Malware

About “Zusy.301986” infection

Malware Removal

The Zusy.301986 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Zusy.301986 virus can do?

  • Executable code extraction
  • Injection (inter-process)
  • Injection (Process Hollowing)
  • Creates RWX memory
  • Reads data out of its own binary image
  • Unconventionial language used in binary resources: Arabic (Egypt)
  • Executed a process and injected code into it, probably while unpacking
  • Installs itself for autorun at Windows startup
  • Network activity detected but not expressed in API logs
  • Creates a copy of itself
  • Anomalous binary characteristics

How to determine Zusy.301986?


File Info:

crc32: A23300C6
md5: ce1420f451a8fadb06e4632bf296788a
name: CE1420F451A8FADB06E4632BF296788A.mlw
sha1: ced081b85f5eb31d71bb198e920d92165746a40f
sha256: b88c4ab590a6a9a5c48d81cdba86b91601f7a3e046671695587a6324030209f3
sha512: 2751b144ae62a6c39fd4cbe3391e78efaa1b8333b09eb812264cf1fc8815465990b9c9d8b3f4a88ce767927eefe798b54fba5694dd014bbee03df33d6907d03b
ssdeep: 12288:o6cZRrmufypod1rNedSfno6Z5LdcTwhcmcSjiAf3GPA7W2FeDSIGVH/KIDgDgUeg:wZl2Ep3fn15LdL3GQQDbGV6eH8tkQ
type: PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows

Version Info:

LegalCopyright: Copyright xa9 2018
InternalName: unpack200
FileVersion: 8.0.1810.13
Full Version: 1.8.0_181-b13
CompanyName: Oracle Corporation
ProductName: Java(TM) Platform SE 8
ProductVersion: 8.0.1810.13
FileDescription: Java(TM) Platform SE binary
OriginalFilename: unpack200.exe
Translation: 0x0000 0x04b0

Zusy.301986 also known as:

BkavW32.AIDetectVM.malware2
Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.Zusy.301986
FireEyeGeneric.mg.ce1420f451a8fadb
ALYacGen:Variant.Zusy.301986
CylanceUnsafe
SangforMalware
K7AntiVirusTrojan ( 00543ea81 )
BitDefenderGen:Variant.Zusy.301986
K7GWTrojan ( 00543ea81 )
Cybereasonmalicious.451a8f
TrendMicroTrojanSpy.Win32.AVEMARIA.SMTH
CyrenW32/Trojan.FQJ.gen!Eldorado
SymantecTrojan.Gen.2
APEXMalicious
AvastSf:ShellCode-CU [Trj]
ClamAVWin.Malware.Daqc-6598201-0
Ad-AwareGen:Variant.Zusy.301986
EmsisoftGen:Variant.Zusy.301986 (B)
ComodoTrojWare.Win32.Mocrt.A@81lqy7
F-SecureHeuristic.HEUR/AGEN.1121064
DrWebTrojan.Siggen6.54687
InvinceaML/PE-A + Mal/Agent-ATS
McAfee-GW-EditionBehavesLike.Win32.Generic.th
SophosMal/Agent-ATS
JiangminTrojan.Generic.dsqqe
AviraHEUR/AGEN.1121064
MAXmalware (ai score=89)
Antiy-AVLTrojan/Win32.Delf
MicrosoftPWS:Win32/Mocrt.A!MTB
ArcabitTrojan.Zusy.D49BA2
SUPERAntiSpywareTrojan.Agent/Gen-Injector
GDataGen:Variant.Zusy.301986
CynetMalicious (score: 100)
AhnLab-V3Trojan/Win32.RL_Agent.R281398
Acronissuspicious
McAfeePWS-FCRX!CE1420F451A8
VBA32Trojan.Delf
MalwarebytesSpyware.LokiBot
PandaTrj/Genetic.gen
ZonerTrojan.Win32.97652
ESET-NOD32a variant of Win32/Injector.ELDH
TrendMicro-HouseCallTrojanSpy.Win32.AVEMARIA.SMTH
RisingStealer.AveMaria!1.CEBB (CLASSIC)
YandexTrojan.GenAsa!3PeokibywzU
SentinelOneStatic AI – Malicious PE
eGambitTrojan.Generic
FortinetW32/Injector.ELDH!tr
BitDefenderThetaAI:Packer.1E1ED57F19
AVGSf:ShellCode-CU [Trj]
CrowdStrikewin/malicious_confidence_100% (D)
Qihoo-360HEUR/QVM05.1.455B.Malware.Gen

How to remove Zusy.301986?

Zusy.301986 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment