Malware

Zusy.370581 malicious file

Malware Removal

The Zusy.370581 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Zusy.370581 virus can do?

  • Executable code extraction
  • Creates RWX memory
  • A process attempted to delay the analysis task.
  • HTTP traffic contains suspicious features which may be indicative of malware related traffic
  • Performs some HTTP requests
  • The binary likely contains encrypted or compressed data.
  • Queries information on disks, possibly for anti-virtualization
  • Behavior consistent with a dropper attempting to download the next stage.
  • Detects the presence of Wine emulator via registry key
  • Checks the version of Bios, possibly for anti-virtualization
  • Collects information to fingerprint the system
  • Anomalous binary characteristics

Related domains:

static.86.102.69.159.clients.your-server.de

How to determine Zusy.370581?


File Info:

crc32: CA6FF47F
md5: 7b6d4a358c55713ea29f4e52dbbab75d
name: 7B6D4A358C55713EA29F4E52DBBAB75D.mlw
sha1: 5547f163d582d6f53aaeb58d9a2159d366521c5a
sha256: 028c2c4b523387f8b5d5c68d9f588a243c479bb5c45b5b5f174666ecaec33e15
sha512: 3c078873c7b21c5cf9762cb427142caadbc3e625bc97059c7f9fa22e761cd67f4da2209f1289e0e43b53024f702f644d6a47c63d8f065f0cd87daf86a0fcdb14
ssdeep: 49152:SFS+njj7dmo7Tjvsa5k7SnOATMAQt3luZvcO4zD:SFlTdDgagAAA+3GvcOC
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

ProductVersion: 10.2.1.2358
ProductName: WODJN Internet Security
FileVersion: 10.2.1.2358
CompanyName: WODJN
Translation: 0x0409 0x04e4

Zusy.370581 also known as:

BkavW32.AIDetect.malware2
K7AntiVirusTrojan ( 0053fe731 )
LionicTrojan.Win32.Generic.4!c
Elasticmalicious (high confidence)
CynetMalicious (score: 100)
CAT-QuickHealTrojan.Mauvaise.SL1
ALYacGen:Variant.Zusy.370581
CylanceUnsafe
ZillyaTrojan.Ekstak.Win32.17232
SangforTrojan.Win32.Save.a
AlibabaTrojan:Win32/Ekstak.4e6b6364
K7GWTrojan ( 0053fe731 )
Cybereasonmalicious.58c557
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Kryptik.GNDL
APEXMalicious
AvastWin32:ICLoader-X [Adw]
KasperskyHEUR:Trojan.Win32.Generic
BitDefenderGen:Variant.Zusy.370581
NANO-AntivirusTrojan.Win32.Ekstak.fkpmxa
MicroWorld-eScanGen:Variant.Zusy.370581
TencentWin32.Trojan.Ekstak.Ajcf
Ad-AwareGen:Variant.Zusy.370581
SophosMal/Generic-S
ComodoApplication.Win32.ICLoader.GS@84429a
BitDefenderThetaGen:NN.ZexaF.34236.0w0@amIRdUhi
McAfee-GW-EditionBehavesLike.Win32.Dropper.vh
FireEyeGeneric.mg.7b6d4a358c55713e
EmsisoftApplication.Generic (A)
SentinelOneStatic AI – Malicious PE
WebrootPua.Downloadmgr
AviraTR/ICLoader.Gen8
eGambitUnsafe.AI_Score_100%
Antiy-AVLTrojan/Win32.Ekstak
MicrosoftSoftwareBundler:Win32/ICLoader
ArcabitTrojan.Zusy.D5A795
ZoneAlarmHEUR:Packed.Win32.Katusha.gen
GDataGen:Variant.Zusy.370581
AhnLab-V3PUP/Win32.ICLoader.R246163
Acronissuspicious
McAfeePacked-FME!7B6D4A358C55
MAXmalware (ai score=81)
VBA32BScope.Trojan.InstallCube
MalwarebytesAdware.InstallCube
PandaTrj/Genetic.gen
RisingTrojan.Kryptik!1.AA23 (CLASSIC)
YandexTrojan.GenAsa!pIGFAn0c7g8
IkarusTrojan.Win32.Crypt
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/CoinMiner.GYQC!tr
AVGWin32:ICLoader-X [Adw]
Paloaltogeneric.ml

How to remove Zusy.370581?

Zusy.370581 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment