
  • Unconventionial binary language: Chinese (Simplified)
  • Unconventionial language used in binary resources: Chinese (Simplified)
  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid

How to determine Zusy.2585?


File Info:

name: 2C9DEFDEA222F2D997D2.mlw
path: /opt/CAPEv2/storage/binaries/91ea8ebbdcec2293a1c21ecce827e4b10affda332fde453d4e3ad23ee4905567
crc32: 79CA1E8F
md5: 2c9defdea222f2d997d2c31ecd92d449
sha1: 0b067f5ea2a7b2a7469fafbde5e314acbdda37c0
sha256: 91ea8ebbdcec2293a1c21ecce827e4b10affda332fde453d4e3ad23ee4905567
sha512: f25ef31d32ad4100a753886241182de68e7e27476f2abd22ab59058983806a96e3e2e9961c802c523885a51bf0720814a011fec0950cd8d32de812c5475dab68
ssdeep: 12288:97oBrVXtapbHeOfK61WsA+TNX6fbI1HMch3G8QYCf1LG5+2:9QuJeOfK61WwpZB3G9TQB
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1B7E47D32B2F24437C1771A3C9C7B76A9993ABF102D28B8467BE81D4C4F3A64179652D3
sha3_384: df4d6736f26a71f6d0dbb1ac3bc1056aff3a451daabde3b82e4dbd780c6d7fc7dc8919294eba01584b3c37c1feca0316
ep_bytes: 558bec83c4f0b824134900e80856f7ff
timestamp: 1992-06-19 22:22:17

Version Info:

CompanyName:
FileDescription:
FileVersion: 5.2.1.3
InternalName:
LegalCopyright:
LegalTrademarks:
OriginalFilename:
ProductName:
ProductVersion: 1.0.0.0
Comments:
Translation: 0x0804 0x03a8

Zusy.2585 also known as:

LionicTrojan.Win32.Delf.lotE
Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.Zusy.2585
FireEyeGeneric.mg.2c9defdea222f2d9
ALYacGen:Variant.Zusy.2585
CylanceUnsafe
VIPREGen:Variant.Zusy.2585
SangforTrojan.Win32.Save.a
K7AntiVirusTrojan ( 7000000f1 )
K7GWTrojan ( 7000000f1 )
Cybereasonmalicious.ea222f
VirITTrojan.Win32.Generic.BYQW
CyrenW32/Delf.AX.gen!Eldorado
SymantecML.Attribute.HighConfidence
ESET-NOD32Win32/Delf.QJM
APEXMalicious
ClamAVWin.Trojan.Delf-13065
KasperskyTrojan.Win32.Delf.eduv
BitDefenderGen:Variant.Zusy.2585
NANO-AntivirusTrojan.Win32.Delf.covkcg
AvastWin32:Dropper-EPQ [Drp]
TencentMalware.Win32.Gencirc.10b60f0a
Ad-AwareGen:Variant.Zusy.2585
EmsisoftGen:Variant.Zusy.2585 (B)
ComodoTrojWare.Win32.Agent.QJL@4ktj1h
DrWebTrojan.PWS.Spy.11872
ZillyaTrojan.Delf.Win32.110787
TrendMicroTROJ_AGENT_008923.TOMB
McAfee-GW-EditionBehavesLike.Win32.Worm.jh
SophosMal/Delf-DU
SentinelOneStatic AI – Suspicious PE
GDataGen:Variant.Zusy.2585
JiangminTrojanSpy.Delf.hbt
WebrootW32.Trojan.Downloader
GoogleDetected
AviraTR/Spy.Gen
Antiy-AVLTrojan/Generic.ASMalwS.14E
MicrosoftTrojan:Win32/Delf.KP
CynetMalicious (score: 99)
AhnLab-V3Trojan/Win32.Downloader.R5612
McAfeeGenericRXAA-AA!2C9DEFDEA222
MAXmalware (ai score=84)
VBA32BScope.Trojan.Occamy
MalwarebytesTrojan.Crypt
TrendMicro-HouseCallTROJ_AGENT_008923.TOMB
RisingTrojan.Win32.DelfCode.ff (CLASSIC)
YandexTrojanSpy.Agent!rUwG9RKu3SQ
MaxSecureTrojan.Malware.300983.susgen
FortinetPossibleThreat
BitDefenderThetaGen:NN.ZelphiF.34646.QG1@aWzRyybb
AVGWin32:Dropper-EPQ [Drp]
PandaTrj/Genetic.gen
CrowdStrikewin/malicious_confidence_90% (W)

How to remove Zusy.2585?

Zusy.2585 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment