IncidentResponsev2

4.27 Stop Malware Backdoor

Task

Stop malware backdoor


Conditions

Given:


Standards


End State


Notes


Manual Steps

Step 1 → Run Backdoor Script and Analyzer

Execute PowerShell Script

.\Stop_malware_backdoor.ps1

Run Cerberus.exe with Analyze Mode

Cerberus.exe --analyze

Step 2 → Suspend Identified Malicious Threads

Cerberus.exe --suspend

Step 3 → Kill Malicious Threads

Cerberus.exe --kill

Step 4 → Validate Process and Network Status

Windows
Get-Process
netstat -anob
Linux/macOS (for completeness if backdoor affects multiple OS)
ps aux
ss -tulnp

Running Script

# Example running the backdoor mitigation script
.\Stop_malware_backdoor.ps1

# Example running Cerberus in analyze mode
Cerberus.exe --analyze

# Suspend malicious threads
Cerberus.exe --suspend

# Kill malicious threads
Cerberus.exe --kill

Dependencies


Other Available Tools

Tool Platform Installation Usage
Cerberus.exe Windows Generated by script Malware thread analysis + control
Sysinternals Suite Windows Portable Process, autoruns, and threads monitoring
EDR Solutions (CrowdStrike, SentinelOne) Cross-platform Installed Network and process behavior monitoring
Volatility (optional) Cross-platform Installed Memory analysis if rootkit suspected

Operator Recommendations and Best Practices

Operator Checklist

Best Practices


References


Revision History

Date Version Description Author
2025-05-02 1.1 Merged original manual steps and Cerberus usage with advanced eradication detail and expanded operator workflow Leo