Ransom Trojan

Trojan.Ransom.Cerber.ZD (B) removal instruction

Malware Removal

The Trojan.Ransom.Cerber.ZD (B) is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Ransom.Cerber.ZD (B) virus can do?

  • Executable code extraction
  • Creates RWX memory
  • A process created a hidden window
  • Unconventionial binary language: Chinese (Simplified)
  • Unconventionial language used in binary resources: Chinese (Simplified)
  • Uses Windows utilities for basic functionality
  • Installs itself for autorun at Windows startup
  • Attempts to identify installed AV products by registry key

How to determine Trojan.Ransom.Cerber.ZD (B)?


File Info:

crc32: F151176C
md5: b17da2db7bc121218c5a55bb24de57f3
name: B17DA2DB7BC121218C5A55BB24DE57F3.mlw
sha1: 09aaadd8eacb49ed8d2a53a2d47d281223d8b5b3
sha256: adc862e66e4dbaf0b2208f81c1202f935d3b3c6df7536ba7c88a6763172d3331
sha512: 25e003043a5f41d29110acc1c7306241b666e9f06c747c4caeb02231abfabd590e6e82f1cbb88dc687f48f96c0641111b5ef8362f2ca393b63fc5309a6854442
ssdeep: 6144:8pM651NxVocxbsEGF9t4SOzcOZnrH5csADCPdJGNA2LQL0fz53QkI+svUw4+P:6HeIbst2zcOFysADyGy2LQL0r5TsHP
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

LegalCopyright: Copyright (C) 2005-2015
InternalName:
FileVersion: 1.0.0.52
CompanyName: IObit
LegalTrademarks: IObit
Comments:
ProductName: Advanced SystemCare8
ProductVersion: 1.0.0.0
FileDescription: Startup Manager Delay Load
OriginalFilename: delayload.exe
Translation: 0x0804 0x03a8

Trojan.Ransom.Cerber.ZD (B) also known as:

BkavW32.AIDetect.malware2
K7AntiVirusTrojan ( 005146b81 )
Elasticmalicious (high confidence)
DrWebTrojan.Siggen7.26815
CynetMalicious (score: 100)
ALYacTrojan.Ransom.Cerber.ZD
CylanceUnsafe
ZillyaTrojan.Kryptik.Win32.1256752
SangforTrojan.Win32.Save.a
CrowdStrikewin/malicious_confidence_100% (W)
AlibabaTrojan:Win32/Bunitu.ali1000105
K7GWTrojan ( 005146b81 )
Cybereasonmalicious.b7bc12
CyrenW32/Yakes.BD.gen!Eldorado
SymantecPacked.Generic.459
ESET-NOD32a variant of Win32/Kryptik.FVNG
APEXMalicious
AvastWin32:TrojanX-gen [Trj]
KasperskyHEUR:Trojan.Win32.Generic
BitDefenderTrojan.Ransom.Cerber.ZD
NANO-AntivirusTrojan.Win32.Yakes.ervkna
MicroWorld-eScanTrojan.Ransom.Cerber.ZD
TencentMalware.Win32.Gencirc.10ba6a44
Ad-AwareTrojan.Ransom.Cerber.ZD
SophosML/PE-A + Mal/Cerber-AL
BitDefenderThetaGen:NN.ZexaF.34758.Lq0@amU@cImb
VIPRETrojan.Win32.Generic!BT
TrendMicroRansom_HPCERBER.SMALY5B
McAfee-GW-EditionBehavesLike.Win32.Ransomware.jm
FireEyeGeneric.mg.b17da2db7bc12121
EmsisoftTrojan.Ransom.Cerber.ZD (B)
SentinelOneStatic AI – Malicious PE
JiangminTrojan.Generic.eakws
WebrootW32.Adware.Installcore
AviraHEUR/AGEN.1129194
Antiy-AVLTrojan/Generic.ASMalwS.217F484
MicrosoftTrojanProxy:Win32/Bunitu.Q!bit
AegisLabHacktool.Win32.Krap.lKMc
GDataWin32.Trojan-Ransom.Locky.DV
AhnLab-V3Win-Trojan/Lukitus2.Exp
Acronissuspicious
McAfeeRansomware-GCQ!B17DA2DB7BC1
MAXmalware (ai score=100)
VBA32Trojan.Yakes
MalwarebytesQbot.Backdoor.Stealer.DDS
PandaTrj/GdSda.A
TrendMicro-HouseCallRansom_HPCERBER.SMALY5B
RisingTrojan.Kryptik!1.AD43 (CLASSIC)
YandexTrojan.GenAsa!tWciU4nnc9k
IkarusTrojan-Proxy.Agent
FortinetW32/GenKryptik.ESWN!tr
AVGWin32:TrojanX-gen [Trj]
Paloaltogeneric.ml

How to remove Trojan.Ransom.Cerber.ZD (B)?

Trojan.Ransom.Cerber.ZD (B) removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment