Ransomware Research
Makop Ransomware
Makop is a malicious ransomware strain that encrypts victim files and demands ransom payment for decryption. First observed in the wild on August 1, 2011, this ransomware has been actively targeting systems worldwide. Security researchers also track this malware under the aliases: Oled-Makop, Carlos, Shootlock, Shootlock-2, Origami, Tomas, Zbw, Fireee, Zes, Hidden, Captcha, Fair.
Quick Facts
- Ransomware Family
- Makop
- First Seen
- August 1, 2011
- Known Aliases
- Oled-MakopCarlosShootlockShootlock-2OrigamiTomasZbwFireeeZesHiddenCaptchaFair
How Makop Ransomware Works
Targeted Files
Full extension of encrypted files -> .[4B2E4560].[agares_helpdesk@tutanota.com].moloch https://www.bleepingcomputer.com/forums/t/712395/makop-oled-ransonware-makop-carlos-origami-tomas-zbw-support-topic/page-7#entry5260269 https://www.bleepingcomputer.com/forums/t/771018/ransomware-mkp/ Full extension -> .[7E40E7FB].[datastore@cyberfear.com].mkp -> .[7E40E7FB].[razer1115@goat.si].razer -> .[7E40E7FB].[akzhq00705@protonmail.com].makop
File Encryption Patterns
Makop modifies encrypted files using specific patterns to mark them as encrypted:
File extensions added after encryption:
..makop
..CARLOS
..shootlock
..shootlock2
..origami
..tomas
..zbw
..fireee
..zes
..Hidden
..captcha
..fair
..moloch
..vassago
..pecunia
..id2020
..dark
..xdqd
..harmagedon
..code
..mkp
..razer
..snick
..baal
..gamigin
..mammon
..oled
..baseus
..usagoo
..sinister
..hinduism
..factfull
Ransom Note and Payment Demands
After encrypting files, Makop displays ransom notes demanding payment for file recovery:
readme-warning.txt
Ransom message:
notes/readme-warning.txt
Note locations:
EveryFolder
build note.txt
Ransom message:
notes/build note.txt
Note locations:
EveryFolder
+README-WARNING+.txt
Ransom message:
notes/+README-WARNING+.txt
Note locations:
EveryFolder
Technical Indicators
Associated Executable Files
The following executable files are associated with Makop ransomware:
executable.exe
visual.exe
visual.bin
1NS.exe
makop.exe
지원서_20200303(열심히하겠습니다 잘부탁드립니다).exe
svchost.exe.tmp
makop_nowin.exe
MetadataSys.exe
MetadataSys
MetadataSys.dll
svchost.exe
screensaver.exe
1964400829.exe
Desktop_Locker.exe
Desktop Locker.exe
1074076748.exe
396017923.exe
105521611.exe
lov.exe
invoice.exe
explore.exe
DESKTOP LOCKER.EXE
cmd.exe
DesktopLocker.exe
winl.exe
Desktop Locker(@A7la6) .exe
Desktop_Locker.exe-
filename
Screen Locker B.exe
winlogon.exe
Desktop_Locker-spaces.ru.exe
Desktop-Locker.exe
Desktop_Locker-spaces.ru-spaces.ru.exe
desktop_locker.exe
1.exe
freebieblog.ru_desktop_locker.exe
апа.exe
a.exe
이력서(20200609)_경력사항 기재하였으니 확인부탁드립니다 감사합니다.exe
makop_visual.exe
vt.exe
maki.exe
zes.exe
입사지원서_200812(경력사항도 같이 확인 부탁드리겠습니다 열심히하겠습니다).exe
경력사항_200826(경력사항도 같이 확인부탁드리겠습니다 열심히하겠습니다).exe
부당 전자상거래 위반행위 안내(20201006)자료 반드시 준비해주세요.exe
Betternet-6.4.0.exe
부당 전자상거래 위반행위 안내(20201020)자료 반드시 준비해주세요.exe
부당 전자상거래 위반행위 안내(20201023)자료 반드시 준비해주세요.exe
║╬┤τ └ⁿ└┌╗≤░┼╖í └º╣▌╟α└º ╛╚│╗(20201022)└┌╖ß ╣▌╡σ╜├ ┴╪║±╟╪┴╓╝╝┐Σ.exe
captcha_visual.exe
.mc_auto.exe
1111.bin.exe
1111.exe
fgf.exe
저작권법 관련하여 위반인 사항들 정리하여 보내드립니다.exe
GameDownload
GameDownload.exe
是官.exe
X.exe
research document.doc
이미지 원본(제가 제작한 이미지)과 사용하고 있으신 이미지 정리한 내용.exe
Fat32Formatter.exe
입사지원서(경력사항도 같이 기재하였습니다 잘 부탁드립니다).exe
wlnlogon.exe
이력서_210905(경력사항도 같이 기재하였습니다 같이 확인부탁드립니다).exe
이력서_211223(경력사항도 같이 기재하였습니다 잘 부탁드립니다).exe
N1eh.exe
_____220228(_____ __ _______ _______).exe
이력서(200305)열심히하겠습니다 잘부탁드립니다.exe
Polygon's Microshaft
포트폴리오.exe
.mc_hand.exe
Elastio Can Help You
Don't let Makop ransomware take over your data
Elastio provides advanced ransomware protection and recovery solutions to keep your organization safe.
About This Analysis
This Makop ransomware analysis is part of Elastio's comprehensive ransomware detection database. Elastio provides advanced ransomware protection and recovery solutions, helping organizations defend against and recover from ransomware attacks like Makop.
Last updated: July 30, 2025