Ransom

Ransom.Cerber.528 removal tips

Malware Removal

The Ransom.Cerber.528 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Ransom.Cerber.528 virus can do?

  • Executable code extraction
  • Injection (inter-process)
  • Injection (Process Hollowing)
  • Creates RWX memory
  • A process created a hidden window
  • The binary likely contains encrypted or compressed data.
  • Uses Windows utilities for basic functionality
  • Executed a process and injected code into it, probably while unpacking
  • Deletes its original binary from disk
  • Network activity detected but not expressed in API logs
  • Anomalous binary characteristics

How to determine Ransom.Cerber.528?


File Info:

crc32: 9BB17A62
md5: 635eb939d167d483c6b0a48bc62cdd1a
name: 635EB939D167D483C6B0A48BC62CDD1A.mlw
sha1: da215590c564c1d5bde133032190d1580b63bbfe
sha256: a2fd55564fe7c1262ee1a0fdaace75debdf35b40ba72aacd71e1543d806c6984
sha512: 742df894d722a95a70e91eeeff8bb0ad93dca2af73a529e097f5f8e3440e1e6f4397f4de97ecdbd304204e4b8927b06f966ebd6c14499ed543e6c64f9f387ef0
ssdeep: 3072:fj9fH9pU19IOjtgypKtQuN58soVjazjPUuGdL:fj9/lOaypKtQ858sDzjP9a
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

0: [No Data]

Ransom.Cerber.528 also known as:

BkavW32.AIDetect.malware2
Elasticmalicious (high confidence)
DrWebTrojan.PWS.Papras.2707
MicroWorld-eScanGen:Variant.Ransom.Cerber.528
FireEyeGeneric.mg.635eb939d167d483
CAT-QuickHealRansom.Exxroute.A3
ALYacGen:Variant.Ransom.Cerber.528
CylanceUnsafe
VIPRETrojan.Win32.Generic!BT
AegisLabTrojan.Win32.Generic.4!c
SangforTrojan.Win32.Save.a
K7AntiVirusTrojan ( 00515aa21 )
BitDefenderGen:Variant.Ransom.Cerber.528
K7GWTrojan ( 00515aa21 )
Cybereasonmalicious.9d167d
BitDefenderThetaGen:NN.ZexaF.34608.jqW@a06ulTji
CyrenW32/Cerber.AV.gen!Eldorado
SymantecPacked.Generic.493
APEXMalicious
AvastWin32:Cerber-E [Trj]
ClamAVWin.Trojan.Spora-7724442-0
KasperskyHEUR:Trojan.Win32.Generic
AlibabaTrojan:Win32/Manggarypt.8fd14e17
NANO-AntivirusTrojan.Win32.Kryptik.emwzgj
RisingRansom.Cerber!8.3058 (CLOUD)
Ad-AwareGen:Variant.Ransom.Cerber.528
EmsisoftGen:Variant.Ransom.Cerber.528 (B)
ComodoTrojWare.Win32.Ursnif.AP@70uaj9
F-SecureHeuristic.HEUR/AGEN.1116789
TrendMicroRansom_CERBER.SM3A
McAfee-GW-EditionBehavesLike.Win32.Dropper.cc
SophosMal/Generic-R + Mal/Elenoocka-E
SentinelOneStatic AI – Malicious PE
JiangminTrojan.Generic.cqhtj
AviraHEUR/AGEN.1116789
MAXmalware (ai score=88)
Antiy-AVLTrojan/Win32.Manggarypt
MicrosoftTrojan:Win32/Manggarypt.B!bit
GridinsoftRansom.Win32.AI.sa
ArcabitTrojan.Ransom.Cerber.528
ZoneAlarmHEUR:Trojan.Win32.Generic
GDataGen:Variant.Ransom.Cerber.528
CynetMalicious (score: 100)
AhnLab-V3Malware/Win32.Generic.C1881506
Acronissuspicious
McAfeeRansomware-FLTL!635EB939D167
VBA32BScope.Trojan.Encoder
MalwarebytesMachineLearning/Anomalous.95%
PandaTrj/Genetic.gen
ESET-NOD32a variant of Win32/Kryptik.FQFV
TrendMicro-HouseCallRansom_CERBER.SM3A
TencentWin32.Trojan-dropper.Injector.Wmta
YandexTrojan.GenAsa!TMb6aLS4rr4
IkarusTrojan.Crypt
eGambitUnsafe.AI_Score_87%
FortinetW32/Kryptik.GKVH!tr
AVGWin32:Cerber-E [Trj]
Paloaltogeneric.ml
CrowdStrikewin/malicious_confidence_100% (W)
Qihoo-360Win32/Trojan.Generic.HxQBar8A

How to remove Ransom.Cerber.528?

Ransom.Cerber.528 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment