Malware

How to remove “Zusy.525620”?

Malware Removal

The Zusy.525620 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Zusy.525620 virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Sample contains Overlay data
  • Unconventionial language used in binary resources: Chinese (Simplified)
  • Authenticode signature is invalid
  • Anomalous binary characteristics

How to determine Zusy.525620?


File Info:

name: 5B3CE74F9276E4BAA313.mlw
path: /opt/CAPEv2/storage/binaries/fd536342e077fcda542382836c9929b93ceb2ca47dd8e0ac3e824d6655660d43
crc32: A3498DF4
md5: 5b3ce74f9276e4baa3139df4a1ea1e64
sha1: a636abe0bf5722d062d4fa7905643a40ba452b1c
sha256: fd536342e077fcda542382836c9929b93ceb2ca47dd8e0ac3e824d6655660d43
sha512: 20d1605d5281ef57b1b698698ac045f9c7bd5974e4a1746e9cb5552858d82508f7fd578e787026e2fab80bffce14a0766183a724de036b441e4952e9e75e05af
ssdeep: 3072:uWcfZ3onpkeCrdI2Ts/wzw4FPJvnqnpiuG:uWuouRI2LzRFPJPqnpiu
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1E2048F628970BB13E951093517E06BFB801D3C2F4BE5060A7CAEDA5F3763D9A349F942
sha3_384: d53352e855efe6eab19574dbedcc88d2e8c5668d776f58f9570cd127e22ab34136ec908033d46944533df75b8c0ff32e
ep_bytes: 68c0914200e8f0ffffffcd0000000000
timestamp: 2019-04-26 10:28:09

Version Info:

0: [No Data]

Zusy.525620 also known as:

BkavW32.AIDetectMalware
LionicTrojan.Win32.VB.tsbh
Elasticmalicious (high confidence)
DrWebTrojan.MulDrop17.61497
CynetMalicious (score: 100)
CAT-QuickHealTrojan.MuldVMF.S21469993
SkyhighBehavesLike.Win32.Generic.ct
McAfeeGenericRXHC-SS!5B3CE74F9276
Cylanceunsafe
ZillyaTrojan.GenKryptik.Win32.384784
SangforSuspicious.Win32.Save.vb
K7AntiVirusTrojan ( 005690671 )
AlibabaTrojan:Win32/Muldrop.329
K7GWTrojan ( 005690671 )
CrowdStrikewin/malicious_confidence_100% (W)
ArcabitTrojan.Zusy.D80534
BitDefenderThetaAI:Packer.1DDCF60A20
VirITTrojan.Win32.VBUCornT.DRP
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/GenKryptik.FNGV
APEXMalicious
ClamAVWin.Malware.Midie-6847892-0
KasperskyUDS:Trojan.Win32.Generic
BitDefenderGen:Variant.Zusy.525620
NANO-AntivirusTrojan.Win32.Banker1.fnwqkb
SUPERAntiSpywareTrojan.Agent/Gen-Strictor
MicroWorld-eScanGen:Variant.Zusy.525620
AvastWin32:VB-AJKU [Trj]
TencentTrojan.Win32.VB.ko
EmsisoftGen:Variant.Zusy.525620 (B)
F-SecureTrojan.TR/Crypt.XPACK.Gen
VIPREGen:Variant.Zusy.525620
TrendMicroTROJ_GEN.R03BC0DLK23
SophosMal/VB-AQT
IkarusTrojan.Crypt
JiangminTrojan.VB.aqyg
GoogleDetected
AviraTR/Crypt.XPACK.Gen
Antiy-AVLTrojan/Win32.Wacatac.b
Kingsoftmalware.kb.a.992
MicrosoftTrojanDropper:Win32/Muldrop.V!MTB
ViRobotTrojan.Win.Z.Zusy.188470.BP
ZoneAlarmUDS:Trojan.Win32.Generic
GDataWin32.Trojan.VBClone.B
VaristW32/VB_Troj.J.gen!Eldorado
AhnLab-V3Trojan/Win32.Agent.R252862
VBA32SScope.Trojan.VB
ALYacGen:Variant.Zusy.525620
TACHYONTrojan/W32.VB-Agent.188470.E
MalwarebytesGeneric.Malware.AI.DDS
PandaTrj/Genetic.gen
TrendMicro-HouseCallTROJ_GEN.R03BC0DLK23
RisingTrojan.VBClone!1.E032 (CLASSIC)
YandexTrojan.GenKryptik!q7iBUf/GAxk
SentinelOneStatic AI – Malicious PE
MaxSecureVirus.W32.GenericML.xnet
FortinetW32/VBClone.D!tr
AVGWin32:VB-AJKU [Trj]
Cybereasonmalicious.0bf572
DeepInstinctMALICIOUS

How to remove Zusy.525620?

Zusy.525620 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment