Malware

How to remove “Zusy.356406”?

Malware Removal

The Zusy.356406 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Zusy.356406 virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Attempts to connect to a dead IP:Port (1 unique times)
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Dynamic (imported) function loading detected
  • CAPE extracted potentially suspicious content
  • Unconventionial binary language: Chinese (Simplified)
  • Unconventionial language used in binary resources: Chinese (Simplified)
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • The executable is compressed using UPX
  • Authenticode signature is invalid
  • Installs itself for autorun at Windows startup

How to determine Zusy.356406?


File Info:

name: C6BCAA62F0D24A0E1891.mlw
path: /opt/CAPEv2/storage/binaries/955994b048c9bc6d8d340b4baea7b6e7ecf3f07a795350d852ecc898dd73d2d8
crc32: 0C6891A4
md5: c6bcaa62f0d24a0e18918233963dab66
sha1: 5cbeb0f96a4546f9a842cadd9d0a1c44e4f63bd6
sha256: 955994b048c9bc6d8d340b4baea7b6e7ecf3f07a795350d852ecc898dd73d2d8
sha512: bca3347e86094cada2a3eb11612c55314493f93f3f6294b88b0280de8343dea30348cce716d14018ed503c3fac3238cfdf56e72ccc064176231bc21b3ab38cdb
ssdeep: 384:uKqrBz9FoaL3QpmSr5ZpKZX0ucR1CWdzpxvXcmnHU6jlksiKh+7nS73BtwY6IJSz:4h9F57QpLLE0rR1xxfXHUcriKdVzvCs
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T117E27C8B629D850DF55E853449D74F05EB64AC2DDA028F3F1690BB5E2C37360AF2272C
sha3_384: 0da7a8a947e02183f3c80d6baf42b0907eb879c8566161224e821f7a23ee8c98f4e8e0613c2ad97ebe865a08a276bc3c
ep_bytes: 60be00c040008dbe0050ffff5783cdff
timestamp: 2021-10-05 02:50:36

Version Info:

CompanyName:
FileDescription: BitmapPave Microsoft 基础类应用程序
FileVersion: 1, 0, 0, 1
InternalName: BitmapPave
LegalCopyright: 版权所有 (C) 2002
LegalTrademarks:
OriginalFilename: BitmapPave.EXE
ProductName: BitmapPave 应用程序
ProductVersion: 1, 0, 0, 1
Translation: 0x0804 0x04b0

Zusy.356406 also known as:

Elasticmalicious (moderate confidence)
MalwarebytesWorm.Magania
SangforSuspicious.Win32.Save.a
K7AntiVirusTrojan ( 00590a4a1 )
K7GWTrojan ( 00590a4a1 )
Cybereasonmalicious.2f0d24
CyrenW32/Trojan.IM1.gen!Eldorado
ESET-NOD32a variant of Win32/Kryptik.HOFJ
APEXMalicious
CynetMalicious (score: 99)
KasperskyHEUR:Trojan.Win32.Generic
BitDefenderGen:Variant.Zusy.356406
MicroWorld-eScanGen:Variant.Zusy.356406
AvastWin32:TrojanX-gen [Trj]
Ad-AwareGen:Variant.Zusy.356406
EmsisoftGen:Variant.Zusy.356406 (B)
DrWebBackDoor.Spy.422
Trapminemalicious.high.ml.score
FireEyeGeneric.mg.c6bcaa62f0d24a0e
IkarusTrojan.Win32.Krypt
GDataGen:Variant.Zusy.356406
JiangminTrojan.PSW.Magania.bfs
AviraHEUR/AGEN.1205717
MAXmalware (ai score=84)
KingsoftWin32.Troj.Undef.(kcloud)
ArcabitTrojan.Zusy.D57036
ZoneAlarmVHO:Trojan-GameThief.Win32.Magania.gen
MicrosoftTrojan:Win32/Wacatac.B!ml
Acronissuspicious
VBA32TrojanDownloader.Zegost
ALYacGen:Variant.Zusy.356406
TACHYONTrojan-PWS/W32.OnLineGames.61440.X
CylanceUnsafe
SentinelOneStatic AI – Malicious PE
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/GenKryptik.FLTT!tr
BitDefenderThetaGen:NN.ZexaF.34712.bmKfaKzxZPeb
AVGWin32:TrojanX-gen [Trj]

How to remove Zusy.356406?

Zusy.356406 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment