Ransom Trojan

Trojan-Ransom.Win32.Zerber.dafm removal instruction

Malware Removal

The Trojan-Ransom.Win32.Zerber.dafm is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan-Ransom.Win32.Zerber.dafm virus can do?

  • Executable code extraction
  • Injection (inter-process)
  • Injection (Process Hollowing)
  • Compression (or decompression)
  • Creates RWX memory
  • A process attempted to delay the analysis task.
  • Reads data out of its own binary image
  • Executed a process and injected code into it, probably while unpacking
  • Attempts to modify desktop wallpaper
  • Exhibits behavior characteristic of Cerber ransomware
  • Attempts to execute a binary from a dead or sinkholed URL
  • Writes a potential ransom message to disk
  • Attempts to modify proxy settings
  • Attempts to access Bitcoin/ALTCoin wallets
  • Collects information to fingerprint the system
  • Anomalous binary characteristics

How to determine Trojan-Ransom.Win32.Zerber.dafm?


File Info:

crc32: 2FA7D15E
md5: a5bd321ea4d04f6bc89f8087da1492fa
name: A5BD321EA4D04F6BC89F8087DA1492FA.mlw
sha1: 3851c16eafc4d619f79d0217006276b23fceaaa0
sha256: 8ce3d8a07daf5bf55e8313a1ea606adf02c25db8949498536bca7c46eab929ca
sha512: 18e2e0af7ae23738ad70f1c675aefc8777f64df830cca0eab884123b7723fc0b2c562ac8243214322f8bb5cb35234ce4c6434768a5ca0067833e935c7ec7e2f2
ssdeep: 6144:V28A9PWXXmzmv8GeFg/18kSEk8r+zjqyuEUiNK:Q8kyXmTS18kSEkGGjtuEUiw
type: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive

Version Info:

0: [No Data]

Trojan-Ransom.Win32.Zerber.dafm also known as:

BkavW32.AIDetect.malware1
K7AntiVirusTrojan ( 005089571 )
Elasticmalicious (high confidence)
DrWebTrojan.Encoder.10464
CynetMalicious (score: 100)
ALYacTrojan.GenericKD.4644313
MalwarebytesMalware.AI.3535165494
ZillyaTrojan.GenericKD.Win32.32617
SangforTrojan.Win32.Save.a
CrowdStrikewin/malicious_confidence_100% (W)
AlibabaRansom:Win32/Zerber.fc133993
K7GWTrojan ( 005089571 )
Cybereasonmalicious.ea4d04
CyrenW32/Cerber.WJUF-4543
SymantecRansom.Cerber
ESET-NOD32multiple detections
APEXMalicious
AvastWin32:Malware-gen
ClamAVWin.Ransomware.Cerber-6987218-0
KasperskyTrojan-Ransom.Win32.Zerber.dafm
BitDefenderTrojan.GenericKD.4644313
NANO-AntivirusTrojan.Win32.DMKF.emmkvr
MicroWorld-eScanTrojan.GenericKD.4644313
TencentWin32.Trojan.Raas.Auto
Ad-AwareTrojan.GenericKD.4644313
SophosMal/Cerber-Z
ComodoMalware@#1xk1xy5dm3dvx
BitDefenderThetaGen:NN.ZedlaF.34608.cq4@aysPe5b
VIPRETrojan.Win32.Generic!BT
TrendMicroTROJ_FRS.0NA003CK17
McAfee-GW-EditionBehavesLike.Win32.ICLoader.dc
FireEyeGeneric.mg.a5bd321ea4d04f6b
EmsisoftTrojan-Ransom.Cerber (A)
WebrootW32.Malware.Gen
AviraHEUR/AGEN.1116898
eGambitGeneric.Malware
KingsoftWin32.Troj.Generic_a.a.(kcloud)
MicrosoftRansom:Win32/Cerber!rfn
AegisLabTrojan.Win32.Zerber.j!c
GDataTrojan.GenericKD.4644313
TACHYONRansom/W32.Cerber.237507
AhnLab-V3Trojan/Win32.Cerber.R196650
McAfeeArtemis!A5BD321EA4D0
MAXmalware (ai score=83)
PandaTrj/CI.A
TrendMicro-HouseCallTROJ_FRS.0NA003CK17
RisingRansom.Cerber!8.3058 (CLOUD)
YandexTrojan.Injector!LU2nnlhhDpE
FortinetW32/Injector.DMKF!tr
AVGWin32:Malware-gen
Paloaltogeneric.ml
Qihoo-360Win32/Ransom.Cerber.HyoD2JsA

How to remove Trojan-Ransom.Win32.Zerber.dafm?

Trojan-Ransom.Win32.Zerber.dafm removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment