Malware

Zusy.525620 (file analysis)

Malware Removal

The Zusy.525620 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Zusy.525620 virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Sample contains Overlay data
  • Unconventionial language used in binary resources: Chinese (Simplified)
  • Authenticode signature is invalid
  • Anomalous binary characteristics

How to determine Zusy.525620?


File Info:

name: 7933C33F6BE7A4DA9B15.mlw
path: /opt/CAPEv2/storage/binaries/7425e18c123541969434b28513936fc15c6d7573bcb184623d58262095c72871
crc32: A744703D
md5: 7933c33f6be7a4da9b1595d704758549
sha1: 763a2ab7bbc97b56bbb666c977dd2b6470764e3d
sha256: 7425e18c123541969434b28513936fc15c6d7573bcb184623d58262095c72871
sha512: fc5af2eeabb7f9b33c95ea7edf25f8eeccdaf2a3200da93a94124334f29e5605717673d79339630878b9070b60223a6b6ac6e06c749ede832c59e2d05158bafc
ssdeep: 3072:rWzoU3onpve6Ac4BTs99zbuFlJvnq6piuH:rWHo154B8z6FlJPq6piu
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1CD048F628970BB13E951093517E06BFB801D3C2F4BE5060A7CADDA5F3763D9A349FA42
sha3_384: 920e580a6180058511785e71bd8e0f4f8fc67a310b93db987545ac204dea10ef99756701ac9a4feb1a5bc11e8f0ee97a
ep_bytes: 68c0914200e8f0ffffffcd0000000000
timestamp: 2019-04-26 10:28:09

Version Info:

0: [No Data]

Zusy.525620 also known as:

BkavW32.AIDetectMalware
LionicTrojan.Win32.VB.tsbh
Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.Zusy.525620
FireEyeGeneric.mg.7933c33f6be7a4da
CAT-QuickHealTrojan.MuldVMF.S21469993
SkyhighBehavesLike.Win32.Generic.ct
McAfeeGenericRXHC-SS!7933C33F6BE7
Cylanceunsafe
ZillyaTrojan.GenKryptik.Win32.406584
SangforSuspicious.Win32.Save.vb
CrowdStrikewin/malicious_confidence_100% (W)
AlibabaTrojan:Win32/Muldrop.329
K7GWTrojan ( 005690671 )
K7AntiVirusTrojan ( 005690671 )
BitDefenderThetaAI:Packer.1DDCF60A20
VirITTrojan.Win32.VBUCornT.DRP
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/GenKryptik.FNGV
CynetMalicious (score: 100)
APEXMalicious
ClamAVWin.Malware.Midie-6847893-0
KasperskyHEUR:Trojan.Win32.VB.gen
BitDefenderGen:Variant.Zusy.525620
NANO-AntivirusTrojan.Win32.Banker1.fnwqkb
SUPERAntiSpywareTrojan.Agent/Gen-Strictor
AvastWin32:VB-AJKU [Trj]
TencentTrojan.Win32.VB.ko
TACHYONTrojan/W32.VB-Agent.188449.I
EmsisoftGen:Variant.Zusy.525620 (B)
F-SecureTrojan.TR/Crypt.XPACK.Gen
DrWebTrojan.MulDrop17.61497
VIPREGen:Variant.Zusy.525620
TrendMicroTROJ_GEN.R03BC0DLP23
SophosMal/VB-AQT
IkarusTrojan.Crypt
JiangminTrojan.VB.aqyg
VaristW32/VB_Troj.J.gen!Eldorado
AviraTR/Crypt.XPACK.Gen
Antiy-AVLTrojan/Win32.Wacatac.b
KingsoftWin32.Trojan.VB.gen
MicrosoftTrojanDropper:Win32/Muldrop.V!MTB
ArcabitTrojan.Zusy.D80534
ViRobotTrojan.Win.Z.Zusy.188449.JW
ZoneAlarmHEUR:Trojan.Win32.VB.gen
GDataWin32.Trojan.VBClone.B
GoogleDetected
AhnLab-V3Trojan/Win32.Agent.R252862
VBA32SScope.Trojan.VB
ALYacGen:Variant.Zusy.525620
MAXmalware (ai score=89)
MalwarebytesGeneric.Malware.AI.DDS
PandaTrj/Genetic.gen
TrendMicro-HouseCallTROJ_GEN.R03BC0DLP23
RisingTrojan.VBClone!1.E032 (CLASSIC)
YandexTrojan.VB!a0pUjlTGA+w
SentinelOneStatic AI – Malicious PE
MaxSecureVirus.W32.GenericML.xnet
FortinetW32/VBClone.D!tr
AVGWin32:VB-AJKU [Trj]
Cybereasonmalicious.7bbc97
DeepInstinctMALICIOUS

How to remove Zusy.525620?

Zusy.525620 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment