Malware

Should I remove “Zusy.498877”?

Malware Removal

The Zusy.498877 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Zusy.498877 virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Uses Windows utilities for basic functionality
  • Reads data out of its own binary image
  • Unconventionial binary language: Chinese (Simplified)
  • Unconventionial language used in binary resources: Chinese (Simplified)
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Behavioural detection: Injection (inter-process)
  • CAPE detected the shellcode get eip malware family
  • Attempts to modify proxy settings
  • Touches a file containing cookies, possibly for information gathering
  • Yara detections observed in process dumps, payloads or dropped files

How to determine Zusy.498877?


File Info:

name: A26320397DB45FC5E517.mlw
path: /opt/CAPEv2/storage/binaries/d0cba892f2bee9eeb5b03d56dd4fae0472536312bcfdfa40579696ab45f6cb29
crc32: 38D7140D
md5: a26320397db45fc5e517345b04734997
sha1: 6349ea14de329907412cafaf9e688c20aa3e135c
sha256: d0cba892f2bee9eeb5b03d56dd4fae0472536312bcfdfa40579696ab45f6cb29
sha512: 03ffce78d6c69ce7de2f8f0e0017ce5508d3c4975e23b33de5ffa813ce19cba6d2383c4752a5ed93ddfe1d38f79770cca6fdadfaba5e0a8dcbdfbf7c8d3bb0f3
ssdeep: 196608:lBWbbaPKeOugbJDjpHlzewVev3lwbhpK2KUY:AoKe2bJDjpHlzxEluCFP
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T14796222672487376C20646344573BB36F171BE0F4B9989E7B3E9FA946B73922DB02341
sha3_384: a54ca69b444a9037454d4fe2405552dd8cc0284ae824e66f2776a1f1e6eafa303fe8095cee45040938c9808b53869001
ep_bytes: 558bec6aff68e034c30068d45e480064
timestamp: 2020-09-30 23:10:50

Version Info:

FileVersion: 1.0.0.0
FileDescription: 购买下载-www.165wg.com
ProductName: 购买下载-www.165wg.com
ProductVersion: 1.0.0.0
CompanyName:
LegalCopyright: 版权所有
Comments: 购买下载-www.165wg.com
Translation: 0x0804 0x04b0

Zusy.498877 also known as:

BkavW32.AIDetectMalware
LionicTrojan.Win32.Generic.lte9
ElasticWindows.Generic.Threat
MicroWorld-eScanGen:Variant.Zusy.498877
FireEyeGeneric.mg.a26320397db45fc5
SkyhighBehavesLike.Win32.Generic.rc
McAfeeArtemis!A26320397DB4
Cylanceunsafe
SangforSuspicious.Win32.Save.ins
K7GWUnwanted-Program ( 0056626f1 )
K7AntiVirusTrojan ( 005246d51 )
BitDefenderThetaGen:NN.ZexaF.36804.@t0@a4MCm9hb
Paloaltogeneric.ml
SymantecML.Attribute.HighConfidence
tehtrisGeneric.Malware
ESET-NOD32a variant of Win32/Packed.FlyStudio.AA potentially unwanted
APEXMalicious
BitDefenderGen:Variant.Zusy.498877
EmsisoftGen:Variant.Zusy.498877 (B)
VIPREGen:Variant.Zusy.498877
Trapminemalicious.high.ml.score
SophosGeneric Reputation PUA (PUA)
IkarusTrojan.Crypt
GDataWin32.Application.PSE.1OV7PVV
JiangminTrojan.Generic.dzaod
GoogleDetected
VaristW32/OnlineGames.HG.gen!Eldorado
Antiy-AVLRiskWare/Win32.FlyStudio.a
XcitiumWorm.Win32.Dropper.RA@1qraug
ArcabitTrojan.Zusy.D79CBD
MicrosoftTrojan:Win32/Emotet!ml
CynetMalicious (score: 100)
ALYacGen:Variant.Zusy.498877
MalwarebytesGeneric.Malware.AI.DDS
RisingTrojan.Generic@AI.100 (RDML:mEoYHKWEgNAh73gZ9A0a7w)
MAXmalware (ai score=80)
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/CoinMiner.PHP!tr

How to remove Zusy.498877?

Zusy.498877 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment