Malware

Zusy.404027 (B) (file analysis)

Malware Removal

The Zusy.404027 (B) is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Zusy.404027 (B) virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Scheduled file move on reboot detected
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • Dynamic (imported) function loading detected
  • Enumerates running processes
  • CAPE extracted potentially suspicious content
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Steals private information from local Internet browsers
  • Likely virus infection of existing system binary

Related domains:

interestourflash.info

How to determine Zusy.404027 (B)?


File Info:

name: 7B1475EF0C0F6BB84FCF.mlw
path: /opt/CAPEv2/storage/binaries/f1500bb1a54073fda1f02f2f8f6a20099c7920e2f44f403d338442c25fa7442a
crc32: 8743B8DE
md5: 7b1475ef0c0f6bb84fcfdd5b972e0041
sha1: 22d469eb3b64024885cbcf3fac90cbc618784f69
sha256: f1500bb1a54073fda1f02f2f8f6a20099c7920e2f44f403d338442c25fa7442a
sha512: b4b6d94e30e56170c1b3fbaa20287b71f73215e8d00dbe8ab62b6d038ce376ac26a9d5ec1028b6a01169d3d32b45d9ce4d3b3eb789ef203fb7279528302c074f
ssdeep: 49152:rppgeRuaS1KyQI566WPWTAAq7+im37ppOg5K0gbK5flOY:rjFbyQF6W4A4im37psgwK5fQY
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1CB95F101EF5840B5C176063C8B061EA9453D2D113B30DAAB12BAFD1FDEB474AB719AF6
sha3_384: 7a5443e846d54fb2871187eb582572a1c27ef349ca600c04fdda24ac31a67fc7c786579e3c61f96c8e03a603bd5e356f
ep_bytes: 558bec6aff682878570068fc51570064
timestamp: 2021-10-17 14:03:46

Version Info:

CompanyName: MindGems, Inc.
FileVersion: 4.1.0.1
LegalCopyright: MindGems, Inc.
ProductVersion: 4.0.0.0
Translation: 0x0409 0x04e4

Zusy.404027 (B) also known as:

Elasticmalicious (high confidence)
CynetMalicious (score: 100)
FireEyeGeneric.mg.7b1475ef0c0f6bb8
ALYacGen:Variant.Zusy.404027
K7AntiVirusTrojan ( 0058214e1 )
BitDefenderGen:Variant.Zusy.404027
K7GWTrojan ( 0058214e1 )
BitDefenderThetaGen:NN.ZexaF.34294.4D0@aCkqYZxi
CyrenW32/Kryptik.FOC.gen!Eldorado
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Kryptik.HLIQ
TrendMicro-HouseCallTROJ_GEN.R002C0PKN21
Paloaltogeneric.ml
KasperskyHEUR:Trojan.Win32.Chrop.gen
AlibabaTrojan:Win32/Chrop.18643245
ViRobotTrojan.Win32.Z.Zusy.1978368.M
MicroWorld-eScanGen:Variant.Zusy.404027
RisingTrojan.Kryptik!1.AA55 (CLASSIC)
Ad-AwareGen:Variant.Zusy.404027
EmsisoftGen:Variant.Zusy.404027 (B)
DrWebTrojan.Siggen15.50801
TrendMicroTROJ_GEN.R002C0PKN21
McAfee-GW-EditionBehavesLike.Win32.Generic.tc
SentinelOneStatic AI – Malicious PE
APEXMalicious
AviraHEUR/AGEN.1145346
MicrosoftTrojan:Win32/Wacatac.B!ml
GDataWin32.Trojan.PSE.1DJRHHO
AhnLab-V3Adware/Win.Generic.R425898
McAfeeGenericRXQC-BH!7B1475EF0C0F
MAXmalware (ai score=87)
MalwarebytesTrojan.Dropper
PandaTrj/GdSda.A
TencentWin32.Trojan.Chrop.Aheq
YandexTrojan.Chrop!T3irtNXzHqU
IkarusTrojan.Win32.Crypt
FortinetW32/Kryptik.HATU!tr
AVGWin32:Trojan-gen
AvastWin32:Trojan-gen
CrowdStrikewin/malicious_confidence_70% (W)

How to remove Zusy.404027 (B)?

Zusy.404027 (B) removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment