MPPQ Virus (.MPPQ File) Ransomware

MPQQ Ransomware

The DJVU/STOP virus family that one of the most popular ransomware types in recent years. Among the newest spotted threats of this class is the MPQQ ransomware. When researchers uncovered and dissected this threat, they found a variant of the infamous ransomware family. Without a doubt, the STOP Ransomware family has been the most active ransomware family throughout 2019, claiming numerous victims.

Infection and Encryption

The authors of the MPQQ ransomware are likely using different methods for distribution:

  • hidden installation along with other apps, especially the utilities that work as freeware or shareware;
  • dubious link in spam emails leading to the virus installer
    online free hosting resources;
  • using illegal peer-to-peer (P2P) resources for downloading pirated software.

The MPQQ Ransomware will scan the data on the user’s system to locate the files targeted for encryption. Then, the MPQQ Ransomware will trigger its encryption process and lock all the targeted data. When the MPQQ Ransomware locks a file, it also alters its name by appending an additional extension – ‘.MPQQ.’ For example, a file that was called ‘1.jpg’ previous to the attack will be renamed to ‘1.jpg.mppq’ after the encryption process is through.

mppq ransomware

MPQQ Ransomware Files

The Ransom Note _readme.txt

Then, the MPQQ Ransomware will drop a ransom note called ‘_readme.txt.’ In the note, the attackers state that the ransom fee is $980, but all victims who contact them within 72 hours will obtain a 50% discount and will have to pay $490 instead of the full fee. The creators of the MPQQ Ransomware offer to unlock one file for free so that the users are convinced that they have a working decryption key. There are two email addresses that the attackers provide –helpteam@mail.ch and helpmanager@airmail.cc.

ATTENTION!

Don't worry. You can return all your files!

All your files like photos, databases, documents and other important are encrypted with strongest encryption and unique key.
The only method of recovering files is to purchase decrypt tool and unique key for you.
This software will decrypt all your encrypted files.

What guarantees you have?

You can send one of your encrypted file from your PC and we decrypt it for free.
But we can decrypt only 1 file for free. File must not contain valuable information.

You can get and look video overview decrypt tool:

https://we.tl/t-WJa63R98Ku

Price of private key and decrypt software is $980.
Discount 50% available if you contact us first 72 hours, that's price for you is $490.

Please note that you'll never restore your data without payment.

Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours.

To get this software you need write on our e-mail:

helpteam@mail.ch

Reserve e-mail address to contact us:

helpmanager@airmail.cc

Your personal ID:
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX 
MPPQ Virus Removal

MPPQ Virus Removal

Stay away from the creators of the MPQQ Ransomware. Nothing good comes out of cooperating with cybercriminals. Even if they have promised to provide you with the decryption key you need, likely, they will not bother as soon as they get their hands on your cash. This is why you should look into downloading and installing a reputable anti-malware tool instead. Not only will the security tool keep your computer safe in the future, but you also can use it to remove the MPQQ virus from your system safely.

Gridinsoft Anti-Malware v.4.1.95
Report file date: 6/7/2021 9:34:01 PM
Last update:      6/7/2021 9:34:01 PM

Scanning for 30691386 virus strains and unwanted programs.

Windows version:  Windows 10 Pro x64 (version 6.3)

Starting the file scan:

Standard Scan started
Scanning process...
----- C:\Users\admin\AppData\Local\03f1ea37-1dc9-48cb-bf2e-747aa9d4ae93\ECE92E1C9D4EF056FBC47995C64690FA.exe ---- Startup Threat
	Startup: Trojan.RPL.Agent.sd
	RegPath: HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run|syshelper
	Signature verification: False
	MD5: ECE92E1C9D4EF056FBC47995C64690FA:827392
	RIC: 8547880237CB474BF27F3576244DB223:9640
	RFH: 192:QX3iq54JKjIxmHMHBhPegs9gr%2Fm%2BJhD2JMmarMwpSzhCFYChWfcA:QX37QKSmHQljr%2FmWhDXSzhCSE7A
	SUBS: Win32 GUI
	PE: x86
	EP: 8BFF558BECE836530000E8110000005DC3CCCCCCCCCCCCCCCCCCCCCCCCCCCCCC8BFF558BEC6AFE68B0ED4B00682035400064A1000000005083C498535657A15414
	EPSEC: 0
	EPRVA: 000015C0
	IBASE: 00400000
	SEC:
		.text:60000020:C13E516233FA72658583BF0BF5ECE421:737280
		.rdata:40000040:F4BE87480FA01CC12FB574AC816071CF:45568
		.data:C0000040:1015DA133765740F50A1DB33114A0234:21504
		.rsrc:40000040:7B672CF4039A80AD6CC98ECEDDC4682D:22016


----- c:\Users\admin\Desktop\1.exe ---- General Threat
	Trojan.Win32.Agent.oa
	Signature verification: False
	MD5: ECE92E1C9D4EF056FBC47995C64690FA:827392
	RIC: 8547880237CB474BF27F3576244DB223:9640
	RFH: 192:QX3iq54JKjIxmHMHBhPegs9gr%2Fm%2BJhD2JMmarMwpSzhCFYChWfcA:QX37QKSmHQljr%2FmWhDXSzhCSE7A
	SUBS: Win32 GUI
	PE: x86
	EP: 8BFF558BECE836530000E8110000005DC3CCCCCCCCCCCCCCCCCCCCCCCCCCCCCC8BFF558BEC6AFE68B0ED4B00682035400064A1000000005083C498535657A15414
	EPSEC: 0
	EPRVA: 000015C0
	IBASE: 00400000
	SEC:
		.text:60000020:C13E516233FA72658583BF0BF5ECE421:737280
		.rdata:40000040:F4BE87480FA01CC12FB574AC816071CF:45568
		.data:C0000040:1015DA133765740F50A1DB33114A0234:21504
		.rsrc:40000040:7B672CF4039A80AD6CC98ECEDDC4682D:22016


----- HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Time Trigger Task ---- Registry Threat
	Trojan.RPL.Agent.dd


----- c:\users\admin\appdata\local\03f1ea37-1dc9-48cb-bf2e-747aa9d4ae93\ECE92E1C9D4EF056FBC47995C64690FA.exe ---- General Threat
	Trojan.Win32.Agent.oa
	Signature verification: False
	MD5: ECE92E1C9D4EF056FBC47995C64690FA:827392
	RIC: 8547880237CB474BF27F3576244DB223:9640
	RFH: 192:QX3iq54JKjIxmHMHBhPegs9gr%2Fm%2BJhD2JMmarMwpSzhCFYChWfcA:QX37QKSmHQljr%2FmWhDXSzhCSE7A
	SUBS: Win32 GUI
	PE: x86
	EP: 8BFF558BECE836530000E8110000005DC3CCCCCCCCCCCCCCCCCCCCCCCCCCCCCC8BFF558BEC6AFE68B0ED4B00682035400064A1000000005083C498535657A15414
	EPSEC: 0
	EPRVA: 000015C0
	IBASE: 00400000
	SEC:
		.text:60000020:C13E516233FA72658583BF0BF5ECE421:737280
		.rdata:40000040:F4BE87480FA01CC12FB574AC816071CF:45568
		.data:C0000040:1015DA133765740F50A1DB33114A0234:21504
		.rsrc:40000040:7B672CF4039A80AD6CC98ECEDDC4682D:22016


----- c:\users\admin\appdata\local\03f1ea37-1dc9-48cb-bf2e-747aa9d4ae93\ ---- General Threat
	Trojan.FMPL.Downloader.vl


----- c:\users\admin\appdata\local\6e93cde6-822a-4780-b57a-6bc63cf7d7fd\ ---- General PartOfThreat
	Trojan.FMPL.Downloader.vl


----- C:\Users\admin\AppData\Local\03f1ea37-1dc9-48cb-bf2e-747aa9d4ae93\ECE92E1C9D4EF056FBC47995C64690FA.exe ---- Task Threat
	Task: [time trigger task] Trojan.PL.Gen.dd
	Arguments: --Task
	Signature verification: False
	MD5: ECE92E1C9D4EF056FBC47995C64690FA:827392
	RIC: 8547880237CB474BF27F3576244DB223:9640
	RFH: 192:QX3iq54JKjIxmHMHBhPegs9gr%2Fm%2BJhD2JMmarMwpSzhCFYChWfcA:QX37QKSmHQljr%2FmWhDXSzhCSE7A
	SUBS: Win32 GUI
	PE: x86
	EP: 8BFF558BECE836530000E8110000005DC3CCCCCCCCCCCCCCCCCCCCCCCCCCCCCC8BFF558BEC6AFE68B0ED4B00682035400064A1000000005083C498535657A15414
	EPSEC: 0
	EPRVA: 000015C0
	IBASE: 00400000
	SEC:
		.text:60000020:C13E516233FA72658583BF0BF5ECE421:737280
		.rdata:40000040:F4BE87480FA01CC12FB574AC816071CF:45568
		.data:C0000040:1015DA133765740F50A1DB33114A0234:21504
		.rsrc:40000040:7B672CF4039A80AD6CC98ECEDDC4682D:22016


----- "c:\users\admin\appdata\local\03f1ea37-1dc9-48cb-bf2e-747aa9d4ae93\ece92e1c9d4ef056fbc47995c64690fa.exe" --autostart ---- Startup Threat
	Startup: Trojan.RPL.Agent.sd
	RegPath: HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run|SysHelper


Terminated by user

Scan result:         8 detected items
Scan completed in:   Scan completed in 3 minute(s) 15 sec.
Files were scanned:  11286

READ  How to remove PAHD ransomware (Ext: .PAHD Files)

Leave a Reply

Your email address will not be published. Required fields are marked *