Ransom Trojan

MemScan:Trojan.Ransom.Cerber.XJ (file analysis)

Malware Removal

The MemScan:Trojan.Ransom.Cerber.XJ is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What MemScan:Trojan.Ransom.Cerber.XJ virus can do?

  • Executable code extraction
  • Attempts to connect to a dead IP:Port (4 unique times)
  • Creates RWX memory
  • A process attempted to delay the analysis task.
  • A process created a hidden window
  • Creates an excessive number of UDP connection attempts to external IP addresses
  • Performs some HTTP requests
  • The binary likely contains encrypted or compressed data.
  • Uses Windows utilities for basic functionality
  • Attempts to modify desktop wallpaper
  • Attempts to execute a binary from a dead or sinkholed URL
  • Writes a potential ransom message to disk
  • EternalBlue behavior
  • Attempts to modify proxy settings
  • Attempts to access Bitcoin/ALTCoin wallets
  • Generates some ICMP traffic
  • Collects information to fingerprint the system
  • Anomalous binary characteristics
  • Uses suspicious command line tools or Windows utilities

Related domains:

api.blockcypher.com
btc.blockr.io
bitaps.com
chain.so
ocsp.digicert.com
crl3.digicert.com
xpcx6erilkjced3j.14pxvn.top

How to determine MemScan:Trojan.Ransom.Cerber.XJ?


File Info:

crc32: 78D7775B
md5: 5361de1da7c7441c73d7976205504eef
name: 5361DE1DA7C7441C73D7976205504EEF.mlw
sha1: 1b15822ec0e6e9abfa055fa1eba50fef1c562c98
sha256: 5bd1301db760419e0fafe12acff68d2b1e87717469f23ad26b14c1c50c6b75c4
sha512: 46d5e5588d8301dba3c3a690a8d84dc4423a39f376ae6c1b9a2da80c718f373bda5942a5ce1b549210fe6a4cdf91cffa2516bd31acd853881d4366af519f56cf
ssdeep: 3072:ViN8f+Mr43LpjE8erUWIWzTzAVm5YHKg8c8v42MP+ShfU7NhD+9D+M6n3LJ:sNjx7+hbfYHKH51HXaD+M6nbJ
type: PE32 executable (GUI) Intel 80386, for MS Windows, PECompact2 compressed

Version Info:

0: [No Data]

MemScan:Trojan.Ransom.Cerber.XJ also known as:

BkavW32.AIDetect.malware1
K7AntiVirusTrojan ( 00510d391 )
LionicTrojan.Win32.Zerber.4!c
Elasticmalicious (high confidence)
DrWebTrojan.Encoder.4691
McAfeeArtemis!5361DE1DA7C7
CylanceUnsafe
CrowdStrikewin/malicious_confidence_90% (D)
AlibabaRansom:Win32/Zerber.bb79a994
K7GWTrojan ( 00510d391 )
Cybereasonmalicious.da7c74
SymantecRansom.Cerber
ESET-NOD32a variant of Win32/Kryptik.FTVH
APEXMalicious
AvastFileRepMalware
CynetMalicious (score: 100)
KasperskyTrojan-Ransom.Win32.Zerber.foda
BitDefenderMemScan:Trojan.Ransom.Cerber.XJ
NANO-AntivirusTrojan.Win32.Encoder.fnmkuj
MicroWorld-eScanMemScan:Trojan.Ransom.Cerber.XJ
TencentTrojan.Win32.Cerber.h
SophosMal/Generic-S + Mal/EncPk-AOP
ComodoMalware@#13vmgzljbzgd8
BitDefenderThetaGen:NN.ZexaF.34170.kmWaa8wBP!j
VIPRETrojan.Win32.Generic!BT
TrendMicroRansom_CERBER.SM3B
McAfee-GW-EditionBehavesLike.Win32.VirRansom.cc
FireEyeGeneric.mg.5361de1da7c7441c
EmsisoftMemScan:Trojan.Ransom.Cerber.XJ (B)
JiangminTrojan/PSW.Lmir.dah
Antiy-AVLTrojan/Generic.ASMalwS.2AB3331
MicrosoftRansom:Win32/Cerber
GDataMemScan:Trojan.Ransom.Cerber.XJ
AhnLab-V3Trojan/Win32.Agent.C3088385
VBA32Hoax.Zerber
MAXmalware (ai score=100)
PandaTrj/CI.A
TrendMicro-HouseCallRansom_CERBER.SM3B
YandexTrojan.Zerber!PqKF6rB7yHY
IkarusTrojan.Win32.Delf
MaxSecureTrojan.Malware.11417434.susgen
FortinetW32/Kryptik.GKKB!tr
AVGFileRepMalware
Paloaltogeneric.ml

How to remove MemScan:Trojan.Ransom.Cerber.XJ?

MemScan:Trojan.Ransom.Cerber.XJ removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment