Ransom

How to remove “Ransom:Win32/Djvu.RPO!MTB”?

Malware Removal

The Ransom:Win32/Djvu.RPO!MTB is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Ransom:Win32/Djvu.RPO!MTB virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • CAPE extracted potentially suspicious content
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Behavioural detection: Injection (Process Hollowing)
  • Behavioural detection: Injection (inter-process)
  • Checks the presence of disk drives in the registry, possibly for anti-virtualization

How to determine Ransom:Win32/Djvu.RPO!MTB?


File Info:

name: FC844121542961D658FD.mlw
path: /opt/CAPEv2/storage/binaries/8eb2eb065a435d45e68543c1fc5601ef4080d22c88e90fcfe779264cd0577f4a
crc32: D7BA3AA5
md5: fc844121542961d658fd1587c3f5f744
sha1: f095742580f0a052d4dc4881461536777cfe1354
sha256: 8eb2eb065a435d45e68543c1fc5601ef4080d22c88e90fcfe779264cd0577f4a
sha512: 6daf288ebc528eeaf7d67dd81fc560998da3251e7bd9267359b9d4d0a5fb306cac33cb6a568b2f341d5dbf9fb6348b1b1ff0f19a7b7d729b14a7c7533621f306
ssdeep: 3072:EGfneLl8Xcz5EcfrRRtkgHAu0qIy3BcXQEUBbHl4BfRqgisx:veLl8XcxRJHOfxgJFOwgi
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T118E3D0117980C072C0495ABD5C29C691EA7EBC8199254AC77B483F6FFE327C17ABA353
sha3_384: 2c7e5439cb9871b149a1564fbf6233624324bfba5fcef530ba9260e49c53f3d8e5836892aa8328d0d82c2a00664f750b
ep_bytes: e80b2e0000e979feffff558bec83ec04
timestamp: 2022-03-24 03:21:11

Version Info:

Translations: 0x0179 0x00aa

Ransom:Win32/Djvu.RPO!MTB also known as:

BkavW32.AIDetect.malware2
LionicHeuristic.File.Generic.00×1!p
Elasticmalicious (high confidence)
DrWebTrojan.PWS.Stealer.33898
MicroWorld-eScanTrojan.GenericKD.62204425
FireEyeGeneric.mg.fc844121542961d6
CylanceUnsafe
VIPRETrojan.GenericKD.62204425
SangforTrojan.Win32.Save.a
K7AntiVirusRiskware ( 0040eff71 )
AlibabaTrojan:Win32/Raccoon.a0d2f392
Cybereasonmalicious.580f0a
CyrenW32/Kryptik.HDR.gen!Eldorado
SymantecML.Attribute.HighConfidence
tehtrisGeneric.Malware
ESET-NOD32a variant of Win32/Kryptik.HQWD
APEXMalicious
TrendMicro-HouseCallTROJ_GEN.R002H06IK22
Paloaltogeneric.ml
ClamAVWin.Packed.Crypterx-9954995-0
KasperskyHEUR:Trojan.Win32.Agent.gen
BitDefenderTrojan.GenericKD.62204425
AvastWin32:DropperX-gen [Drp]
RisingRansom.Stop!8.10810 (TFE:5:K35tMS9pvvU)
Ad-AwareTrojan.GenericKD.62204425
EmsisoftTrojan.GenericKD.62204425 (B)
McAfee-GW-EditionBehavesLike.Win32.Generic.ch
Trapminemalicious.high.ml.score
SophosMal/Generic-S + Troj/Krypt-QV
SentinelOneStatic AI – Malicious PE
GDataTrojan.GenericKD.62204425
GoogleDetected
MAXmalware (ai score=89)
Antiy-AVLTrojan/Generic.ASMalwS.7E3E
ArcabitTrojan.Generic.D3B52A09
MicrosoftRansom:Win32/Djvu.RPO!MTB
CynetMalicious (score: 100)
AhnLab-V3Packed/Win.GEE.R521207
McAfeePacked-GEE!FC8441215429
VBA32TrojanPSW.Arkei
MalwarebytesTrojan.MalPack.GS
TencentWin32.Trojan.Agent.Xdkl
IkarusTrojan-Ransom.BlackBasta
FortinetW32/Ursnif.BCED!tr
AVGWin32:DropperX-gen [Drp]
PandaTrj/Genetic.gen
CrowdStrikewin/malicious_confidence_100% (W)

How to remove Ransom:Win32/Djvu.RPO!MTB?

Ransom:Win32/Djvu.RPO!MTB removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment