Ransom Trojan

About “Trojan-Ransom.Win32.Zerber.lr” infection

Malware Removal

The Trojan-Ransom.Win32.Zerber.lr is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan-Ransom.Win32.Zerber.lr virus can do?

  • Executable code extraction
  • Attempts to connect to a dead IP:Port (1 unique times)
  • Enumerates user accounts on the system
  • Creates RWX memory
  • A process attempted to delay the analysis task.
  • A process created a hidden window
  • Drops a binary and executes it
  • Creates an excessive number of UDP connection attempts to external IP addresses
  • Uses Windows utilities for basic functionality
  • Attempts to delete volume shadow copies
  • Attempts to repeatedly call a single API many times in order to delay analysis time
  • Modifies boot configuration settings
  • Exhibits behavior characteristic of Cerber ransomware
  • Creates or sets a registry key to a long series of bytes, possibly to store a binary or malware config
  • Mimics the file times of a Windows system file
  • Installs itself for autorun at Windows startup
  • Creates a hidden or system file
  • EternalBlue behavior
  • Checks the version of Bios, possibly for anti-virtualization
  • Creates a copy of itself
  • Attempts to create or modify system certificates
  • Generates some ICMP traffic
  • Anomalous binary characteristics
  • Uses suspicious command line tools or Windows utilities

Related domains:

z.whorecord.xyz
a.tomx.xyz

How to determine Trojan-Ransom.Win32.Zerber.lr?


File Info:

crc32: DEB8BE5F
md5: 747e0d1badd6624dc094bf1b858c3237
name: 747E0D1BADD6624DC094BF1B858C3237.mlw
sha1: d1733de177afb1261dea49db963b9bc13dc7da5e
sha256: 30e32619008362cda94ad1bdc846e787f02f61ec59b2b0785b1948d05da56355
sha512: c682ee3ebe0fe9644c22c63e703e7d58378d391a2edacd75ab416121b7ddd04d830c41888c19c7f5ecff3ef9f6bf9633fb892c8df2a64847e3b1655ddccb0e45
ssdeep: 6144:HSJ0B2RIb5gaZBI7iBEpfNrcTJGcYhd8WBv+N4rFUpw:+0AqWaw7BNOGVhOWBvm45UO
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

0: [No Data]

Trojan-Ransom.Win32.Zerber.lr also known as:

BkavW32.AIDetect.malware2
K7AntiVirusTrojan ( 004ef0fd1 )
Elasticmalicious (high confidence)
DrWebTrojan.Encoder.4394
CynetMalicious (score: 100)
CylanceUnsafe
ZillyaTrojan.Filecoder.Win32.2295
CrowdStrikewin/malicious_confidence_100% (D)
K7GWTrojan ( 004ef0fd1 )
Cybereasonmalicious.177afb
SymantecRansom.Cerber!g2
ESET-NOD32Win32/Filecoder.Cerber.B
APEXMalicious
AvastWin32:Trojan-gen
KasperskyTrojan-Ransom.Win32.Zerber.lr
NANO-AntivirusTrojan.Win32.Filecoder.ebmtkc
TencentMalware.Win32.Gencirc.10c113ba
SophosMal/Generic-S
BitDefenderThetaGen:NN.ZexaF.34126.ruX@aWLHyUni
VIPRETrojan.Win32.Generic!BT
McAfee-GW-EditionBehavesLike.Win32.Generic.dh
FireEyeGeneric.mg.747e0d1badd6624d
SentinelOneStatic AI – Suspicious PE
JiangminTrojan.Zerber.g
AviraHEUR/AGEN.1120265
Antiy-AVLTrojan/Generic.ASMalwS.1806F86
KingsoftWin32.Troj.Undef.(kcloud)
MicrosoftRansom:Win32/Cerber
AhnLab-V3Trojan/Win32.Cerber.C1370972
McAfeeRansomware-FIX!747E0D1BADD6
VBA32SScope.TrojanRansom.WannaCry
MalwarebytesMachineLearning/Anomalous.100%
PandaTrj/CI.A
YandexTrojan.Filecoder!wHgmirumsdQ
IkarusTrojan.Win32.Filecoder
MaxSecureTrojan.Malware.300983.susgen
FortinetW32/Kryptik.ETWP!tr
AVGWin32:Trojan-gen
Paloaltogeneric.ml

How to remove Trojan-Ransom.Win32.Zerber.lr?

Trojan-Ransom.Win32.Zerber.lr removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment