Malware

Zusy.495760 (file analysis)

Malware Removal

The Zusy.495760 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Zusy.495760 virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Sample contains Overlay data
  • Reads data out of its own binary image
  • Unconventionial language used in binary resources: Chinese (Simplified)
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Checks for the presence of known windows from debuggers and forensic tools
  • CAPE detected the EnigmaStub malware family
  • Checks for the presence of known devices from debuggers and forensic tools
  • Checks for the presence of known devices from debuggers and forensic tools
  • Collects information to fingerprint the system
  • Yara rule detections observed from a process memory dump/dropped files/CAPE

How to determine Zusy.495760?


File Info:

name: F9A76D40D82B921F32EF.mlw
path: /opt/CAPEv2/storage/binaries/7d1836609d4e41faf3648c98d9716c9521a4b386b47903c07525cd229a0d108e
crc32: 6064E5DE
md5: f9a76d40d82b921f32efc3fe3fc56efa
sha1: 05f4ea69bb270c19f0727bd64fa82732752a4d83
sha256: 7d1836609d4e41faf3648c98d9716c9521a4b386b47903c07525cd229a0d108e
sha512: 87288ee136e4f2e58bc7f16030fd5d3bca613a2a243ece3a641c1b7e370071379a9d899d82fedd33636eca3892a2be8e65f870cdfb63871fc82270cc757eb66a
ssdeep: 24576:7kJjzRo8qovoJNuU6aMpv3xThJ9vLVfDzz4ghw9lEZ1ORh4rj9qU60x5d:4NyS5tpv3xThJ9vRZG9aZ1OnaO0x5d
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1217523288BF9241DFC73A932E8759AA00734FD46A830D9DE20F46EBE7972B540675707
sha3_384: 85abd0cf284cd027793848e6e94f0ab99e9c641b5fdb8331395a39d985686e25225261d9ea935a28450629fa50a67aa2
ep_bytes: 558bec83c4f0b800104000e801000000
timestamp: 1992-06-19 22:22:17

Version Info:

0: [No Data]

Zusy.495760 also known as:

BkavW32.AIDetectMalware
Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.Zusy.495760
SkyhighBehavesLike.Win32.Kudj.tc
ALYacGen:Variant.Zusy.495760
MalwarebytesEnigmaProtector.Trojan.MalPack.DDS
VIPREGen:Variant.Zusy.495760
SangforSuspicious.Win32.Save.ins
BitDefenderGen:Variant.Zusy.495760
Cybereasonmalicious.9bb270
ArcabitTrojan.Zusy.D79090
BitDefenderThetaGen:NN.ZexaF.36792.KTZ@aqZzqSej
SymantecML.Attribute.HighConfidence
tehtrisGeneric.Malware
ESET-NOD32a variant of Win32/Packed.EnigmaProtector.Y suspicious
APEXMalicious
RisingPUF.Pack-Enigma!1.BA33 (CLASSIC)
SophosGeneric ML PUA (PUA)
F-SecureHeuristic.HEUR/AGEN.1350442
Trapminemalicious.high.ml.score
FireEyeGeneric.mg.f9a76d40d82b921f
EmsisoftGen:Variant.Zusy.495760 (B)
SentinelOneStatic AI – Malicious PE
MAXmalware (ai score=84)
GoogleDetected
AviraHEUR/AGEN.1350442
VaristW32/Banker.BF.gen!Eldorado
Antiy-AVLGrayWare/Win32.EnigmaProtect.a
Kingsoftmalware.kb.b.853
MicrosoftProgram:Win32/Wacapew.C!ml
GDataGen:Variant.Zusy.495760
CynetMalicious (score: 100)
AhnLab-V3Trojan/Win.Generic.R492667
McAfeeArtemis!F9A76D40D82B
DeepInstinctMALICIOUS
VBA32TrojanDownloader.Alien
Cylanceunsafe
PandaTrj/Genetic.gen
IkarusTrojan.Win32.ServStart
MaxSecureTrojan.Malware.300983.susgen
AVGWAT:Blacked-Q
AvastWAT:Blacked-Q
CrowdStrikewin/malicious_confidence_90% (D)

How to remove Zusy.495760?

Zusy.495760 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment