Malware

Zusy.400958 (B) removal guide

Malware Removal

The Zusy.400958 (B) is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Zusy.400958 (B) virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • Dynamic (imported) function loading detected
  • Enumerates running processes
  • Expresses interest in specific running processes
  • CAPE extracted potentially suspicious content
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Creates a copy of itself

How to determine Zusy.400958 (B)?


File Info:

name: 0943D56C6C6C15E6FDBE.mlw
path: /opt/CAPEv2/storage/binaries/90a4eec92edf75ab80adb898dc52a17728741811e6c622cea946582b524b9958
crc32: 33AEF939
md5: 0943d56c6c6c15e6fdbedf6249fdde87
sha1: 459ac9300445cd3f84dc91c217ccc272a9bfff39
sha256: 90a4eec92edf75ab80adb898dc52a17728741811e6c622cea946582b524b9958
sha512: 712713b0b65ad128372989b78c86bb7b49e505ac3406c04cb514e85a1b400ccffd06d338eacdd95ad7cf4e683c5c4641b04da8201df6d7087d362d7c299a5a9d
ssdeep: 24576:2psCFd5+F+vPsckAmWOjByQdQzV9lsislVlNd1Cn:2psCFdUF+3PPmWOFy7Dlslt
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1BAA56D8523645458E4EBB6384DAA19EC2D3B7E929820C65F2722FE4D3CF1D48D463B1F
sha3_384: 92cad66d249bf794defc5a9e11cdbb404f7d409c9b6d457f28630359b9a9a5f93b178add6f8bb40815683e66fd6bba66
ep_bytes: 558bec6aff6800b3460068009a460064
timestamp: 2021-09-13 09:32:30

Version Info:

CompanyName: Ashampoo GmbH
FileDescription: Ashampoo ZIP 3
FileVersion: 3.0.26.0
LegalCopyright: Copyright(c) 2019 Ashampoo GmbH
ProductName: Ashampoo ZIP 3
ProductVersion: 3.0
ProgramID: Ashampoo.AshampooZIP
Translation: 0x0409 0x04e4

Zusy.400958 (B) also known as:

BkavW32.AIDetect.malware1
LionicTrojan.Win32.Staser.4!c
Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.Zusy.400958
FireEyeGeneric.mg.0943d56c6c6c15e6
McAfeeGenericRXAA-AA!0943D56C6C6C
CylanceUnsafe
K7AntiVirusTrojan ( 005821bc1 )
AlibabaTrojan:Win32/Staser.92523c62
K7GWTrojan ( 005821bc1 )
Cybereasonmalicious.00445c
ArcabitTrojan.Zusy.D61E3E
CyrenW32/Kryptik.FGR.gen!Eldorado
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Kryptik.HLQM
APEXMalicious
Paloaltogeneric.ml
KasperskyHEUR:Trojan.Win32.Staser.gen
BitDefenderGen:Variant.Zusy.400958
AvastWin32:CrypterX-gen [Trj]
TencentWin32.Trojan.Staser.Eyd
Ad-AwareGen:Variant.Zusy.400958
EmsisoftGen:Variant.Zusy.400958 (B)
TrendMicroTROJ_GEN.R06CC0PJ321
McAfee-GW-EditionBehavesLike.Win32.Downloader.vh
SophosMal/Generic-S
IkarusTrojan.Win32.Crypt
AviraHEUR/AGEN.1145346
MAXmalware (ai score=88)
MicrosoftTrojan:Win32/Wacatac.B!ml
GDataWin32.Trojan.PSE.1IAKRUN
CynetMalicious (score: 100)
AhnLab-V3Trojan/Win.Generic.R441526
BitDefenderThetaGen:NN.ZexaF.34062.aA0@aaxqxnpi
ALYacGen:Variant.Zusy.400958
MalwarebytesAdware.Agent.SFP.Generic
TrendMicro-HouseCallTROJ_GEN.R06CC0PJ321
RisingTrojan.Kryptik!1.AA55 (CLASSIC)
YandexTrojan.Kryptik!r1YcYpKeeNc
SentinelOneStatic AI – Malicious PE
FortinetW32/Kryptik.HATU!tr
AVGWin32:CrypterX-gen [Trj]
PandaTrj/Genetic.gen

How to remove Zusy.400958 (B)?

Zusy.400958 (B) removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment