Related blog content
Exploit kits: fall 2019 review
Ransom.Maze is Malwarebytes’ detection name for a family of ransomware that not only encrypts a victims files, but also threatens to publish them.
Users of affected systems may see this notification on their desktop:
and find a file called DECRYPT-FILES.html in every folder that contains encrypted files.
Ransom.Maze is ransomware. Ransomware in general makes files on the victims system unusable until the ransom is payed. Ransom.Maze not only encrypts a victims files, but also threatens to publish them.
Ransom.Maze is spread by exploit kits, for example Spelevo EK, and malspam campaigns.
Since this ransomware deletes shadow copies and the decryption does not always work this infection can lead to a complete loss of files if you are not using adequate backups or a roll-back system.
The operators behind this ransomware also use the tactic to publish exfiltrated data of victims that are unwilling to pay, so confidential data could get publ;ished.
Malwarebytes protects business and home users from Ransom.Maze by using Anti-Ransomware technology and real-time protection.
Malwarebytes can detect and remove Ransom.Maze without further user interaction.
Take note, however, that removing this ransomware does not decrypt your files. You can only get your files back from backups you made before the infection happened.
You can use the Malwarebytes Anti-Malware Nebula console to scan endpoints.
Choose the Scan + Quarantine option. Afterwards you can check the Detections page to see which threats were found.
On the Quarantine page you can see which threats were quarantined and restore them if necessary.
All component/technology detections are passed to the remediation engine for complete removal from infected systems. This industry leading technology uses patented techniques in identifying all cohorts or associated files for a single threat and removes them all together to prevent malware from resuscitating itself. If you are using Malwarebytes Ransomware Rollback technology, it allows you to wind back the clock to negate the impact of ransomware by leveraging just-in-time backups.
SHA 256 hashes:
19aaa6c900a5642941d4ebc309433e783befa4cccd1a5af8c86f6e257bf0a72e
6878f7bd90434ac5a76ac2208a5198ce1a60ae20e8505fc110bd8e42b3657d13
9ad15385f04a6d8dd58b4390e32d876070e339eee6b8da586852d7467514d1b1
b950db9229db2f37a7eb5368308de3aafcea0fd217c614daedb7f334292d801e
Select your language