Cerber-2 is a malicious ransomware strain that encrypts victim files and demands ransom payment for decryption. First observed in the wild on October 1, 2016, this ransomware has been actively targeting systems worldwide.
Quick Facts
Ransomware Family
Cerber-2
First Seen
October 1, 2016
How Cerber-2 Ransomware Works
Targeted Files
https://www.hybrid-analysis.com/sample/9124179c56e7b046b769666cace9949b67360af2b769fd730a41b6825559ff54/587eb1dd54a0ade0f1897d06
b72628c56d9040ed439877bdd52507b8614dad8b1240d84f5faef6362a9dfa22 -> doesnt work
File Encryption Patterns
Cerber-2 modifies encrypted files using specific patterns to mark them as encrypted:
File extensions added after encryption:
./\.[a-f0-9]{4}/..8804
Ransom Note and Payment Demands
After encrypting files, Cerber-2 displays ransom notes demanding payment for file recovery:
file/_READ_THI\$_FILE_[A-Z0-F]{4,8}_\.hta$/
Ransom message:
notes/_READ_THI$_FILE_OODDY6P_.hta
Note locations:
EveryFolder
file/_READ_THI\$_FILE_[A-Z0-F]{4,8}_\.jpeg$/
Ransom message:
notes/_READ_THI$_FILE_YWN62_.jpeg
Note locations:
EveryFolder
file/_HELP_HELP_HELP_[A-Z0-F]{4,8}_\.hta$/
Ransom message:
notes/_HELP_HELP_HELP_EJZU_.hta
Note locations:
EveryFolder
file/_HELP_HELP_HELP_[A-Z0-F]{4,8}_\.png$/
Ransom message:
notes/_HELP_HELP_HELP_2W2YM_.png
Note locations:
EveryFolder
file/_READ_THI\$_FILE_[A-Z0-F]{4,8}_\.txt$/
Ransom message:
notes/_READ_THI$_FILE_OVR29CE_.txt
Note locations:
EveryFolder
file/_R_E_A_D___T_H_I_S___[A-Z0-9]{4,8}_\.hta$/
Ransom message:
notes/_R_E_A_D___T_H_I_S___ROKNJX_.hta
Note locations:
EveryFolder
file/_R_E_A_D___T_H_I_S___[A-Z0-9]{4,8}_\.txt$/
Ransom message:
notes/_R_E_A_D___T_H_I_S___7PUZ_.txt
Note locations:
EveryFolder
file/^_[A-Z]{6}_README_\.hta$/
Ransom message:
notes/_VKTUBZ_README_.hta
Note locations:
EveryFolder
file/^_[A-Z]{6}_README_\.jpg$/
Ransom message:
notes/_VKTUBZ_README_.jpg
Note locations:
EveryFolder
file/^_HELP_DECRYPT_[A-Z]{4}\_.hta$/
Ransom message:
notes/_HELP_DECRYPT_ERMZ_.hta
Note locations:
EveryFolder
file/^_HELP_DECRYPT_[A-Z]{4}\_.jpg$/
Ransom message:
notes/_HELP_DECRYPT_ERMZ_.jpg
Note locations:
EveryFolder
file/^_README_[A-Z0-9]{4,8}_\.hta$/
Ransom message:
notes/_README_0BEU9E_.hta
Note locations:
EveryFolder
file/^_README_[A-Z0-9]{4,8}_\.jpg$/
Ransom message:
notes/_README_0BEU9E_.jpg
Note locations:
EveryFolder
file_README_.hta
Ransom message:
notes/_README_.hta
Note locations:
EveryFolder
screenshot
Ransom message:
notes/tmp58BA.jpeg
Note locations:
Desktop
Technical Indicators
Associated Executable Files
The following executable files are associated with Cerber-2 ransomware:
Parameter
Parameter.exe
chrome_update.exe
Straightness
Straightness.exe
encrypted.exe
3pKypdB8nN.mht
Acotyledon
Acotyledon.exe
a274cab.png
e1b.png
d693.png
de4709440eb4ca2.png
3e45d6ff43.png
8e6fc462782c0.png
2e4bee.png
cb137e229.png
a1.exe
aa
vEER3.7z
SmartRAM.exe
Recovery and Decryption Tools
Good news! Decryption tools are available for Cerber-2 ransomware:
0
Elastio Can Help You
Don't let Cerber-2 ransomware take over your data
Elastio provides advanced ransomware protection and recovery solutions to keep your organization safe.
This Cerber-2 ransomware analysis is part of Elastio's comprehensive ransomware detection database. Elastio provides advanced ransomware protection and recovery solutions, helping organizations defend against and recover from ransomware attacks like Cerber-2.