Malware

Cerbu.147808 (B) removal tips

Malware Removal

The Cerbu.147808 (B) is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Cerbu.147808 (B) virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Sample contains Overlay data
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • A file with an unusual extension was attempted to be loaded as a DLL.
  • Possible date expiration check, exits too soon after checking local time
  • Anomalous file deletion behavior detected (10+)
  • Dynamic (imported) function loading detected
  • Reads data out of its own binary image
  • Drops a binary and executes it
  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid
  • Uses Windows utilities for basic functionality
  • Behavioural detection: Transacted Hollowing
  • Collects and encrypts information about the computer likely to send to C2 server
  • Creates a hidden or system file
  • Likely virus infection of existing system binary
  • Deletes executed files from disk

How to determine Cerbu.147808 (B)?


File Info:

name: 30ED2CAABD84E2212B8C.mlw
path: /opt/CAPEv2/storage/binaries/78602201102e0cf77d9303585839a43d7db13ea1045f533c597cd41f6f1227e8
crc32: 4B45EDE0
md5: 30ed2caabd84e2212b8c063e02a353af
sha1: f3ce811c1c7d8c4f6013cbf548bfe92b66d8509c
sha256: 78602201102e0cf77d9303585839a43d7db13ea1045f533c597cd41f6f1227e8
sha512: e9a02e7447996b61dcb880bbd01ced6b1b9bcaa016bb2a6d9363351fe3caa261d77435e2da25fe28894c01cd41043353fc386676c1503950024065fc2af66da1
ssdeep: 98304:YOQIKXOTuZmsP09UzBtear53LeZHkB9KJPLT09xpORdORQIPGV16CEiMkXGtt8A:yNLqUfear5388wJPLYPpcrG1CEiMkOCA
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T14A6633B3F69472F1CA825B33BA57EA2C1323BD114819D20F33587F2A2BB3355912A55D
sha3_384: d41cbf4b8072e936bd2829d7e47734679dd79763772f3e6b11f98a3e33e96e5ceaeb1d9e52f29c8545885fd5effe34c9
ep_bytes: 558bec83c4cc53565733c08945f08945
timestamp: 1992-06-19 22:22:17

Version Info:

Comments: This installation was built with Inno Setup.
CompanyName: Novativy Solutions
FileDescription: Disk Cleaner
FileVersion: 6.0.2.1
LegalCopyright:
Translation: 0x0409 0x04e4

Cerbu.147808 (B) also known as:

MicroWorld-eScanGen:Variant.Cerbu.147808
FireEyeGen:Variant.Cerbu.147808
ALYacGen:Variant.Cerbu.147808
CylanceUnsafe
AlibabaTrojanDropper:Win32/Generic.7179d80f
K7GWTrojan ( 005722fe1 )
CyrenW32/Ekstak.CG.gen!Eldorado
SymantecTrojan.Gen.2
Elasticmalicious (high confidence)
ESET-NOD32a variant of Win32/TrojanDropper.Agent.SLC
Paloaltogeneric.ml
ClamAVWin.Malware.Filerepmalware-9956515-0
KasperskyTrojan.Win32.Ekstak.amkvd
BitDefenderGen:Variant.Cerbu.147808
AvastWin32:Adware-gen [Adw]
Ad-AwareGen:Variant.Cerbu.147808
EmsisoftGen:Variant.Cerbu.147808 (B)
McAfee-GW-EditionArtemis!Trojan
SophosMal/Generic-S
GDataWin32.Backdoor.Bodelph.MHREGW
JiangminTrojanDropper.Inokrypt.b
ArcabitTrojan.Cerbu.D24160
MicrosoftTrojan:Win32/Sabsik.FL.B!ml
AhnLab-V3Adware/Win.Adware-gen.R503210
McAfeeArtemis!30ED2CAABD84
MAXmalware (ai score=87)
AVGWin32:Adware-gen [Adw]

How to remove Cerbu.147808 (B)?

Cerbu.147808 (B) removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment