Malware

Heur.NSIS.Cerber.2 (B) removal

Malware Removal

The Heur.NSIS.Cerber.2 (B) is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Heur.NSIS.Cerber.2 (B) virus can do?

  • Executable code extraction
  • Compression (or decompression)
  • Attempts to connect to a dead IP:Port (4 unique times)
  • Enumerates user accounts on the system
  • Creates RWX memory
  • A process attempted to delay the analysis task.
  • Reads data out of its own binary image
  • Creates an excessive number of UDP connection attempts to external IP addresses
  • Performs some HTTP requests
  • Attempts to modify desktop wallpaper
  • Exhibits behavior characteristic of Cerber ransomware
  • Attempts to execute a binary from a dead or sinkholed URL
  • Creates a hidden or system file
  • Attempts to modify proxy settings
  • Attempts to access Bitcoin/ALTCoin wallets
  • Collects information to fingerprint the system
  • Anomalous binary characteristics

Related domains:

api.blockcypher.com
btc.blockr.io
bitaps.com
chain.so
ocsp.digicert.com

How to determine Heur.NSIS.Cerber.2 (B)?


File Info:

crc32: DA9860E9
md5: 91624195dbc5d2f5610275b942c52b01
name: 91624195DBC5D2F5610275B942C52B01.mlw
sha1: 34fc8009a2b2246b04d1856417450b0a44c6356d
sha256: 7d4feff258cc047570614cc192706671e30cfa8fb81f23356f6c2c794ca4e68c
sha512: 5356d73b100d186e23005231d7222a7e6040d728d7ef6660f7a7ec382701651cc5df3438f9a8314805e6a884c8b6955cd536bf7ce1a217ba713cfb697045089a
ssdeep: 6144:MT+vH54y3SmFzkL2msD2OCNwphRBcxhyCMGvxQQtLhYhak5SYi:MsHpSmlkRLOC0dQyCFqdhak8p
type: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive

Version Info:

0: [No Data]

Heur.NSIS.Cerber.2 (B) also known as:

Elasticmalicious (high confidence)
DrWebTrojan.Inject4.4961
MicroWorld-eScanGen:Heur.NSIS.Cerber.2
FireEyeGeneric.mg.91624195dbc5d2f5
CAT-QuickHealRansom.Cerber.B
McAfeeArtemis!91624195DBC5
VIPRETrojan.Win32.Generic!BT
SangforMalware
K7AntiVirusTrojan ( 005034d51 )
BitDefenderGen:Heur.NSIS.Cerber.2
K7GWTrojan ( 005034d51 )
Cybereasonmalicious.5dbc5d
InvinceaMal/Cerber-AA
CyrenW32/Trojan.KGZK-0762
SymantecRansom.Cerber
APEXMalicious
AvastWin32:Trojan-gen
KasperskyHEUR:Trojan-Ransom.Win32.Agent.gen
AlibabaTrojan:Win32/Injector.347aed93
NANO-AntivirusTrojan.Nsis.Zerber.ekughz
RisingTrojan.Win32.Zerber.t (CLASSIC)
SophosMal/Cerber-AA
ComodoMalware@#34uxxaacgu8p
F-SecureTrojan.TR/Dropper.Gen
ZillyaDropper.Agent.Win32.382777
TrendMicroRansom_Agent.R06EC0OKG20
McAfee-GW-EditionBehavesLike.Win32.ObfusRansom.dc
EmsisoftGen:Heur.NSIS.Cerber.2 (B)
JiangminTrojan.Nisloder.ii
AviraTR/Dropper.Gen
MAXmalware (ai score=89)
MicrosoftTrojan:Win32/Ymacco.AA7D
ArcabitTrojan.NSIS.Cerber.2
SUPERAntiSpywareRansom.Cerber/Variant
ZoneAlarmHEUR:Trojan-Ransom.Win32.Agent.gen
GDataGen:Heur.NSIS.Cerber.2
CynetMalicious (score: 100)
AhnLab-V3Trojan/Win32.Cerber.R194240
ZonerTrojan.Win32.53157
ESET-NOD32a variant of NSIS/Injector.SG
TrendMicro-HouseCallRansom_Agent.R06EC0OKG20
TencentWin32.Trojan.Agent.Hreo
SentinelOneStatic AI – Suspicious PE
FortinetW32/Injector.SH!tr
AVGWin32:Trojan-gen
CrowdStrikewin/malicious_confidence_100% (D)
Qihoo-360Win32/Trojan.Ransom.b44

How to remove Heur.NSIS.Cerber.2 (B)?

Heur.NSIS.Cerber.2 (B) removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment