Malware

Zusy.303703 (B) information

Malware Removal

The Zusy.303703 (B) is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Zusy.303703 (B) virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • CAPE extracted potentially suspicious content
  • Drops a binary and executes it
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Uses Windows utilities for basic functionality
  • Creates a copy of itself

How to determine Zusy.303703 (B)?


File Info:

name: 8D0DBA693401A43E9DD5.mlw
path: /opt/CAPEv2/storage/binaries/a87f641c3e858e8943eb169e32f2231cc3a0f85d0db1ce1810236444985e1ba9
crc32: 3021275D
md5: 8d0dba693401a43e9dd521b5fbc3feb2
sha1: 0adb2832538208693714610e34841bb4e200250e
sha256: a87f641c3e858e8943eb169e32f2231cc3a0f85d0db1ce1810236444985e1ba9
sha512: ac85cdae829c1ed204f9579c265c571c3b96cca84f7abd6b8c7e39589de0c5d06c0c959496a5ecea2f3cc37b3f5934d24cc7a075da4f031f59685283e37b0f69
ssdeep: 12288:qGeVQkTrvj43dLJxQRAbXQuPCZ/pVgBkottKiVj:qzQkTf4NrPXP0ekot4iV
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T199B4F1932C5046FBE971823988E1C777877C30390F7595D3BB6AAD766E013C96A2B4C8
sha3_384: 0338a53abda211f8210d14310de02bae78e604d8d8904bf6b3b59430ba2025add71465973b9d2fefbb2d548a2d3ba1e7
ep_bytes: e8125b0000e9a4feffff6a0c68381142
timestamp: 2000-06-02 07:48:21

Version Info:

0: [No Data]

Zusy.303703 (B) also known as:

BkavW32.AIDetect.malware1
LionicHeuristic.File.Generic.00×1!p
MicroWorld-eScanGen:Variant.Zusy.303703
FireEyeGeneric.mg.8d0dba693401a43e
CAT-QuickHealTrojan.MSILCryptor.MUE.A4
ALYacGen:Variant.Zusy.303703
CylanceUnsafe
VIPREGen:Variant.Zusy.303703
SangforTrojan.Win32.Save.a
K7AntiVirusTrojan ( 0053b4521 )
AlibabaTrojan:Win32/Bladabindi.fd85e216
K7GWTrojan ( 0053b4521 )
CrowdStrikewin/malicious_confidence_90% (W)
CyrenW32/A-3e7aeab6!Eldorado
SymantecML.Attribute.HighConfidence
Elasticmalicious (high confidence)
ESET-NOD32a variant of MSIL/Bladabindi.L
APEXMalicious
Paloaltogeneric.ml
KasperskyHEUR:Trojan.Win32.Generic
BitDefenderGen:Variant.Zusy.303703
NANO-AntivirusTrojan.Win32.Crypted.dkaaeh
SUPERAntiSpywareTrojan.Agent/Gen-Downloader
AvastWin32:Virut-AFX
TencentWin32.Trojan.Generic.Kflw
Ad-AwareGen:Variant.Zusy.303703
EmsisoftGen:Variant.Zusy.303703 (B)
ComodoMalware@#a8zcpdbg84rd
ZillyaTrojan.Generic.Win32.1055579
TrendMicroTROJ_GEN.R067C0PI822
McAfee-GW-EditionTrojan-FPCE!8D0DBA693401
Trapminemalicious.moderate.ml.score
SophosML/PE-A
SentinelOneStatic AI – Malicious PE
GDataGen:Variant.Zusy.303703
GoogleDetected
AviraTR/Crypt.XPACK.Gen
MAXmalware (ai score=83)
KingsoftWin32.Troj.Undef.(kcloud)
ArcabitTrojan.Zusy.D4A257
ZoneAlarmHEUR:Trojan.Win32.Generic
MicrosoftBackdoor:Win32/Bladabindi!ml
CynetMalicious (score: 100)
McAfeeTrojan-FPCE!8D0DBA693401
MalwarebytesNimnul.Virus.FileInfector.DDS
RisingTrojan.Generic@AI.100 (RDML:qw/XH4oFk8rB8sSbSUaM9g)
YandexTrojan.Agent!TaHAftHDE0o
IkarusTrojan.MSIL.Bladabindi
FortinetW32/Generic.L!tr
BitDefenderThetaGen:NN.ZexaF.34646.HqW@aWvMK3o
AVGWin32:Virut-AFX
Cybereasonmalicious.93401a
PandaTrj/CI.A

How to remove Zusy.303703 (B)?

Zusy.303703 (B) removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment