Ransom

Should I remove “Ransom:Win32/StopCrypt.PBE!MTB”?

Malware Removal

The Ransom:Win32/StopCrypt.PBE!MTB is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Ransom:Win32/StopCrypt.PBE!MTB virus can do?

  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Behavioural detection: Executable code extraction – unpacking
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • A process attempted to delay the analysis task.
  • Dynamic (imported) function loading detected
  • Performs HTTP requests potentially not found in PCAP.
  • HTTPS urls from behavior.
  • A process created a hidden window
  • CAPE extracted potentially suspicious content
  • Unconventionial language used in binary resources: Marathi
  • The binary contains an unknown PE section name indicative of packing
  • The binary likely contains encrypted or compressed data.
  • Authenticode signature is invalid
  • Behavioural detection: Injection (Process Hollowing)
  • Executed a process and injected code into it, probably while unpacking
  • Behavioural detection: Injection (inter-process)
  • Behavioural detection: Transacted Hollowing
  • Created a process from a suspicious location
  • Collects and encrypts information about the computer likely to send to C2 server
  • Installs itself for autorun at Windows startup
  • STOP ransomware registry artifacts detected
  • CAPE detected the STOP malware family
  • Attempts to modify proxy settings
  • Creates a copy of itself
  • Creates a known STOP ransomware variant mutex
  • STOP ransomware command line behavior detected
  • Uses suspicious command line tools or Windows utilities

How to determine Ransom:Win32/StopCrypt.PBE!MTB?


File Info:

name: 11849A594C16DC486893.mlw
path: /opt/CAPEv2/storage/binaries/bdf251f537e3cc2dcef75ce2b442f79d924febf76789e850752e40dc14b97fff
crc32: 9143EA97
md5: 11849a594c16dc48689328e517f9229b
sha1: 5e2d8e8d3157c0617fb171f43bd6ef531adfbf9c
sha256: bdf251f537e3cc2dcef75ce2b442f79d924febf76789e850752e40dc14b97fff
sha512: dab05feccc9c7ee006abb6eab1dc0663335185f6e968d4872edc0b39587bdd09b8ebd272531e66c242100dcf6c520abe34c3829a820447de9d6197b0b3c77094
ssdeep: 12288:sByfwxbsnT5puINq++W28xkctwOF9HnhLAXzS+Xlqf6UT22vxOtfykhysr:sB/bkH/q+d28OctZvH846kbUf3ys
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1140512213AA1C535EAF73774607C92512D3B7C1363B4E9AF63842AB82E715C18EE9353
sha3_384: 6512f4a207dfdba850e0aff80bc9f7264e86a934f9782299f287fb2a302e1c6507ea6e196fdc479b842b7ad0c4589054
ep_bytes: e817310000e989feffff8bff51c701e0
timestamp: 2021-11-02 03:47:18

Version Info:

FileVersion: 82.71.86.86
Copyrighz: Copyright (C) 2022, pazkarte
ProjectVersion: 28.81.74.73

Ransom:Win32/StopCrypt.PBE!MTB also known as:

BkavW32.AIDetect.malware1
Elasticmalicious (high confidence)
CAT-QuickHealRansom.Stop.P5
CylanceUnsafe
SangforTrojan.Win32.Save.a
CrowdStrikewin/malicious_confidence_100% (W)
SymantecPacked.Generic.525
tehtrisGeneric.Malware
ClamAVWin.Malware.Filerepmalware-9941437-0
KasperskyVHO:Trojan.Win32.Agent.gen
AvastPWSX-gen [Trj]
RisingTrojan.Generic@AI.99 (RDMK:cmRtazqz+eqfRmgd6+Uh1VgmJyHc)
SophosML/PE-A
McAfee-GW-EditionBehavesLike.Win32.Generic.bc
SentinelOneStatic AI – Malicious PE
FireEyeGeneric.mg.11849a594c16dc48
MicrosoftRansom:Win32/StopCrypt.PBE!MTB
CynetMalicious (score: 100)
Acronissuspicious
MalwarebytesTrojan.MalPack.GS
APEXMalicious
MaxSecureTrojan.Malware.300983.susgen
AVGPWSX-gen [Trj]
Cybereasonmalicious.d3157c
PandaTrj/Genetic.gen

How to remove Ransom:Win32/StopCrypt.PBE!MTB?

Ransom:Win32/StopCrypt.PBE!MTB removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment