Ransom Trojan

Trojan-Ransom.Win32.Zerber.ferp information

Malware Removal

The Trojan-Ransom.Win32.Zerber.ferp is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan-Ransom.Win32.Zerber.ferp virus can do?

  • Executable code extraction
  • Enumerates user accounts on the system
  • Creates RWX memory
  • A process attempted to delay the analysis task.
  • A process created a hidden window
  • The binary likely contains encrypted or compressed data.
  • The executable is compressed using UPX
  • Uses Windows utilities for basic functionality
  • Attempts to delete volume shadow copies
  • Attempts to repeatedly call a single API many times in order to delay analysis time
  • Creates or sets a registry key to a long series of bytes, possibly to store a binary or malware config
  • Mimics the file times of a Windows system file
  • Installs itself for autorun at Windows startup
  • Creates a hidden or system file
  • Uses suspicious command line tools or Windows utilities

How to determine Trojan-Ransom.Win32.Zerber.ferp?


File Info:

crc32: D62C15A6
md5: afa77b9e8af6a82b8882b945728a7c7b
name: AFA77B9E8AF6A82B8882B945728A7C7B.mlw
sha1: 72c12f0b6031a5b526c5807bb98a5f9f721d3442
sha256: a732a1ade5b4ff7ddd606afd04477ce138d8c918fe3f3081cc7071267e4b797f
sha512: 62ece83d59e61972a63b02aadcfbba8ddcb4ce58bcc0f5dc20547d41b3f778a7f77629e4553353ea50371e713966ba88d186cf12a0ac837993b31d7d4c36e5f8
ssdeep: 3072:XbDkLBEMHGR9oNLCW43wB3mdbZJIVKsop3muiNLEiO328vXXDaNyNNXSZxu5Ubc:XbotEkG7qWWRB3ylJI4so4nNLEj320n
type: PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed

Version Info:

LegalCopyright: Copyright xa9 Iroquois Sic
InternalName: girn
FileVersion: 10.10.0.0
CompanyName: Iroquois Sic
ProductName: girn scurriours
ProductVersion: 10.10.0.0
FileDescription: girn bite glents
OriginalFilename: girn.exe
Translation: 0x0409 0x04b0

Trojan-Ransom.Win32.Zerber.ferp also known as:

BkavW32.AIDetect.malware2
K7AntiVirusTrojan ( 0051c8bc1 )
Elasticmalicious (high confidence)
DrWebTrojan.Encoder.4691
CynetMalicious (score: 100)
CAT-QuickHealTrojanRansom.Zerber
CylanceUnsafe
SangforTrojan.Win32.Save.a
CrowdStrikewin/malicious_confidence_90% (W)
AlibabaRansom:Win32/Zerber.cf0bcb68
K7GWTrojan ( 0051c8bc1 )
Cybereasonmalicious.b6031a
CyrenW32/S-fb71d293!Eldorado
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Kryptik.EYLT
APEXMalicious
AvastWin32:Malware-gen
KasperskyTrojan-Ransom.Win32.Zerber.ferp
NANO-AntivirusTrojan.Win32.Zerber.evdasf
TencentWin32.Trojan.Zerber.Lqyp
SophosMal/Generic-S
ComodoMalware@#9vliq2mu1plg
BitDefenderThetaGen:NN.ZexaF.34722.km0@aapFOohi
VIPRETrojan.Win32.Generic!BT
McAfee-GW-EditionArtemis!Trojan
FireEyeGeneric.mg.afa77b9e8af6a82b
SentinelOneStatic AI – Malicious PE
JiangminTrojan.Zerber.dur
AviraHEUR/AGEN.1113906
Antiy-AVLTrojan/Generic.ASMalwS.22B90F1
MicrosoftRansom:Win32/Cerber.A
AegisLabTrojan.Win32.Zerber.j!c
AhnLab-V3Trojan/Win32.Zerber.C2371320
McAfeeArtemis!AFA77B9E8AF6
MAXmalware (ai score=100)
VBA32BScope.TrojanRansom.Zerber
PandaTrj/GdSda.A
RisingTrojan.Generic@ML.99 (RDML:vuj8XlqXqBEDbPRcUe9t0g)
YandexTrojan.GenAsa!ejMF5GuyCmQ
IkarusTrojan.Win32.Crypt
FortinetW32/Kryptik.EYKI!tr
AVGWin32:Malware-gen
Paloaltogeneric.ml

How to remove Trojan-Ransom.Win32.Zerber.ferp?

Trojan-Ransom.Win32.Zerber.ferp removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment