Trojan

Trojan:Win32/Cerber!pz removal tips

Malware Removal

The Trojan:Win32/Cerber!pz is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan:Win32/Cerber!pz virus can do?

  • Sample contains Overlay data
  • Creates an indicator observed in Territorial Disputes report SIG40
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Yara rule detections observed from a process memory dump/dropped files/CAPE

How to determine Trojan:Win32/Cerber!pz?


File Info:

name: FF3A1BDA96309BD0FA4D.mlw
path: /opt/CAPEv2/storage/binaries/732e3368db87ffd0d12de903a3e796576647d8339e85ce3e5ebdf0484b0c50be
crc32: DD753B3F
md5: ff3a1bda96309bd0fa4dd5389e4fd703
sha1: c0471f7444806353647cbd83625816c5510b6ab8
sha256: 732e3368db87ffd0d12de903a3e796576647d8339e85ce3e5ebdf0484b0c50be
sha512: 7c6bdb65a76b2dc7682453748cbf4dda4d226a1b75166bff1e3b5abc48a3a897079033029c12c76b3b3602fdc43eba6247b35df2c9ac6673e03dc694ad4706e7
ssdeep: 24576:i5YSwwL2vzecI50+YNpsKv2EvZHp3oWB+:CYSwwL2vKcIKLXZ3+
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T14275CF32F966D532C4C721F522AD1B70E4AEC5FE07338AE3456843E4E2562C356F93A9
sha3_384: e277066aa5f7182817aa76acb2aaf766720b5578402a8b3c215e2a98bd17d89ff4c80aeee0ecaa68c22ee2a244243a2d
ep_bytes: 60909090909067e80000000058909090
timestamp: 2014-05-31 22:06:51

Version Info:

0: [No Data]

Trojan:Win32/Cerber!pz also known as:

BkavW32.AIDetectMalware
Elasticmalicious (high confidence)
DrWebBackDoor.HangUp.43791
MicroWorld-eScanDropped:Backdoor.Padodor.BJ
CAT-QuickHealBackdoor.Berbew.A6.MUE
SkyhighBehavesLike.Win32.Generic.tt
McAfeeTrojan-FVOK!FF3A1BDA9630
MalwarebytesGeneric.Malware.AI.DDS
ZillyaTrojan.PadodorGen.Win32.1
SangforTrojan.Win32.Save.a
K7AntiVirusTrojan ( 005780dd1 )
K7GWTrojan ( 005780dd1 )
Cybereasonmalicious.444806
ArcabitBackdoor.Padodor.BJ
BitDefenderThetaAI:Packer.E1DB93DB21
VirITWorm.Win32.Berbew.G
SymantecBackdoor.Berbew.F
tehtrisGeneric.Malware
ESET-NOD32a variant of Win32/Padodor.NAX
CynetMalicious (score: 100)
APEXMalicious
ClamAVWin.Trojan.Obfus-38
KasperskyTrojan-Proxy.Win32.Qukart.gen
BitDefenderDropped:Backdoor.Padodor.BJ
NANO-AntivirusTrojan.Win32.Qukart.fokxzm
AvastWin32:TrojanX-gen [Trj]
TencentTrojan.Win32.Pornoasset.a
EmsisoftDropped:Backdoor.Padodor.BJ (B)
F-SecureTrojan.TR/Crypt.XDR.Gen
BaiduWin32.Trojan-Spy.Quart.a
VIPREDropped:Backdoor.Padodor.BJ
Trapminemalicious.high.ml.score
FireEyeGeneric.mg.ff3a1bda96309bd0
SophosTroj/Agent-BGRP
SentinelOneStatic AI – Malicious PE
JiangminTrojanProxy.Qukart.axk
VaristW32/Agent.HJI.gen!Eldorado
AviraTR/Crypt.XDR.Gen
MAXmalware (ai score=83)
Antiy-AVLTrojan[Proxy]/Win32.Qukart.gen
Kingsoftmalware.kb.a.1000
MicrosoftTrojan:Win32/Cerber!pz
ZoneAlarmTrojan-Proxy.Win32.Qukart.gen
GDataWin32.Trojan.PSE.11RRK8R
GoogleDetected
AhnLab-V3Win-Trojan/Berbew.51712
Acronissuspicious
VBA32BScope.Backdoor.Berbew
ALYacDropped:Backdoor.Padodor.BJ
TACHYONBackdoor/W32.Padodor
Cylanceunsafe
PandaTrj/Genetic.gen
RisingBackdoor.Berbew!1.AE0A (CLASSIC)
YandexTrojan.PR.Qukart!7x4N/APncCU
IkarusTrojan.Crypt
MaxSecureProxy.Qukart.gen
FortinetW32/Qukart.A!tr
AVGWin32:TrojanX-gen [Trj]
DeepInstinctMALICIOUS
CrowdStrikewin/malicious_confidence_100% (D)

How to remove Trojan:Win32/Cerber!pz?

Trojan:Win32/Cerber!pz removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment