Ransom Trojan

Trojan.Ransom.Cerber.ZC malicious file

Malware Removal

The Trojan.Ransom.Cerber.ZC is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Ransom.Cerber.ZC virus can do?

  • Executable code extraction
  • Creates RWX memory
  • A process created a hidden window
  • Unconventionial binary language: Chinese (Simplified)
  • Unconventionial language used in binary resources: Chinese (Simplified)
  • Uses Windows utilities for basic functionality
  • Installs itself for autorun at Windows startup
  • Attempts to identify installed AV products by registry key

How to determine Trojan.Ransom.Cerber.ZC?


File Info:

crc32: A486D133
md5: caf1ce22ad52a68613ec99b03fa3a276
name: CAF1CE22AD52A68613EC99B03FA3A276.mlw
sha1: 906a33e1de4bb24ed2c5bbee7a4afcf8a6215645
sha256: d49c2d2b9feb82b098d5cb8a2e7d669e0327670fb9e85c765cda84b8c15b824c
sha512: e2c994d333b4cc147b21775ec511af11dcb4ec48184434696f78d5b4168b01c2cf4a19f9de582f6e24302aef82b6aa1f1d3afe548cbc0aa45086b20590438f97
ssdeep: 6144:wpM651NxVocxbsEGF9t4SOzcOZnQH66CH5csADCPzJGNA2LQL0fz53QkI+svUw4:+HeIbst2zcOGCysAD8Gy2LQL0r5TsHP
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

LegalCopyright: Copyright (C) 2005-2015
InternalName:
FileVersion: 1.0.0.52
CompanyName: IObit
LegalTrademarks: IObit
Comments:
ProductName: Advanced SystemCare8
ProductVersion: 1.0.0.0
FileDescription: Startup Manager Delay Load
OriginalFilename: delayload.exe
Translation: 0x0804 0x03a8

Trojan.Ransom.Cerber.ZC also known as:

BkavW32.AIDetect.malware2
K7AntiVirusTrojan ( 005146b81 )
Elasticmalicious (high confidence)
DrWebTrojan.Siggen7.26801
CynetMalicious (score: 100)
ALYacTrojan.Ransom.Cerber.ZC
CylanceUnsafe
ZillyaTrojan.Yakes.Win32.65431
SangforTrojan.Win32.Save.a
CrowdStrikewin/malicious_confidence_100% (W)
AlibabaTrojan:Win32/Bunitu.ali1000105
K7GWTrojan ( 005146b81 )
Cybereasonmalicious.2ad52a
CyrenW32/Yakes.BD.gen!Eldorado
SymantecPacked.Generic.459
ESET-NOD32a variant of Win32/Kryptik.FVNC
APEXMalicious
AvastWin32:Malware-gen
KasperskyHEUR:Trojan.Win32.Generic
BitDefenderTrojan.Ransom.Cerber.ZC
NANO-AntivirusTrojan.Win32.Yakes.ervguh
MicroWorld-eScanTrojan.Ransom.Cerber.ZC
TencentMalware.Win32.Gencirc.10b27baa
Ad-AwareTrojan.Ransom.Cerber.ZC
SophosMal/Generic-R + Mal/Cerber-AL
ComodoTrojWare.Win32.Yakes.FTU@778lll
BitDefenderThetaGen:NN.ZexaF.34628.Mq0@aOnZENcb
VIPRETrojan.Win32.Generic!BT
TrendMicroRansom_HPCERBER.SMALY5B
McAfee-GW-EditionBehavesLike.Win32.Ransomware.jm
FireEyeGeneric.mg.caf1ce22ad52a686
EmsisoftTrojan.Ransom.Cerber.ZC (B)
SentinelOneStatic AI – Malicious PE
JiangminTrojan.Generic.eakis
AviraHEUR/AGEN.1115794
eGambitUnsafe.AI_Score_97%
MicrosoftTrojanProxy:Win32/Bunitu.Q!bit
ArcabitTrojan.Ransom.Cerber.ZC
AegisLabHacktool.Win32.Krap.lKMc
GDataWin32.Trojan-Ransom.Locky.DV
AhnLab-V3Win-Trojan/Lukitus2.Exp
Acronissuspicious
McAfeeRansomware-GCQ!CAF1CE22AD52
MAXmalware (ai score=100)
VBA32Trojan.Yakes
MalwarebytesQbot.Backdoor.Stealer.DDS
PandaTrj/GdSda.A
TrendMicro-HouseCallRansom_HPCERBER.SMALY5B
RisingTrojan.Kryptik!1.AD43 (CLOUD)
IkarusTrojan-Proxy.Agent
FortinetW32/GenKryptik.ESWN!tr
AVGWin32:Malware-gen
Qihoo-360Win32/Ransom.Cerber.HxQBP00A

How to remove Trojan.Ransom.Cerber.ZC?

Trojan.Ransom.Cerber.ZC removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment