Ransom

Ransom:Win32/Cerber.L!bit removal

Malware Removal

The Ransom:Win32/Cerber.L!bit is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Ransom:Win32/Cerber.L!bit virus can do?

  • Executable code extraction
  • Creates RWX memory
  • A process created a hidden window
  • Creates an excessive number of UDP connection attempts to external IP addresses
  • Unconventionial language used in binary resources: Chinese (Simplified)
  • The binary likely contains encrypted or compressed data.
  • Uses Windows utilities for basic functionality
  • Creates or sets a registry key to a long series of bytes, possibly to store a binary or malware config
  • Installs itself for autorun at Windows startup
  • EternalBlue behavior
  • Attempts to access Bitcoin/ALTCoin wallets
  • Generates some ICMP traffic
  • Collects information to fingerprint the system
  • Anomalous binary characteristics
  • Uses suspicious command line tools or Windows utilities

Related domains:

z.whorecord.xyz
a.tomx.xyz

How to determine Ransom:Win32/Cerber.L!bit?


File Info:

crc32: 1013DEB9
md5: 9ce7afa5c28d23a68bd26a4e8a5fe096
name: upload_file
sha1: ce50f097d91e1898e941288418f43ad5a2480e96
sha256: b9170a6678f62a8484ec8c75b1a0d5d3ee620154d8d8f07a7a748f45781e3116
sha512: 5850da36cd32ef781366e99eb40224b2f72ae6ccdbdcc50ece5daf7fa34000b07844ba486eec79f7580304af9cd3825465ded532f3cc86aa2c7642abcd124408
ssdeep: 6144:iPSWCfUxuNuUelUa4Z/uIjhXOmqGWQnLOpv29gmwAPRNLIaj8XD:iKWCNbn/dZ89Ma+LIaIX
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

InternalName: SmartRAM
FileDescription: Monitors and Optimizes memory usage to increase available physical memory.
CompanyName: IObit
Translation: 0x0409 0x04e4

Ransom:Win32/Cerber.L!bit also known as:

BkavW32.AIDetectVM.malware1
Elasticmalicious (high confidence)
MicroWorld-eScanTrojan.Mint.Zamg.O
FireEyeGeneric.mg.9ce7afa5c28d23a6
CAT-QuickHealTrojan.Bunitu
McAfeeRansomware-GCQ!9CE7AFA5C28D
CylanceUnsafe
SangforMalware
K7AntiVirusTrojan ( 0054f2ec1 )
BitDefenderTrojan.Mint.Zamg.O
K7GWTrojan ( 0054f2ec1 )
Cybereasonmalicious.5c28d2
SymantecTrojan.Gen.MBT
APEXMalicious
AvastWin32:Malware-gen
KasperskyHEUR:Trojan-Proxy.Win32.Bunitu.vho
AlibabaRansom:Win32/Cerber.5b7351e4
NANO-AntivirusTrojan.Win32.Zerber.eshymk
ViRobotTrojan.Win32.Z.Zerber.487936
AegisLabTrojan.Win32.Bunitu.h!c
RisingTrojan.Kryptik!1.AD41 (CLASSIC)
Ad-AwareTrojan.Mint.Zamg.O
ComodoTrojWare.Win32.Zonidel.AY@7kn16e
DrWebTrojan.Encoder.4691
VIPRETrojan.Win32.Generic!BT
InvinceaMal/Generic-S
McAfee-GW-EditionBehavesLike.Win32.Generic.gh
SophosMal/Generic-S
IkarusTrojan.Win32.Crypt
JiangminTrojan.Generic.dytgp
AviraHEUR/AGEN.1136373
eGambitUnsafe.AI_Score_99%
MAXmalware (ai score=86)
MicrosoftRansom:Win32/Cerber.L!bit
ArcabitTrojan.Mint.Zamg.O
ZoneAlarmHEUR:Trojan-Proxy.Win32.Bunitu.vho
GDataTrojan.Mint.Zamg.O
AhnLab-V3Trojan/Win32.Cerber.R207554
Acronissuspicious
VBA32Trojan-Ransom.Zerber
ALYacTrojan.Mint.Zamg.O
PandaTrj/CI.A
ESET-NOD32a variant of Win32/Kryptik.GMRW
TencentMalware.Win32.Gencirc.11b04048
SentinelOneDFI – Malicious PE
FortinetW32/Zamg.O!tr
BitDefenderThetaGen:NN.ZexaF.34570.Du0@aS4dIwgj
AVGWin32:Malware-gen
Paloaltogeneric.ml
CrowdStrikewin/malicious_confidence_100% (W)
Qihoo-360Win32/Trojan.Proxy.08a

How to remove Ransom:Win32/Cerber.L!bit?

Ransom:Win32/Cerber.L!bit removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment