Malware

About “Zusy.424696” infection

Malware Removal

The Zusy.424696 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Zusy.424696 virus can do?

  • The binary contains an unknown PE section name indicative of packing
  • The executable is compressed using UPX
  • Authenticode signature is invalid

How to determine Zusy.424696?


File Info:

name: 16B6986AE7C8DAFEE0CC.mlw
path: /opt/CAPEv2/storage/binaries/7fd18f9f7fc67916ef364a152b50a473497ee5ada0cc0d0667035ed33a588589
crc32: AB150F12
md5: 16b6986ae7c8dafee0ccf65a115c91ce
sha1: 66b8628f864eb42f074a8e14a42950d45fb16f2b
sha256: 7fd18f9f7fc67916ef364a152b50a473497ee5ada0cc0d0667035ed33a588589
sha512: ea96e246a19e53c9de60c68589602f914f8f506c7153c3b2998daaab1237030cc4c3fb553926cce0f0d7adbc3e3a2fb773f07ecec9226660c1f71f086b1ba4cd
ssdeep: 1536:s0Y9WV32peG+vBHyPuWU0ucXDveteBM2mlmo7ed5Un4:s0wQ324FHyPuWUpcS43d5Un4
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T14D836A57F68210F2C829037214C7977BCA7ABE34112FB559A7913F1ACE3A261BB0D187
sha3_384: 4701ed06c455c1494f336e0d80980aaa827f22370e2f645d38774ea8308fd6df385348755f8e37a04920293684114577
ep_bytes: 55b878160000575653e807280000c744
timestamp: 2007-01-22 21:51:22

Version Info:

0: [No Data]

Zusy.424696 also known as:

BkavW32.AIDetectMalware
LionicTrojan.Win32.Vilsel.4!c
Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.Zusy.424696
ClamAVWin.Downloader.2666-1
FireEyeGeneric.mg.16b6986ae7c8dafe
CAT-QuickHealDownloader.Agent.27044
McAfeeGenericRXCG-HN!16B6986AE7C8
MalwarebytesGeneric.Trojan.Downloader.DDS
ZillyaTrojan.Vilsel.Win32.41902
SangforSuspicious.Win32.Save.a
K7AntiVirusTrojan ( 005983e51 )
AlibabaTrojan:Win32/Vilsel.9a15
K7GWTrojan ( 005983e51 )
Cybereasonmalicious.ae7c8d
BaiduWin32.Trojan-Downloader.Agent.gr
CyrenW32/Agent.ENI.gen!Eldorado
SymantecML.Attribute.HighConfidence
ESET-NOD32Win32/TrojanDownloader.Agent.NIV
APEXMalicious
CynetMalicious (score: 100)
KasperskyTrojan.Win32.Vilsel.csjl
BitDefenderGen:Variant.Zusy.424696
NANO-AntivirusTrojan.Win32.Agent.yvpm
AvastWin32:Agent-JML [Trj]
TencentTrojan.Win32.Vilsel.xaa
SophosMal/Generic-R
F-SecureTrojan.TR/Crypt.XPACK.Gen
DrWebTrojan.DownLoader.20145
VIPREGen:Variant.Zusy.424696
TrendMicroTROJ_GEN.R002C0DEL23
McAfee-GW-EditionBehavesLike.Win32.Generic.mm
Trapminemalicious.moderate.ml.score
EmsisoftGen:Variant.Zusy.424696 (B)
SentinelOneStatic AI – Malicious PE
GDataGen:Variant.Zusy.424696
JiangminTrojanDownloader.Agent.ghz
AviraTR/Crypt.XPACK.Gen
MAXmalware (ai score=80)
Antiy-AVLVirus/Win32.Expiro.imp
XcitiumPacked.Win32.MUPX.Gen@24tbus
ArcabitTrojan.Zusy.D67AF8
ViRobotTrojan.Win32.A.Downloader.84496.A
ZoneAlarmTrojan.Win32.Vilsel.csjl
MicrosoftTrojanDownloader:Win32/Agent
GoogleDetected
AhnLab-V3Trojan/Win32.RL_Vilsel.R361066
VBA32TrojanDownloader.Agent
ALYacGen:Variant.Zusy.424696
TACHYONTrojan/W32.Vilsel.86016.AH
Cylanceunsafe
PandaGeneric Malware
TrendMicro-HouseCallTROJ_GEN.R002C0DEL23
RisingDownloader.Agent!8.B23 (TFE:2:Bb8arfHsHCG)
YandexTrojan.Vilsel!oLNx4IamXBM
IkarusTrojan-Dropper.Agent
FortinetW32/Agent.APD!tr.dldr
BitDefenderThetaAI:Packer.B4130D5C1E
AVGWin32:Agent-JML [Trj]
DeepInstinctMALICIOUS
CrowdStrikewin/malicious_confidence_100% (W)

How to remove Zusy.424696?

Zusy.424696 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment