Home Malware Programs Ransomware Cerber 4.0 Ransomware

Cerber 4.0 Ransomware

Posted: October 13, 2016

Threat Metric

Ranking: 8,105
Threat Level: 10/10
Infected PCs: 168,369
First Seen: March 4, 2016
Last Seen: October 16, 2023
OS(es) Affected: Windows

The Cerber 4.0 Ransomware is an update to the Cerber Ransomware family that expands this threat's capacity for encrypting files, as well as changes other, aesthetic details of its ransom-based operation. Malware researchers can confirm that the Cerber 4.0 Ransomware's primary distribution models are using in-browser exploits that con artists are delivering through compromised websites. Since there is no working decryptor for this threat, PC owners should use anti-malware protection to find or remove the Cerber 4.0 Ransomware and backups for data restoration.

A Halloween Fright for Your PC

Despite being illegal, black market software, including various forms of Trojans, have their development and maintenance motivated by finance just as much as ordinary merchandise. The Cerber Ransomware family is one of the most significant threat groupings of Trojan authors racing to meet both the demand for their products by other con artists, as well as the need to outpace modern security solutions. Immediate updates to the family include the Cerber2 Ransomware, Cerber3 Ransomware, and, for October, the Cerber 4.0 Ransomware, among other branches.

Malware experts found few changes to the Cerber 4.0 Ransomware's essential payload, which persists with the business model of encrypting a PC's files and, then, displaying ransom messages expecting you to pay for a decryptor. However, the Cerber 4.0 Ransomware does include a new process-terminating feature for programs such as the Firefox's configuration editor, letting the Trojan close and incorporate them as prospective encryption targets, instead of ignoring them.

The Cerber 4.0 Ransomware also uses a new extension consisting of four randomly-generated characters, potentially confusing any attempts to identify the responsible Trojan. Past versions of the Cerber Ransomware most often use extension strings that identify the Trojan's family (such as '.cerber3'). Another, minor change switches the Cerber 4.0 Ransomware's ransom message to an advanced HTA format, instead of HTML, which gives the message more options for interactivity and text displays.

Taking the Fear out of a Fall's Threat

Other PC security companies have provided utilities for decrypting files encoded by past versions of the Cerber Ransomware, most likely via compromising the back-end infrastructure of the Trojan's campaign. However, since then, the Trojan family's developers have provided multiple updates for the threat, none of which, including the Cerber 4.0 Ransomware, have available decryption solutions publicly. Protecting your computer from the Cerber 4.0 Ransomware's known infection routes, and making frequent backups, are the defenses malware experts recommend as being most reliable.

The Cerber 4.0 Ransomware bases itself on a RaaS (or Ransomware-as-a-Service) business model in which other con artists may pay and distribute the Trojan as they see fit. However, current Cerber 4.0 Ransomware installations focus on delivery methods via exploit kits, including the RIG Exploit Kit, Magnitude, and the Neutrino Exploit Kit. All of these EKs have previous ties to this Trojan's family and can trigger through corrupted Web advertisements, and similar Web content. PC users who patch their software and use anti-malware products with Web protection features should be immune to these drive-by-downloads or be able to delete the Cerber 4.0 Ransomware immediately.

Threats like the Cerber 4.0 Ransomware are not a 'one and done' form of threats. PC operators need to pay just as much attention to updating their security protocols as threat authors do to updating their campaigns, or else they may pay a steep price for being behind the times.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



%ALLUSERSPROFILE%\Readme.hta File name: Readme.hta
Size: 9.07 KB (9077 bytes)
MD5: 8f85ab4bb455ce6d413eff9e9d47a506
Detection count: 126
Mime Type: unknown/hta
Path: %ALLUSERSPROFILE%
Group: Malware file
Last Updated: April 15, 2017
%APPDATA%\README.hta File name: README.hta
Size: 63.11 KB (63113 bytes)
MD5: 777e13c9a5cad4e1d2134d5104188ff6
Detection count: 101
Mime Type: unknown/hta
Path: %APPDATA%
Group: Malware file
Last Updated: April 15, 2017
%APPDATA%\README.hta File name: README.hta
Size: 61.8 KB (61802 bytes)
MD5: c4fff6005b70cccd895082e6c79595b3
Detection count: 84
Mime Type: unknown/hta
Path: %APPDATA%
Group: Malware file
Last Updated: April 15, 2017
%APPDATA%\wP6fT.exe File name: wP6fT.exe
Size: 322.56 KB (322560 bytes)
MD5: 731279e3c09f8e52a849c0a9c1043bb5
Detection count: 72
File type: Executable File
Mime Type: unknown/exe
Path: %APPDATA%
Group: Malware file
Last Updated: July 18, 2017
%APPDATA%\_HELP_HELP_HELP_GLP9_.hta File name: _HELP_HELP_HELP_GLP9_.hta
Size: 75.86 KB (75864 bytes)
MD5: 5f7533c663ddb4c0ae4dbbaafb50d491
Detection count: 60
Mime Type: unknown/hta
Path: %APPDATA%
Group: Malware file
Last Updated: April 15, 2017
%APPDATA%\README.hta File name: README.hta
Size: 63.05 KB (63059 bytes)
MD5: e189ce9640edc95a1ba19d0d4d85691b
Detection count: 56
Mime Type: unknown/hta
Path: %APPDATA%
Group: Malware file
Last Updated: February 24, 2017
%APPDATA%\_HELP_HELP_HELP_SUXEZY_.hta File name: _HELP_HELP_HELP_SUXEZY_.hta
Size: 75.9 KB (75904 bytes)
MD5: 5190e890725bf431ba44001e190c70f5
Detection count: 56
Mime Type: unknown/hta
Path: %APPDATA%
Group: Malware file
Last Updated: April 15, 2017
%APPDATA%\_READ_THI$_FILE_DB3DT9_.hta File name: _READ_THI$_FILE_DB3DT9_.hta
Size: 77.05 KB (77053 bytes)
MD5: 7476a75b0680d99f5338b886bc7def62
Detection count: 54
Mime Type: unknown/hta
Path: %APPDATA%
Group: Malware file
Last Updated: April 15, 2017
file.exe File name: file.exe
Size: 243.74 KB (243748 bytes)
MD5: 212fa73fd6ed39b4720bcfd8d97426d5
Detection count: 46
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: January 26, 2017
%APPDATA%\README.hta File name: README.hta
Size: 63.14 KB (63140 bytes)
MD5: 107ab5eae352dab9defab24d3ba77b4a
Detection count: 42
Mime Type: unknown/hta
Path: %APPDATA%
Group: Malware file
Last Updated: February 24, 2017
%APPDATA%\_HELP_HELP_HELP_2R9I63OS.hta File name: _HELP_HELP_HELP_2R9I63OS.hta
Size: 75.78 KB (75787 bytes)
MD5: a2daec078c54bb6bc5e96038a1506f2c
Detection count: 34
Mime Type: unknown/hta
Path: %APPDATA%
Group: Malware file
Last Updated: April 15, 2017
%APPDATA%\_HELP_HELP_HELP_HUUKTW_.hta File name: _HELP_HELP_HELP_HUUKTW_.hta
Size: 75.86 KB (75864 bytes)
MD5: 0224da72bc3638b351cf509cdfc443c2
Detection count: 30
Mime Type: unknown/hta
Path: %APPDATA%
Group: Malware file
Last Updated: April 15, 2017
%USERPROFILE%\Start Menu\Programs\Startup\_HELP_HELP_HELP_RSHI_.hta File name: _HELP_HELP_HELP_RSHI_.hta
Size: 75.9 KB (75904 bytes)
MD5: a46e5f2ce8a20bbb8548959debb9ac0c
Detection count: 23
Mime Type: unknown/hta
Path: %USERPROFILE%\Start Menu\Programs\Startup
Group: Malware file
Last Updated: April 15, 2017
%USERPROFILE%\Start Menu\Programs\Startup\_HELP_HELP_HELP_STOV8H1_.hta File name: _HELP_HELP_HELP_STOV8H1_.hta
Size: 75.86 KB (75864 bytes)
MD5: 1632ca0953d5499bf251455159a80ea0
Detection count: 14
Mime Type: unknown/hta
Path: %USERPROFILE%\Start Menu\Programs\Startup
Group: Malware file
Last Updated: April 15, 2017
%APPDATA%\_HELP_HELP_HELP_ND8FZ.hta File name: _HELP_HELP_HELP_ND8FZ.hta
Size: 75.78 KB (75787 bytes)
MD5: 041ef4b6a12e0b3165172884301b0d1e
Detection count: 12
Mime Type: unknown/hta
Path: %APPDATA%
Group: Malware file
Last Updated: April 15, 2017
c:\Users\<username>\appdata\roaming\{6b977300-2501-f740-f2c0-799d6aca21c2}\cmdkey.exe File name: cmdkey.exe
Size: 659.58 KB (659585 bytes)
MD5: 27cf39d205567505d840391e4761a7a0
Detection count: 12
File type: Executable File
Mime Type: unknown/exe
Path: c:\Users\<username>\appdata\roaming\{6b977300-2501-f740-f2c0-799d6aca21c2}
Group: Malware file
Last Updated: October 17, 2018
%APPDATA%\_HELP_HELP_HELP_XFCV_.hta File name: _HELP_HELP_HELP_XFCV_.hta
Size: 75.9 KB (75904 bytes)
MD5: 01ec9e50d17de043a23997d6562293ad
Detection count: 7
Mime Type: unknown/hta
Path: %APPDATA%
Group: Malware file
Last Updated: April 15, 2017
%APPDATA%\_HELP_HELP_HELP_3NNARI.hta File name: _HELP_HELP_HELP_3NNARI.hta
Size: 75.78 KB (75787 bytes)
MD5: 0ef13a9213c456db231825061eec294c
Detection count: 5
Mime Type: unknown/hta
Path: %APPDATA%
Group: Malware file
Last Updated: April 15, 2017
%APPDATA%\_HELP_HELP_HELP_L41VV_.hta File name: _HELP_HELP_HELP_L41VV_.hta
Size: 75.86 KB (75864 bytes)
MD5: c63b4a524713e4c5f3802463cb46dab8
Detection count: 5
Mime Type: unknown/hta
Path: %APPDATA%
Group: Malware file
Last Updated: April 15, 2017
%APPDATA%\_READ_THI$_FILE_L81EB65A_.hta File name: _READ_THI$_FILE_L81EB65A_.hta
Size: 77.01 KB (77010 bytes)
MD5: 2a6828d2ba37bb97efb4773619b80715
Detection count: 5
Mime Type: unknown/hta
Path: %APPDATA%
Group: Malware file
Last Updated: April 15, 2017

More files

Registry Modifications

The following newly produced Registry Values are:

File name without path# DECRYPT MY FILES #.html# DECRYPT MY FILES #.url# DECRYPT MY FILES #.vbs_README_.hta
Loading...