Aliases: Win32/Filecoder.Cerber.B (ESET-NOD32); Ransom.Cerber (Malwarebytes); Ransom:Win32/Cerber (Microsoft); Win-Trojan/Cerber.Gen (AhnLab-V3); RANSOM_CERBER(Trend Micro)
Cerber is one of the most widely spread ransomware families, consisting of many different variants, most of them still active to date. Its damage capabilities are extensive, targeting files and databases, and its reach is wide, as this family is part of the most important ransomware-as-a-service platforms.
This Cerber ransomware analysis is based on a representative, specific ransomware variant (having the hash value specified in the corresponding section below). There are other variants that behave similarly, but the details may differ to various extents.
The ransomware spreads via email with a javascript attachment. When executed, the script connects to the internet and downloads the payload that performs the actual encryption process. The payload attacks the files and changes the desktop picture to a ransom note. It creates a ransom note in every folder successfully attacked.
Type: zip
Archive content: Java script (.js extension)
Hash of java script: 5cfc3401a4afe037fc5d43e1ca801d44152509bfb3ba6ca5d0ad32cab73e75f8 – Virustotal report
Payload download URL: h..p://www.caloploerd.top/admin.php?f=1
Network communications – HTTP headers
HTTP headers
Successful payload download
Successful payload download (cached):
Registry changes to Internet Explorer settings
Registry changes to Internet Explorer settings
Modified desktop background
Modified desktop image
File name: mtr98ho8c.exe;
File size: 603 KB;
Hash: 24D829C336777A0DAC903D3860B694984C0CC88DCCB85CA56B128647F156F510.
Ransome note example
Ransom note example
Cerber ransomware is powerful malware that renders data unreadable and demands ransom for its recovery. TEMASOFT Ranstop offers protection against it and other ransomware, including new and zero-day variants.
Find out more about how protect against Cerber and other ransomware or get a free trial of our anti-ransomware technology.
This post was last modified on August 21, 2023 7:27 am
In the digital world, information is often stored and transferred through files. From the most…
Introduction Data security is more important than ever in today's fast-paced digital world. One critical…
Introduction: Cyber threats are a growing concern for businesses and individuals alike. With the increasing…
Microsoft Internet Information Services (IIS) is a popular web server that is widely used to…
File tracking is an important aspect of server administration, and it can help administrators detect…
File monitoring solutions are essential tools for administrators to manage and protect their organizations' data…