Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Generic User Avatar

Makop-Oled Ransonware (.makop, .origami, .tomas, .zbw. mkp) Support Topic


  • Please log in to reply
150 replies to this topic

#1 samuelvalvassori

samuelvalvassori

  •  Avatar image
  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:02:45 AM

Posted 28 January 2020 - 05:18 PM

Any files that are encrypted with Oled Ransomware will have an email followed by the .oled extension appended to the end of file and typically will leave files (ransom notes) named DECRYPTION.txt as explained here by Amigo-A (Andrew Ivanov).

.[black.mirror@qq.com].oled

Any files that are encrypted with Makop Ransomware will have an [ID random 8 character].<email> followed by the .makop, .CARLOS, .origami, .tomas, .zbw, .zes, .Hidden, .fireee, .captcha, .fair, .moloch, .vassago, .WKSGJ, .pecunia, .ID2020, .dark, .XDQD, .harmagedon, .code, .mkp, .phmqdw, .session, .ZFX, .stolen, .rajah, .read, .SOG, .chocolate, .rocklee, .reload, .datah extension appended to the end of file and typically will leave files (ransom notes) named README_WARNING_.txt, RESTORE_FILES_INFO.txt, +README-WARNING+.txt as explained here by Amigo-A (Andrew Ivanov). These are a few examples.

.[EFC17099].[makop@airmail.cc].makop
.[16A95E8C].[Carlosrestore2020@aol.com].CARLOS
.[9539E0E8].[KILLYOUASS@protonmail.com].zbw
.[4B2E4630].[Johncastle@msgsafe.io].zes
.[4B2E4630].[Garantos@mailfence.com].captcha
.[1f5bb265].[Moloch_helpdesk@tutanota.com].moloch
.[EC3B84551.[emcryptsupport@msgsafe.io].mkp
.[E574F644].[Dekrypt24@tutanota.com].mkp
.[2AF20FA3].[reload2024@outlook.com].reload

 
 
 
Hello guys, i have problem in the my network .
my server has been hacked and the data encrypted by this .makop ransonware is posting the rescue txt files and some encrypted files. if someone can help me, thank you, because these data are government data where I take care of the IT part.

arquive extension exemploe AD DENTARIA 2.pdf.[EFC17099].[makop@airmail.cc].makop

thank you for your attention and thank you who can help.

Attached Files



BC AdBot (Login to Remove)

 


#2 quietman7

quietman7

    Bleepin' Gumshoe


  •  Avatar image
  • Global Moderator
  • 61,920 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:01:45 AM

Posted 28 January 2020 - 06:56 PM

Did you submit (upload) samples of encrypted files, ransom notes and any contact email addresses or hyperlinks provided by the cyber-criminals to ID Ransomware (IDR) OR Emsisoft Identify your ransomware for assistance with identification and confirmation of the infection? Uploading both encrypted files and ransom notes together along with any contact email addresses or hyperlinks provided by the criminals gives a more positive match with identification and helps to avoid false detections.

Please provide a link to the ID Ransomware results. If ID Ransomware cannot identify the infection, you can post the case SHA1 it gives you in your next reply for Demonslay335 (Michael Gillespie) to manually inspect the files and check for possible file markers.

.
.
Microsoft MVP Alumni 2023Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023

Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


#3 samuelvalvassori

samuelvalvassori
  • Topic Starter

  •  Avatar image
  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:02:45 AM

Posted 28 January 2020 - 07:34 PM

Unable to determine ransomware.

Please make sure you are uploading a ransom note and encrypted sample file from the same infection.

This can happen if this is a new ransomware, or one that cannot be currently identified automatically.

You may post a new topic in the Ransomware Tech Support and Help forums on BleepingComputer for further assistance and analysis.

Please reference this case SHA1: 3903adef75b28ac836cd4c580551376582df53da

I needd help, can help me ??? please



#4 quietman7

quietman7

    Bleepin' Gumshoe


  •  Avatar image
  • Global Moderator
  • 61,920 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:01:45 AM

Posted 28 January 2020 - 08:26 PM


Please upload the original ransom note and several samples of encrypted files (different formats - doc, png, jpg) to the following third-party file hosting service and provide a link or send a PM with a link to Amigo-A (Andrew Ivanov) so he can manually inspect them.

It is best to compress large files before sharing. When the file has been uploaded, you will see a screen stating that the upload was successful. Right-click on the filename link, select Copy Shortcut and paste the link in your next reply.

Please be patient until Amigo-A has a chance to review the information you provided and Demonslay335 has a chance to review the case SHA1. They are both volunteers who assist members as time permits. Demonslay335 is inundated with numerous support requests and it may take some time to get a reply.


.
.
Microsoft MVP Alumni 2023Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023

Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


#5 Amigo-A

Amigo-A

    Security specialist and Ransomware expert


  •  Avatar image
  • Members
  • 3,057 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Bering Strait
  • Local time:10:45 AM

Posted 29 January 2020 - 02:18 AM

This is Oled-Makop Ransomware
https://twitter.com/siri_urz/status/1221797493849018368
 
/// I have not yet published a description for this year's variants. I need to correct and compare the variants of previous years.


Edited by quietman7, 10 December 2020 - 07:21 AM.

My site: The Digest "Crypto-Ransomware"  + Google Translate 

 


#6 Amigo-A

Amigo-A

    Security specialist and Ransomware expert


  •  Avatar image
  • Members
  • 3,057 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Bering Strait
  • Local time:10:45 AM

Posted 29 January 2020 - 02:21 AM

Please correct the error in the topic name - the correct extension is .makop


My site: The Digest "Crypto-Ransomware"  + Google Translate 

 


#7 samuelvalvassori

samuelvalvassori
  • Topic Starter

  •  Avatar image
  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:02:45 AM

Posted 29 January 2020 - 06:58 AM

WHAT Key for Decrypter Ransonware .makop

#8 samuelvalvassori

samuelvalvassori
  • Topic Starter

  •  Avatar image
  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:02:45 AM

Posted 29 January 2020 - 08:00 AM

Please upload the original ransom note and several samples of encrypted files (different formats - doc, png, jpg) to the following third-party file hosting service and provide a link or send a PM with a link to Amigo-A (Andrew Ivanov) so he can manually inspect them.

It is best to compress large files before sharing. When the file has been uploaded, you will see a screen stating that the upload was successful. Right-click on the filename link, select Copy Shortcut and paste the link in your next reply.

Please be patient until Amigo-A has a chance to review the information you provided and Demonslay335 has a chance to review the case SHA1. They are both volunteers who assist members as time permits. Demonslay335 is inundated with numerous support requests and it may take some time to get a reply.

https://drive.google.com/drive/folders/1s---2mbYrQO2If78c0-LBwBvNaWq85z8?usp=sharing

This is link for download encrypted files many formats and txt ranson note.

Thank you for help me...


This is Oled-Makop Ransomware

https://twitter.com/siri_urz/status/1221797493849018368

 

/// I have not yet published a description for this year's variants. I need to correct and compare the variants of previous years.

 

https://drive.google.com/drive/folders/1s---2mbYrQO2If78c0-LBwBvNaWq85z8?usp=sharing

This is link for download encrypted files many formats and txt ranson note.

Thank you for help me...



#9 Amigo-A

Amigo-A

    Security specialist and Ransomware expert


  •  Avatar image
  • Members
  • 3,057 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Bering Strait
  • Local time:10:45 AM

Posted 29 January 2020 - 10:10 AM

I already saw your files.
This is a new version of the ransomware. No one has studied it that, so that we can't talk about a decryptor. 
A free decryptor could not appear before the encryptor encrypted the files. 
Only extortionists has an original decryptor.

Edited by Amigo-A, 29 January 2020 - 10:10 AM.

My site: The Digest "Crypto-Ransomware"  + Google Translate 

 


#10 quietman7

quietman7

    Bleepin' Gumshoe


  •  Avatar image
  • Global Moderator
  • 61,920 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:01:45 AM

Posted 29 January 2020 - 10:38 AM

Please correct the error in the topic name - the correct extension is .makop

Done.


.
.
Microsoft MVP Alumni 2023Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023

Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


#11 clockhart3216

clockhart3216

  •  Avatar image
  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:11:45 PM

Posted 24 February 2020 - 08:17 AM

Good morning. I am having the same issue. I am attaching a zip file that has a few examples and the ransom note. Has anyone gotten anywhere with this?

Attached Files



#12 quietman7

quietman7

    Bleepin' Gumshoe


  •  Avatar image
  • Global Moderator
  • 61,920 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:01:45 AM

Posted 24 February 2020 - 09:13 AM

Unfortunately, there is no known method that I am aware of to decrypt files encrypted by Makop-Oled Ransonware without paying the ransom and obtaining the private keys from the criminals who created the ransomware unless they are leaked or seized & released by authorities. Without the master private RSA key that can be used to decrypt your files, decryption is impossible. That usually means the key is unique (specific) for each victim and generated in a secure way that cannot be brute-forced.

If feasible, your best option is to restore from backups, try file recovery software or backup/save your encrypted data as is and wait for a possible solution at a later time. Ransomware victims should ignore all Google searches which provide numerous links to bogus and untrustworthy removal/decryption guides. After our experts tweet or write about a new variant, junk articles with misinformation are quickly written in order to goad victims into purchasing sham removal and decryption software. Only use trusted sources when searching for information.


.
.
Microsoft MVP Alumni 2023Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023

Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


#13 Demonslay335

Demonslay335

    Ransomware Hunter


  •  Avatar image
  • Security Colleague
  • 4,770 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:11:45 PM

Posted 26 February 2020 - 02:25 PM

I finished a full analysis of this ransomware - it is secure.

 

https://twitter.com/demonslay335/status/1232330195144728577


logo-25.pngID Ransomware - Identify What Ransomware Encrypted Your Files [Support Topic]

ransomnotecleaner-25.png RansomNoteCleaner - Remove Ransom Notes Left Behind [Support Topic]

cryptosearch-25.pngCryptoSearch - Find Files Encrypted by Ransomware [Support Topic]

If I have helped you and you wish to support my ransomware fighting, you may support me here.


#14 Hotman99

Hotman99

  •  Avatar image
  • Members
  • 43 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Turkey
  • Local time:06:45 AM

Posted 07 March 2020 - 05:00 AM

case number: 5ad446683e2eae73b7b65ba0cb97ce6d14494bf0

 

https://dropmefiles.com/KyDh4



#15 tammam

tammam

  •  Avatar image
  • Members
  • 1 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:SYRIA
  • Local time:07:45 AM

Posted 09 March 2020 - 03:48 PM

Hi , 

 

Is there a hope to recover the infected files ?


Edited by tammam, 09 March 2020 - 03:48 PM.





1 user(s) are reading this topic

0 members, 1 guests, 0 anonymous users