Ransom Trojan

Trojan.Ransom.Cerber.TY removal

Malware Removal

The Trojan.Ransom.Cerber.TY is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Ransom.Cerber.TY virus can do?

  • Executable code extraction
  • Creates RWX memory
  • A process created a hidden window
  • The binary likely contains encrypted or compressed data.
  • Uses Windows utilities for basic functionality
  • Attempts to modify desktop wallpaper
  • Deletes its original binary from disk
  • Exhibits behavior characteristic of Cerber ransomware
  • Attempts to execute a binary from a dead or sinkholed URL
  • Writes a potential ransom message to disk
  • Attempts to modify proxy settings
  • Attempts to access Bitcoin/ALTCoin wallets
  • Collects information to fingerprint the system
  • Anomalous binary characteristics
  • Uses suspicious command line tools or Windows utilities

How to determine Trojan.Ransom.Cerber.TY?


File Info:

crc32: CAA008DD
md5: 4ae95bb7f7b0d53c583087074f58f4c1
name: 4AE95BB7F7B0D53C583087074F58F4C1.mlw
sha1: 18766102c980ad8eb22f38b7bdfd88352b9550dd
sha256: 24578d9dfad55c280b363ee5a37f71a1aa2f5cd1388dcc67097caf03ec973782
sha512: 2d3a9ff69b14a4fbf56a1adf6afb6b0e573325a29476ccc2495304ba8b837b81b6d47b5c5871698998a2d090e0b3f4e82ba2b016b4d3eaa86184749aa894315b
ssdeep: 6144:PM5njICh00z3085OnPiPrNnu2B++8jvMbq:U5nEad5i25uY++8
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

0: [No Data]

Trojan.Ransom.Cerber.TY also known as:

BkavW32.AIDetect.malware1
K7AntiVirusTrojan ( 0050ee331 )
Elasticmalicious (high confidence)
DrWebTrojan.Encoder.4691
MicroWorld-eScanTrojan.Ransom.Cerber.TY
CAT-QuickHealRansom.Exxroute.A4
ALYacTrojan.Ransom.Cerber.TY
CylanceUnsafe
ZillyaTrojan.Zerber.Win32.2722
SangforTrojan.Win32.Save.a
CrowdStrikewin/malicious_confidence_100% (D)
AlibabaRansom:Win32/Cerber.432fcdd9
K7GWTrojan ( 0050ee331 )
Cybereasonmalicious.7f7b0d
CyrenW32/Ransom.EW.gen!Eldorado
SymantecPacked.Generic.493
ESET-NOD32a variant of Win32/Kryptik.FSZU
APEXMalicious
AvastWin32:Malware-gen
CynetMalicious (score: 100)
KasperskyHEUR:Trojan.Win32.Generic
BitDefenderTrojan.Ransom.Cerber.TY
NANO-AntivirusTrojan.Win32.Zerber.ezjzfk
TencentMalware.Win32.Gencirc.10b58d40
Ad-AwareTrojan.Ransom.Cerber.TY
SophosML/PE-A + Mal/Elenoocka-E
ComodoTrojWare.Win32.Crypt.C@7vajd0
BitDefenderThetaGen:NN.ZexaF.34678.oqW@aOc!SXbi
VIPREVirTool.Win32.Obfuscator.da!j (v)
TrendMicroRansom_CERBER.SM37
McAfee-GW-EditionBehavesLike.Win32.Generic.dc
FireEyeTrojan.Ransom.Cerber.TY
EmsisoftTrojan.Ransom.Cerber.TY (B)
SentinelOneStatic AI – Malicious PE
JiangminTrojan.Zerber.chb
AviraHEUR/AGEN.1116781
eGambitUnsafe.AI_Score_79%
MicrosoftRansom:Win32/Cerber.L!bit
GDataTrojan.Ransom.Cerber.TY
TACHYONRansom/W32.Cerber.238080.B
AhnLab-V3Trojan/Win32.Zerber.R201720
Acronissuspicious
McAfeeRansomware-FMEU!4AE95BB7F7B0
MAXmalware (ai score=100)
VBA32Trojan.FakeAV.01657
MalwarebytesMachineLearning/Anomalous.100%
PandaTrj/Genetic.gen
TrendMicro-HouseCallRansom_CERBER.SM37
RisingRansom.Firecerb!8.E6D7 (CLOUD)
IkarusTrojan-Ransom.Zerber
FortinetW32/Kryptik.FSNS!tr
AVGWin32:Malware-gen
Paloaltogeneric.ml
Qihoo-360Win32/Ransom.Cerber.HxQBEpsA

How to remove Trojan.Ransom.Cerber.TY?

Trojan.Ransom.Cerber.TY removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment