Ransom Trojan

Should I remove “Trojan.Ransom.Cerber.ZR”?

Malware Removal

The Trojan.Ransom.Cerber.ZR is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Ransom.Cerber.ZR virus can do?

  • Executable code extraction
  • Compression (or decompression)
  • Attempts to connect to a dead IP:Port (4 unique times)
  • Enumerates user accounts on the system
  • Creates RWX memory
  • A process attempted to delay the analysis task.
  • Reads data out of its own binary image
  • Creates an excessive number of UDP connection attempts to external IP addresses
  • Performs some HTTP requests
  • Attempts to modify desktop wallpaper
  • Exhibits behavior characteristic of Cerber ransomware
  • Attempts to execute a binary from a dead or sinkholed URL
  • Creates a hidden or system file
  • Attempts to modify proxy settings
  • Attempts to access Bitcoin/ALTCoin wallets
  • Collects information to fingerprint the system
  • Anomalous binary characteristics

Related domains:

z.whorecord.xyz
a.tomx.xyz
api.blockcypher.com
btc.blockr.io
bitaps.com
chain.so
ocsp.digicert.com

How to determine Trojan.Ransom.Cerber.ZR?


File Info:

crc32: 0D80FC23
md5: cf87186209d3da867e4c4bffb9924854
name: CF87186209D3DA867E4C4BFFB9924854.mlw
sha1: 8e1770d3bbffe43f63890bf0182065945e91cb15
sha256: 4dfc4b5388483b66a25d1f9af8e2017e1439063b3b54c58d1627efa32a9e5e4d
sha512: e85ad35169cd2a56353d74589a540051aafa7882a8d4a56cba3c7b8ba553ef195d4b481dabb7b0dc41adff65aa9ea9a86200be08e667aca7ffa60b3eb74481c4
ssdeep: 6144:jGC7W7BU9pVgmFsWNMv1lhksMeNm5gwz6O5MUct1jxINdFUsWNMf:Ba7gMDv1Lc5gwJTctbIHlf
type: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive

Version Info:

0: [No Data]

Trojan.Ransom.Cerber.ZR also known as:

BkavW32.AIDetect.malware2
Elasticmalicious (high confidence)
DrWebTrojan.Encoder.4691
MicroWorld-eScanTrojan.Ransom.Cerber.ZR
ALYacTrojan.Ransom.Cerber.ZR
CylanceUnsafe
VIPRETrojan.Win32.Generic!BT
SangforTrojan.Win32.Cerber.1
CrowdStrikewin/malicious_confidence_100% (D)
BitDefenderTrojan.Ransom.Cerber.ZR
K7GWTrojan ( 00503d011 )
K7AntiVirusTrojan ( 00503d011 )
SymantecRansom.Cerber
APEXMalicious
AvastWin32:Trojan-gen
ClamAVWin.Ransomware.Cerber-9168474-0
KasperskyHEUR:Trojan-Ransom.Win32.Zerber.gen
AlibabaTrojan:Win32/Injector.362f3893
NANO-AntivirusTrojan.Nsis.Zerber.elfdwn
TencentWin32.Trojan.Raas.Auto
Ad-AwareTrojan.Ransom.Cerber.ZR
EmsisoftTrojan.Ransom.Cerber.ZR (B)
F-SecureHeuristic.HEUR/AGEN.1102531
ZillyaTrojan.Ransom.Win32.1467
McAfee-GW-EditionBehavesLike.Win32.ObfusRansom.dc
FireEyeGeneric.mg.cf87186209d3da86
SophosML/PE-A + Mal/Cerber-AA
SentinelOneStatic AI – Suspicious PE
AviraHEUR/AGEN.1102531
MicrosoftRansom:Win32/Cerber!rfn
ArcabitTrojan.Ransom.Cerber.ZR
SUPERAntiSpywareRansom.Cerber/Variant
ZoneAlarmHEUR:Trojan-Ransom.Win32.Zerber.gen
GDataTrojan.Ransom.Cerber.ZR
CynetMalicious (score: 100)
AhnLab-V3Trojan/Win32.Cerber.R194466
McAfeeArtemis!CF87186209D3
MAXmalware (ai score=82)
VBA32Hoax.Zerber
MalwarebytesMalware.AI.1796488274
PandaTrj/CI.A
ESET-NOD32NSIS/Injector.SJ
IkarusTrojan.NSIS.Injector
FortinetW32/Injector.TD!tr
WebrootW32.Ransom.Gen
AVGWin32:Trojan-gen
Paloaltogeneric.ml
Qihoo-360Win32/Trojan.Ransom.6c1

How to remove Trojan.Ransom.Cerber.ZR?

Trojan.Ransom.Cerber.ZR removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment