Ransom Trojan

About “Trojan.Ransom.Cerber.ZR (B)” infection

Malware Removal

The Trojan.Ransom.Cerber.ZR (B) is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Ransom.Cerber.ZR (B) virus can do?

  • Executable code extraction
  • Compression (or decompression)
  • PlugX
  • Attempts to connect to a dead IP:Port (4 unique times)
  • Enumerates user accounts on the system
  • Creates RWX memory
  • A process attempted to delay the analysis task.
  • Reads data out of its own binary image
  • Creates an excessive number of UDP connection attempts to external IP addresses
  • Performs some HTTP requests
  • Attempts to modify desktop wallpaper
  • Exhibits behavior characteristic of Cerber ransomware
  • Attempts to execute a binary from a dead or sinkholed URL
  • Creates a hidden or system file
  • Attempts to modify proxy settings
  • Attempts to access Bitcoin/ALTCoin wallets
  • Collects information to fingerprint the system
  • Anomalous binary characteristics

Related domains:

api.blockcypher.com
btc.blockr.io
bitaps.com
chain.so
ocsp.digicert.com

How to determine Trojan.Ransom.Cerber.ZR (B)?


File Info:

crc32: 0D364634
md5: a6dc2b1d697eda90d185ae4661f3728c
name: A6DC2B1D697EDA90D185AE4661F3728C.mlw
sha1: 3a8ab74192be0361351cc2eb36ad6dfd6f06ef56
sha256: a2e9ac2714b54c7cbb5404298196941781f67b435f711028596634750f851dfb
sha512: 6ba79f2787bcb4af2408a373fe10e747204169ee272f054592db8b9ed118359939cbdb9fa9b3fcaf510c74afd95dd91bbf32b67e8a6aef167e0d119d9d756955
ssdeep: 6144:jGC7W7BU9pVgmFsWNMv1lhksMeNm5gwz6O5MUct1jxINdFUsWNMk:Ba7gMDv1Lc5gwJTctbIHlk
type: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive

Version Info:

0: [No Data]

Trojan.Ransom.Cerber.ZR (B) also known as:

BkavW32.AIDetect.malware2
Elasticmalicious (high confidence)
MicroWorld-eScanTrojan.Ransom.Cerber.ZR
FireEyeGeneric.mg.a6dc2b1d697eda90
Qihoo-360Win32/Ransom.Cerber.HyoDMc0A
McAfeeArtemis!A6DC2B1D697E
CylanceUnsafe
VIPRETrojan.Win32.Generic!BT
SangforTrojan.Win32.Generic.ky
CrowdStrikewin/malicious_confidence_100% (D)
BitDefenderTrojan.Ransom.Cerber.ZR
K7GWTrojan ( 00503d011 )
K7AntiVirusTrojan ( 00503d011 )
SymantecRansom.Cerber
APEXMalicious
Paloaltogeneric.ml
ClamAVWin.Ransomware.Cerber-9168474-0
KasperskyHEUR:Trojan-Ransom.Win32.Zerber.gen
AlibabaTrojan:Win32/Injector.6054eb2c
NANO-AntivirusTrojan.Nsis.Zerber.elfdwn
AegisLabTrojan.Win32.Generic.4!c
TencentWin32.Trojan.Raas.Auto
Ad-AwareTrojan.Ransom.Cerber.ZR
EmsisoftTrojan.Ransom.Cerber.ZR (B)
F-SecureHeuristic.HEUR/AGEN.1102531
DrWebTrojan.Encoder.4691
ZillyaTrojan.Ransom.Win32.1467
McAfee-GW-EditionBehavesLike.Win32.ObfusRansom.dc
SophosML/PE-A + Mal/Cerber-AA
IkarusTrojan.NSIS.Injector
AviraHEUR/AGEN.1102531
MicrosoftRansom:Win32/Cerber!rfn
ArcabitTrojan.Ransom.Cerber.ZR
SUPERAntiSpywareRansom.Cerber/Variant
ZoneAlarmHEUR:Trojan-Ransom.Win32.Zerber.gen
GDataTrojan.Ransom.Cerber.ZR
CynetMalicious (score: 100)
AhnLab-V3Trojan/Win32.Cerber.R194466
ALYacTrojan.Ransom.Cerber.ZR
MAXmalware (ai score=100)
MalwarebytesMalware.AI.1796488274
PandaTrj/CI.A
ESET-NOD32NSIS/Injector.SJ
SentinelOneStatic AI – Suspicious PE
FortinetW32/Injector.TD!tr
AVGWin32:Trojan-gen
AvastWin32:Trojan-gen

How to remove Trojan.Ransom.Cerber.ZR (B)?

Trojan.Ransom.Cerber.ZR (B) removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment