Ransom Trojan

Trojan-Ransom.Win32.Zerber.gbak removal tips

Malware Removal

The Trojan-Ransom.Win32.Zerber.gbak is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan-Ransom.Win32.Zerber.gbak virus can do?

  • Executable code extraction
  • Creates RWX memory
  • A process attempted to delay the analysis task.
  • Reads data out of its own binary image
  • The binary likely contains encrypted or compressed data.
  • Attempts to modify desktop wallpaper
  • Exhibits behavior characteristic of Cerber ransomware
  • Attempts to execute a binary from a dead or sinkholed URL
  • Exhibits possible ransomware file modification behavior
  • Creates a hidden or system file
  • Attempts to modify proxy settings
  • Attempts to access Bitcoin/ALTCoin wallets
  • Collects information to fingerprint the system
  • Anomalous binary characteristics

How to determine Trojan-Ransom.Win32.Zerber.gbak?


File Info:

crc32: B80B6B9A
md5: ba53b409811f80ed1764f32e0b88b650
name: BA53B409811F80ED1764F32E0B88B650.mlw
sha1: ce60f85da8587d862654307508c0c37452c3f90a
sha256: 38edf98b34a09337f47bdc204601dd6661257325296b204e1f7c364ab5b15585
sha512: 1c5d36d5fb8d74aed27d865493bd40c9a558152688710623b60403c491503c38b7118d6eb0739055295185af5c0cd8f674b56a0ee390439cd97b15c0759f4957
ssdeep: 6144:w9lhUrfSqcNqxhaFtdb55SDb05WqOocQo:wg1paFtRKDb00/LQo
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

0: [No Data]

Trojan-Ransom.Win32.Zerber.gbak also known as:

BkavW32.AIDetect.malware1
K7AntiVirusTrojan ( 0050d3751 )
Elasticmalicious (high confidence)
DrWebTrojan.Encoder.10390
CynetMalicious (score: 100)
CAT-QuickHealRansom.Exxroute.A3
ALYacGen:Heur.Ransom.Cerber.2
CylanceUnsafe
ZillyaTrojan.Zerber.Win32.1751
SangforTrojan.Win32.Save.a
CrowdStrikewin/malicious_confidence_100% (W)
AlibabaRansom:Win32/generic.ali2000010
K7GWTrojan ( 00507a3f1 )
Cybereasonmalicious.9811f8
BaiduWin32.Virus.Virlock.e
CyrenW32/S-93f70758!Eldorado
ESET-NOD32a variant of Win32/Kryptik.FPGU
APEXMalicious
AvastWin32:Filecoder-AY [Trj]
ClamAVWin.Ransomware.Cerber-7406391-0
KasperskyTrojan-Ransom.Win32.Zerber.gbak
BitDefenderGen:Heur.Ransom.Cerber.2
NANO-AntivirusTrojan.Win32.Zerber.emftgv
MicroWorld-eScanGen:Heur.Ransom.Cerber.2
TencentMalware.Win32.Gencirc.10b65aa1
Ad-AwareGen:Heur.Ransom.Cerber.2
SophosML/PE-A + Mal/Elenoocka-E
ComodoTrojWare.Win32.Crypt.C@7vajd0
BitDefenderThetaGen:NN.ZexaF.34608.qmX@aGk3P@ii
VIPRETrojan.Win32.Generic!BT
TrendMicroRansom_CERBER.SM37
McAfee-GW-EditionBehavesLike.Win32.Ransomware.dc
FireEyeGeneric.mg.ba53b409811f80ed
EmsisoftGen:Heur.Ransom.Cerber.2 (B)
SentinelOneStatic AI – Malicious PE
AviraHEUR/AGEN.1116787
MicrosoftRansom:Win32/Cerber.J
ArcabitTrojan.Ransom.Cerber.2
AegisLabTrojan.Win32.Generic.4!c
ZoneAlarmTrojan-Ransom.Win32.Zerber.gbak
GDataGen:Heur.Ransom.Cerber.2
AhnLab-V3Trojan/Win32.Cerber.R196225
Acronissuspicious
McAfeeRansomware-FMJ!BA53B409811F
MAXmalware (ai score=82)
VBA32Hoax.Zerber
MalwarebytesCerber.Ransom.Encrypt.DDS
PandaTrj/Genetic.gen
TrendMicro-HouseCallRansom_CERBER.SM37
RisingTrojan.Kryptik!1.AF6C (CLOUD)
IkarusTrojan-Ransom.Cerber
FortinetW32/Tofsee.BJ!tr
AVGWin32:Filecoder-AY [Trj]
Paloaltogeneric.ml
Qihoo-360Win32/Ransom.Cerber.HxMBGyUA

How to remove Trojan-Ransom.Win32.Zerber.gbak?

Trojan-Ransom.Win32.Zerber.gbak removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment