Categories: Ransom

Ransom.Cerber.G4 removal guide

The Ransom.Cerber.G4 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Ransom.Cerber.G4 virus can do?

  • Executable code extraction
  • At least one process apparently crashed during execution
  • Enumerates user accounts on the system
  • Creates RWX memory
  • A process attempted to delay the analysis task.
  • Reads data out of its own binary image
  • Drops a binary and executes it
  • HTTP traffic contains suspicious features which may be indicative of malware related traffic
  • Creates an excessive number of UDP connection attempts to external IP addresses
  • Performs some HTTP requests
  • Unconventionial language used in binary resources: Chinese (Simplified)
  • The binary likely contains encrypted or compressed data.
  • Uses Windows utilities for basic functionality
  • Attempts to repeatedly call a single API many times in order to delay analysis time
  • Exhibits behavior characteristic of Cerber ransomware
  • Creates or sets a registry key to a long series of bytes, possibly to store a binary or malware config
  • Mimics the file times of a Windows system file
  • Installs itself for autorun at Windows startup
  • Creates a hidden or system file
  • Attempts to identify installed AV products by installation directory
  • Checks the system manufacturer, likely for anti-virtualization
  • Attempts to modify proxy settings
  • Creates a copy of itself
  • Uses suspicious command line tools or Windows utilities

Related domains:

z.whorecord.xyz
a.tomx.xyz
ip-api.com

How to determine Ransom.Cerber.G4?


File Info:

crc32: DBF629DCmd5: b37a3ab9bed0ea5e17878c7c966a35e6name: B37A3AB9BED0EA5E17878C7C966A35E6.mlwsha1: 170577588a436675aba2c04ae047afeb25125844sha256: 5ad027dde7474939e2f037f994b1a5144f199c52f452302cae63d135a006c55fsha512: f10c0338a0d86650cbeb0e7759bb64e309e1a1068fb08cb5fd3ccbdd37edb2a89adca0db7b367d9c565105928fe3fc0683c48fa8a6ab953070348783d9faa8eessdeep: 6144:gb3ElIO0nCG24ekrA/2IrqIDjmTib888888888888W88888888888H:gTEpxc/kOgqE888888888888W888888Atype: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

InternalName: 3RVX.exeFileDescription: 3RVXFileVersion: 2.5CompanyName: matt.malensek.netTranslation: 0x0000 0x04b0

Ransom.Cerber.G4 also known as:

Bkav W32.AIDetect.malware1
Elastic malicious (high confidence)
MicroWorld-eScan Trojan.Ransom.Cerber.1
FireEye Generic.mg.b37a3ab9bed0ea5e
CAT-QuickHeal Ransom.Cerber.G4
McAfee Ransomware-FXM!B37A3AB9BED0
Cylance Unsafe
VIPRE Trojan.Win32.Generic!BT
Sangfor Trojan.Win32.Save.a
K7AntiVirus Trojan ( 005224381 )
BitDefender Trojan.Ransom.Cerber.1
K7GW Trojan ( 005224381 )
Cybereason malicious.9bed0e
Baidu Win32.Trojan.Kryptik.anp
Cyren W32/Locky.H2.gen!Eldorado
Symantec Packed.Generic.459
APEX Malicious
Paloalto generic.ml
Kaspersky HEUR:Trojan.Win32.Generic
Alibaba Ransom:Win32/Cerber.6d0ae45e
NANO-Antivirus Trojan.Win32.Encoder.evgkgb
ViRobot Trojan.Win32.Z.Cerber.276297.L
SUPERAntiSpyware Ransom.Cerber/Variant
Rising Trojan.Kryptik!1.AF0E (CLOUD)
Ad-Aware Trojan.Ransom.Cerber.1
Emsisoft Trojan.Ransom.Cerber.1 (B)
Comodo TrojWare.Win32.Kryptik.ERJ@6l0vie
F-Secure Heuristic.HEUR/AGEN.1112217
DrWeb Trojan.Encoder.5189
Zillya Trojan.Kryptik.Win32.929747
TrendMicro Ransom_CERBER.SMEJ1
McAfee-GW-Edition BehavesLike.Win32.Emotet.dh
Sophos ML/PE-A + Mal/Ransom-EJ
SentinelOne Static AI – Malicious PE
GData Trojan.Ransom.Cerber.1
Jiangmin Downloader.LMN.duy
Avira HEUR/AGEN.1112217
MAX malware (ai score=100)
Antiy-AVL RiskWare[Downloader]/Win32.LMN
Arcabit Trojan.Ransom.Cerber.1
ZoneAlarm HEUR:Trojan.Win32.Generic
Microsoft Ransom:Win32/Cerber.A
Cynet Malicious (score: 100)
AhnLab-V3 Win-Trojan/Cerber.Gen
Acronis suspicious
BitDefenderTheta Gen:NN.ZexaF.34590.qq1@aKG2Mkpj
ALYac Trojan.Ransom.Cerber.1
VBA32 BScope.TrojanPSW.Papras
Malwarebytes Malware.AI.2190580496
Panda Trj/GdSda.A
ESET-NOD32 a variant of Win32/Kryptik.FDQB
TrendMicro-HouseCall Ransom_CERBER.SMEJ1
Tencent Malware.Win32.Gencirc.10b3ed37
Yandex Trojan.GenAsa!w9Vac4doJ4A
Ikarus Trojan-Ransom.FileCrypter
eGambit Unsafe.AI_Score_100%
Fortinet W32/Kryptik.HCAW!tr
Webroot W32.Trojan.Gen
AVG Win32:Malware-gen
Avast Win32:Malware-gen
CrowdStrike win/malicious_confidence_100% (W)
Qihoo-360 Win32/Ransom.Cerber.HxQBQ28A

How to remove Ransom.Cerber.G4?

  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.
Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Recent Posts

What is “MSILHeracles.58916”?

The MSILHeracles.58916 is considered dangerous by lots of security experts. When this infection is active,…

18 mins ago

About “TrojanDownloader:Win32/Beebone.AZ” infection

The TrojanDownloader:Win32/Beebone.AZ is considered dangerous by lots of security experts. When this infection is active,…

58 mins ago

Should I remove “Renos.76”?

The Renos.76 is considered dangerous by lots of security experts. When this infection is active,…

59 mins ago

About “Zusy.473197” infection

The Zusy.473197 is considered dangerous by lots of security experts. When this infection is active,…

59 mins ago

Win32:FakeAV-BGX [Drp] (file analysis)

The Win32:FakeAV-BGX [Drp] is considered dangerous by lots of security experts. When this infection is…

1 hour ago

What is “Trojan:Win32/Clustinex!C”?

The Trojan:Win32/Clustinex!C is considered dangerous by lots of security experts. When this infection is active,…

1 hour ago