Malware

Zusy.340486 (B) removal tips

Malware Removal

The Zusy.340486 (B) is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Zusy.340486 (B) virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Dynamic (imported) function loading detected
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • CAPE extracted potentially suspicious content
  • Authenticode signature is invalid
  • Detects Sandboxie through the presence of a library
  • Detects Avast Antivirus through the presence of a library
  • Checks the presence of disk drives in the registry, possibly for anti-virtualization
  • Anomalous binary characteristics

How to determine Zusy.340486 (B)?


File Info:

name: 9EB63B12ABB7C5F14CC8.mlw
path: /opt/CAPEv2/storage/binaries/5bf27d0c7743c71f1dd3707259c5007c8b33b2c717b81c9308c4ecb80d3c89df
crc32: 6059BAAE
md5: 9eb63b12abb7c5f14cc881eb771fad14
sha1: 3e264ccad60f99e3a35f410c0d7ebeb08b88e0d2
sha256: 5bf27d0c7743c71f1dd3707259c5007c8b33b2c717b81c9308c4ecb80d3c89df
sha512: c09b1e45f6729a32e1b6d253d715a1a2987418aa2c7ee321b0199a858a16451c9211e4bed5d49a92d6b88ed5270821c39defc528f0037c9eaf15270aad8d6f7b
ssdeep: 6144:O/QqE9tWV/KR6mCxnm2iuuTBQOzX2oQkzeuNuokvN:OIltWxKgmCxm2iuuTkvrTokv
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1D0647C16B050D0F9D5E300B67EB9C6A0A9227DF8E870541A3FC63F151DB61E98A61F3B
sha3_384: 99674c9e85673f61e409e21f6bcf7920ada4f60ddeaa13a4382f63c2aa4a45f33737df4cc24f2e95cd61ef0f4a5a16ad
ep_bytes: e80d660000e995feffffcccccccccccc
timestamp: 2013-04-04 11:50:02

Version Info:

CompanyName: Oracle Corporation
FileDescription: Java(TM) Platform SE binary
FileVersion: 7.0.210.11
Full Version: 1.7.0_21-b11
InternalName: java
LegalCopyright: Copyright © 2013
OriginalFilename: java.exe
ProductName: Java(TM) Platform SE 7 U21
ProductVersion: 7.0.210.11
Translation: 0x0000 0x04b0

Zusy.340486 (B) also known as:

Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.Zusy.340486
FireEyeGen:Variant.Zusy.340486
ALYacGen:Variant.Zusy.340486
MalwarebytesMalware.AI.1109851574
SangforBackdoor.Win32.Mokes.pef
K7AntiVirusTrojan ( 0056d4961 )
AlibabaBackdoor:Win32/Mokes.703be481
K7GWTrojan ( 0056d4961 )
Cybereasonmalicious.2abb7c
BitDefenderThetaGen:NN.ZexaF.34212.su0@aCLx9fmi
CyrenW32/Kryptik.DED.gen!Eldorado
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Agent.ACGU
APEXMalicious
KasperskyHEUR:Backdoor.Win32.Mokes.pef
BitDefenderGen:Variant.Zusy.340486
NANO-AntivirusTrojan.Win32.Mokes.ilxkyn
AvastWin32:Trojan-gen
TencentWin32.Backdoor.Mokes.Hxzy
Ad-AwareGen:Variant.Zusy.340486
EmsisoftGen:Variant.Zusy.340486 (B)
VIPRETrojan.Win32.Generic!BT
TrendMicroTROJ_GEN.R067C0GJA21
McAfee-GW-EditionArtemis!Trojan
SophosMal/Generic-S
SentinelOneStatic AI – Suspicious PE
AviraHEUR/AGEN.1224293
Antiy-AVLTrojan/Generic.ASMalwS.3107BBC
GridinsoftRansom.Win32.Wacatac.sa
MicrosoftTrojan:Win32/Wacatac.B!ml
GDataGen:Variant.Zusy.340486
CynetMalicious (score: 99)
AhnLab-V3Trojan/Win.Generic.R416095
McAfeeArtemis!9EB63B12ABB7
MAXmalware (ai score=81)
VBA32Backdoor.Mokes
CylanceUnsafe
TrendMicro-HouseCallTROJ_GEN.R067C0GJA21
RisingTrojan.Kryptik!1.D2DE (CLOUD)
FortinetW32/Agent.ACGU!tr
AVGWin32:Trojan-gen
PandaTrj/Genetic.gen
CrowdStrikewin/malicious_confidence_100% (W)

How to remove Zusy.340486 (B)?

Zusy.340486 (B) removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment