- Home
- Detectable Ransomware
- Cerber-2
Ransomware Research
Cerber-2 Ransomware
Cerber-2 is a malicious ransomware strain that encrypts victim files and demands ransom payment for decryption. First observed in the wild on October 1, 2016, this ransomware has been actively targeting systems worldwide.
Quick Facts
- Ransomware Family
- Cerber-2
- First Seen
- October 1, 2016
How Cerber-2 Ransomware Works
File Encryption Patterns
Cerber-2 modifies encrypted files using specific patterns to mark them as encrypted:
File extensions added after encryption:
./\.[a-f0-9]{4}/
..8804
Ransom Note and Payment Demands
After encrypting files, Cerber-2 displays ransom notes demanding payment for file recovery:
/_READ_THI\$_FILE_[A-Z0-F]{4,8}_\.hta$/
Ransom message:
notes/_READ_THI$_FILE_OODDY6P_.hta
Note locations:
EveryFolder
/_READ_THI\$_FILE_[A-Z0-F]{4,8}_\.jpeg$/
Ransom message:
notes/_READ_THI$_FILE_YWN62_.jpeg
Note locations:
EveryFolder
/_HELP_HELP_HELP_[A-Z0-F]{4,8}_\.hta$/
Ransom message:
notes/_HELP_HELP_HELP_EJZU_.hta
Note locations:
EveryFolder
/_HELP_HELP_HELP_[A-Z0-F]{4,8}_\.png$/
Ransom message:
notes/_HELP_HELP_HELP_2W2YM_.png
Note locations:
EveryFolder
/_READ_THI\$_FILE_[A-Z0-F]{4,8}_\.txt$/
Ransom message:
notes/_READ_THI$_FILE_OVR29CE_.txt
Note locations:
EveryFolder
/_R_E_A_D___T_H_I_S___[A-Z0-9]{4,8}_\.hta$/
Ransom message:
notes/_R_E_A_D___T_H_I_S___ROKNJX_.hta
Note locations:
EveryFolder
/_R_E_A_D___T_H_I_S___[A-Z0-9]{4,8}_\.txt$/
Ransom message:
notes/_R_E_A_D___T_H_I_S___7PUZ_.txt
Note locations:
EveryFolder
/^_[A-Z]{6}_README_\.hta$/
Ransom message:
notes/_VKTUBZ_README_.hta
Note locations:
EveryFolder
/^_[A-Z]{6}_README_\.jpg$/
Ransom message:
notes/_VKTUBZ_README_.jpg
Note locations:
EveryFolder
/^_HELP_DECRYPT_[A-Z]{4}\_.hta$/
Ransom message:
notes/_HELP_DECRYPT_ERMZ_.hta
Note locations:
EveryFolder
/^_HELP_DECRYPT_[A-Z]{4}\_.jpg$/
Ransom message:
notes/_HELP_DECRYPT_ERMZ_.jpg
Note locations:
EveryFolder
/^_README_[A-Z0-9]{4,8}_\.hta$/
Ransom message:
notes/_README_0BEU9E_.hta
Note locations:
EveryFolder
/^_README_[A-Z0-9]{4,8}_\.jpg$/
Ransom message:
notes/_README_0BEU9E_.jpg
Note locations:
EveryFolder
_README_.hta
Ransom message:
notes/_README_.hta
Note locations:
EveryFolder
Ransom message:
notes/tmp58BA.jpeg
Note locations:
Desktop
Technical Indicators
Associated Executable Files
The following executable files are associated with Cerber-2 ransomware:
Parameter.exe
chrome_update.exe
Straightness.exe
encrypted.exe
3pKypdB8nN.mht
Acotyledon.exe
a274cab.png
e1b.png
d693.png
de4709440eb4ca2.png
3e45d6ff43.png
8e6fc462782c0.png
2e4bee.png
cb137e229.png
a1.exe
vEER3.7z
SmartRAM.exe
Recovery and Decryption Tools
Good news! Decryption tools are available for Cerber-2 ransomware:
0
Elastio Can Help You
Don't let Cerber-2 ransomware take over your data
Elastio provides advanced ransomware protection and recovery solutions to keep your organization safe.
About This Analysis
This Cerber-2 ransomware analysis is part of Elastio's comprehensive ransomware detection database. Elastio provides advanced ransomware protection and recovery solutions, helping organizations defend against and recover from ransomware attacks like Cerber-2.
Last updated: September 30, 2025
Recent Ransomware
Explore other threats in our database