Ransom Trojan

Trojan-Ransom.Win32.Zerber.mp removal instruction

Malware Removal

The Trojan-Ransom.Win32.Zerber.mp is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan-Ransom.Win32.Zerber.mp virus can do?

  • Executable code extraction
  • Enumerates user accounts on the system
  • Creates RWX memory
  • A process attempted to delay the analysis task.
  • A process created a hidden window
  • Drops a binary and executes it
  • The executable is likely packed with VMProtect
  • Uses Windows utilities for basic functionality
  • Attempts to delete volume shadow copies
  • Attempts to repeatedly call a single API many times in order to delay analysis time
  • Modifies boot configuration settings
  • Creates or sets a registry key to a long series of bytes, possibly to store a binary or malware config
  • Mimics the file times of a Windows system file
  • Installs itself for autorun at Windows startup
  • Creates a hidden or system file
  • Checks the version of Bios, possibly for anti-virtualization
  • Creates a copy of itself
  • Anomalous binary characteristics
  • Uses suspicious command line tools or Windows utilities

How to determine Trojan-Ransom.Win32.Zerber.mp?


File Info:

crc32: 4D05A546
md5: e30b1904b551c8dbbebd871a41c06228
name: E30B1904B551C8DBBEBD871A41C06228.mlw
sha1: 244685e9d50098705d6ae4260fbd2ef27b2dc77e
sha256: 709b3640ba012b888dc75bc60d809ff88d068160a716be0c112d9078212bc3e3
sha512: 3260f7363da02946658e442271ef14890963b6385eba6433ca3e25416826ebd332f4d02d41caa84b4bced64667fcad2320a6df37a392ed71dc2ef86e42399778
ssdeep: 6144:bCCHukeiI47R90GZ0ZEGRFn0fwW1KfQN1//DSvVL:bekeiIg9fKD0R1DwVL
type: PE32 executable (GUI) Intel 80386, for MS Windows

Version Info:

LegalCopyright: Copyright Nevers
InternalName: perspire
FileVersion: 11.3
CompanyName: Nevers
ProductName: perspire vet hubris
ProductVersion: 11.3
FileDescription: perspire wush unism
OriginalFilename: perspire.exe
Translation: 0x0409 0x04b0

Trojan-Ransom.Win32.Zerber.mp also known as:

K7AntiVirusTrojan ( 0055e3ef1 )
LionicTrojan.Win32.Zerber.j!c
Elasticmalicious (high confidence)
DrWebTrojan.Encoder.4395
CynetMalicious (score: 100)
CAT-QuickHealRansom.Cerber.A5
ALYacTrojan.Ransom.Cerber
CylanceUnsafe
ZillyaTrojan.Zerber.Win32.1323
CrowdStrikewin/malicious_confidence_90% (D)
K7GWTrojan ( 0055e3ef1 )
Cybereasonmalicious.9d5009
SymantecW32.Patched!gen
ESET-NOD32Win32/Filecoder.Cerber.B
APEXMalicious
AvastWin32:Trojan-gen
KasperskyTrojan-Ransom.Win32.Zerber.mp
NANO-AntivirusTrojan.Win32.Encoder.edlyxm
TencentMalware.Win32.Gencirc.114bf786
SophosML/PE-A
ComodoMalware@#m7k9f2ohxijq
BitDefenderThetaGen:NN.ZexaF.34142.uG0@aaRws7oi
VIPRETrojan.Win32.Generic!BT
TrendMicroRansom_CERBER.CBQ165A
McAfee-GW-EditionArtemis!Trojan
FireEyeGeneric.mg.e30b1904b551c8db
SentinelOneStatic AI – Malicious PE
JiangminTrojan.Zerber.cd
AviraHEUR/AGEN.1121409
eGambitUnsafe.AI_Score_87%
Antiy-AVLTrojan/Generic.ASMalwS.19D6731
KingsoftWin32.Troj.Generic_a.a.(kcloud)
MicrosoftRansom:Win32/Cerber
AhnLab-V3Trojan/Win32.Cerber.C1416112
McAfeeArtemis!E30B1904B551
VBA32BScope.Trojan.Downloader
PandaTrj/GdSda.A
TrendMicro-HouseCallRansom_CERBER.CBQ165A
YandexTrojan.Zerber!nWFXWQO/iqs
IkarusTrojan.Win32.Filecoder
FortinetW32/Kryptik.EYKI!tr
AVGWin32:Trojan-gen
Paloaltogeneric.ml

How to remove Trojan-Ransom.Win32.Zerber.mp?

Trojan-Ransom.Win32.Zerber.mp removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment