Malware

Should I remove “Zusy.359268”?

Malware Removal

The Zusy.359268 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Zusy.359268 virus can do?

  • Unconventionial language used in binary resources: Chinese (Simplified)
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid

How to determine Zusy.359268?


File Info:

name: 26A6AF86A707DD5561B7.mlw
path: /opt/CAPEv2/storage/binaries/141d8314127ee95f3de0f5d92e7c1201675916f7cae7f8583bbd7b7afacc8295
crc32: 535377B7
md5: 26a6af86a707dd5561b72f357d1f1dea
sha1: 2a0e46fc7977f4b9f1591d749dfb6b68ae936580
sha256: 141d8314127ee95f3de0f5d92e7c1201675916f7cae7f8583bbd7b7afacc8295
sha512: 1a7fec72f45f2bafca8eaf7fb7a73e1d8df06205e195052848be098ebd74e08ba74e3a550a40b93c8b93fff14e3046a82fa939558e420e05dc4fbcec941689be
ssdeep: 49152:aeSpmgX8BZJENAcI2pIzBYlm5e1HmspXOFbJ6vK+4XcvIiZXOs:aeSx9pIzBYAaHjXOFnRi1O
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T198F5E08ADA74303BE1A8E4B96C1BAC80987E3C1D932C54EE167EBE894530741713BF57
sha3_384: 902e57d676d52a659616447144be3281d6b716f7bf5c5037bc655f462349bba2f523c0ee82266db4eac0dc1fb7ee7981
ep_bytes: 558bec6aff68a045640068b02f640064
timestamp: 2020-12-31 09:55:19

Version Info:

CompanyName: IObit
FileDescription: Bitdefender Patch Download
FileVersion: 8.0.0.487
InternalName:
LegalCopyright: © IObit. All rights reserved.
LegalTrademarks: IObit
OriginalFilename: bdpatchdownload.exe
ProductName: IObit Malware Fighter
ProductVersion: 8.0
Translation: 0x0409 0x04e4

Zusy.359268 also known as:

BkavW32.AIDetect.malware2
LionicTrojan.Multi.Generic.4!c
Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.Zusy.359268
CAT-QuickHealTrojan.WacatacPMF.S18039760
McAfeeGenericRXNI-NN!26A6AF86A707
CylanceUnsafe
ZillyaTrojan.Kryptik.Win32.2796870
SangforTrojan.Win32.Save.a
K7AntiVirusTrojan ( 0058a3461 )
AlibabaTrojan:Win32/Tnega.146e0e3c
K7GWTrojan ( 0058a3461 )
Cybereasonmalicious.6a707d
ArcabitTrojan.Zusy.D57B64
CyrenW32/Kryptik.CKH.gen!Eldorado
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Kryptik.HINR
Paloaltogeneric.ml
KasperskyHEUR:Trojan.Win32.Ekstak.gen
BitDefenderGen:Variant.Zusy.359268
NANO-AntivirusTrojan.Win32.Ekstak.iqprlo
AvastWin32:AdwareX-gen [Adw]
Ad-AwareGen:Variant.Zusy.359268
SophosMal/Generic-S + Troj/Agent-BEQV
ComodoMalware@#35d4fhpmb6u0m
VIPRETrojan.Win32.Generic!BT
McAfee-GW-EditionBehavesLike.Win32.Generic.wc
FireEyeGeneric.mg.26a6af86a707dd55
EmsisoftGen:Variant.Zusy.359268 (B)
SentinelOneStatic AI – Malicious PE
eGambitUnsafe.AI_Score_99%
AviraHEUR/AGEN.1142521
Antiy-AVLTrojan/Generic.ASMalwS.310C055
MicrosoftTrojan:Win32/Tnega.MS!MTB
GDataGen:Variant.Zusy.359268
CynetMalicious (score: 100)
AhnLab-V3PUP/Win32.DownloadAssistant.R361912
ALYacGen:Variant.Zusy.359268
MAXmalware (ai score=85)
VBA32BScope.Trojan.Tnega
MalwarebytesAdware.Agent.KHM.Generic
APEXMalicious
RisingTrojan.Kryptik!1.AA23 (CLASSIC)
IkarusTrojan.Win32.Crypt
MaxSecureTrojan.Malware.73555928.susgen
FortinetW32/Kryptik.GZFR!tr
AVGWin32:AdwareX-gen [Adw]
PandaTrj/Genetic.gen
CrowdStrikewin/malicious_confidence_60% (D)

How to remove Zusy.359268?

Zusy.359268 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment