Ransom Trojan

Trojan.Ransom.Cerber.WQ information

Malware Removal

The Trojan.Ransom.Cerber.WQ is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Ransom.Cerber.WQ virus can do?

  • Executable code extraction
  • Creates RWX memory
  • A process created a hidden window
  • The binary likely contains encrypted or compressed data.
  • Uses Windows utilities for basic functionality
  • Attempts to modify desktop wallpaper
  • Exhibits behavior characteristic of Cerber ransomware
  • Attempts to execute a binary from a dead or sinkholed URL
  • Writes a potential ransom message to disk
  • Attempts to modify proxy settings
  • Attempts to access Bitcoin/ALTCoin wallets
  • Collects information to fingerprint the system
  • Anomalous binary characteristics
  • Uses suspicious command line tools or Windows utilities

How to determine Trojan.Ransom.Cerber.WQ?


File Info:

crc32: 5578C9BA
md5: 25c14adfba65dcf71dca783ff8f04315
name: 25C14ADFBA65DCF71DCA783FF8F04315.mlw
sha1: ccee344e50062bab5d22157c48d4ef9c8be4c05e
sha256: d4853373ec186b8f95b6cd826a2cf05e08e30a51b3c4f4462eed4d5fea6c02cf
sha512: c0b87a356a7b8de1aa0019cf87bf250df7a51cb7e9854e413acb073e3430314de686c2a6fd34822d4a610fa96ccaa4b349a335a6b4864da8643c9a5de79b7f09
ssdeep: 6144:1eYTCVh02wYe05neuOqCr1m6+LpkZTeO7k24:oYT+0T05nNMm6A+ZCH2
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

0: [No Data]

Trojan.Ransom.Cerber.WQ also known as:

BkavW32.AIDetect.malware1
K7AntiVirusTrojan ( 00511fcc1 )
Elasticmalicious (high confidence)
DrWebTrojan.Encoder.12269
CynetMalicious (score: 100)
CAT-QuickHealRansom.Exxroute.A4
McAfeeRansomware-FMEU!25C14ADFBA65
CylanceUnsafe
ZillyaTrojan.Zerber.Win32.2976
SangforTrojan.Win32.Save.a
CrowdStrikewin/malicious_confidence_100% (W)
AlibabaRansom:Win32/generic.ali2000010
K7GWTrojan ( 005100eb1 )
Cybereasonmalicious.fba65d
CyrenW32/Ransom.EW.gen!Eldorado
SymantecPacked.Generic.493
ESET-NOD32a variant of Win32/Kryptik.FTMU
APEXMalicious
AvastWin32:Malware-gen
ClamAVWin.Trojan.Generic-6330102-0
KasperskyHEUR:Trojan.Win32.Generic
BitDefenderTrojan.Ransom.Cerber.WQ
NANO-AntivirusTrojan.Win32.Zerber.eqddkz
MicroWorld-eScanTrojan.Ransom.Cerber.WQ
TencentMalware.Win32.Gencirc.10b74021
Ad-AwareTrojan.Ransom.Cerber.WQ
SophosML/PE-A + Mal/Elenoocka-E
ComodoTrojWare.Win32.Ransom.Cerber.FTKN@7dx0qc
BitDefenderThetaGen:NN.ZexaF.34628.oqW@aKEm3joi
VIPRETrojan.Win32.Generic!BT
TrendMicroRansom_CERBER.SM37
McAfee-GW-EditionBehavesLike.Win32.Ramnit.dc
FireEyeGeneric.mg.25c14adfba65dcf7
EmsisoftTrojan.Ransom.Cerber.WQ (B)
SentinelOneStatic AI – Malicious PE
JiangminTrojan.Zerber.cnx
WebrootW32.Trojan.Dropper
AviraHEUR/AGEN.1116787
MicrosoftRansom:Win32/Cerber
ArcabitTrojan.Ransom.Cerber.WQ
AegisLabTrojan.Win32.Zerber.j!c
GDataTrojan.Ransom.Cerber.WQ
TACHYONRansom/W32.Cerber.233984.B
AhnLab-V3Trojan/Win32.Cerber.R202661
Acronissuspicious
VBA32Trojan.FakeAV.01657
MAXmalware (ai score=100)
MalwarebytesMalware.AI.2706682897
PandaTrj/Genetic.gen
TrendMicro-HouseCallRansom_CERBER.SM37
RisingTrojan.Kryptik!1.AB4F (CLASSIC)
YandexTrojan.GenAsa!udJk5+1Nj2U
IkarusTrojan-Ransom.Zerber
FortinetW32/GenKryptik.APXF!tr
AVGWin32:Malware-gen
Qihoo-360Win32/Ransom.Cerber.HxMBEpsA

How to remove Trojan.Ransom.Cerber.WQ?

Trojan.Ransom.Cerber.WQ removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment