Ransomware virus authors are restless when it comes to inventing new ways to extort victims for money. One of the more original new crypto viruses, dubbed MIRCOP, employs a rather unusual method to make the victim pay. The ransomware claims that the victim is the one to blame as they have stolen 48.48 Bitcoins, and now they have to return them.
Mircop Ransomware Decryptor
Threat Summary
Name | MIRCOP ransomware |
Type | Ransomware |
Short Description | The ransomware authors claim the victim has stolen 48.48 Bitcoins from them. The ransomware uses Guy Fawkes’ mask in the ransom note. |
Symptoms | The ransomware will lock your files and display a ransom note. An abnormally large ransom is demanded. |
Distribution Method | Spam Emails, Email Attachments, Enabling Malicious Macros |
Detection Tool |
See If Your System Has Been Affected by malware
Download
Malware Removal Tool
|
User Experience | Join Our Forum to Discuss MIRCOP ransomware. |
MIRCOP Ransomware – Distribution Method
Despite its originality in terms of the ransom note and overall approach to the victim, MIRCOP’s distribution vector is no different than most ransomware. It’s spread via malicious documents in spam emails. The emails are most likely masqueraded as a Thai customs form for importing and exporting goods:
Image Source:TrendMicro
The victim is prompted to enable macros. If macros are enabled Windows PowerShell will be used to download and execute the payload.
MIRCOP Ransomware – Details about the Attack
The ransom note shows a figure in a Guy Fawkes mask, adopted by the Anonymous hacktivist group. One of the weirdest things about this ransomware is that it gives little instructions on how the ransom should be transferred.
The ransom note reads:
Hello,
You’ve stolen 48.48 BTC from the wrong people, please be so kind to return them and we will return your files.
Don’t take us for fools, we know more about you than you know about yourself.
Pay us back and we won’t take further action, don’t pay and be prepared.
As seen above, the ransomware suggests that the victim already knows what to do and how to pay the ransom. The note may be interpreted in a bolder way – cyber criminals pretend to be part of Anonymous, claiming that the targeted user has stolen from them. A Bitcoin address is left at the end of the note. No step-by-step payment instructions for crypto-currency transactions usually seen in ransom note are available. A research by TrendLabs indicates that no payments were made to this address (as of June 23).
MIRCOP ransomware demands a payment of 48.48 Bitcoins, or $28,730.70. This is, no doubt, one of the biggest ransom extortions observed to this date.
The ransomware drops three files in %Temp% folder:
- c.exe (set to steal information from the victim’s system)
- x.exe (used for file encryption)
- y.exe (used for file encryption)
MIRCOP doesn’t append a file extension as other ransomware typically do. Instead files are prepended with the string “Lock”. When files are opened, the file’s content is changed to unreadable characters, as TrendMicro points out. Common folders are also encrypted.
Besides file encryption, the crypto virus is designed to steal credentials from the victim’s applications, like Mozilla Firefox, Google Chrome, Opera, FileZilla, and Skype. CryptXXX, another well-known ransomware, has also been added information stealing capabilities.
MIRCOP Ransomware – Removal and File Restoration
As we have written multiple times, malware and ransomware authors often trick users into enabling malicious macros in spam documents. To avoid getting to this point, users should employ anti-spam measures (anti-spam software, spam filters). Another important element of an adequate protection is sustaining a strong anti-malware solution.
If it’s too late and you have already been affected by MIRCOP, paying the ransom is not a good option. For one, it’s too high and no clear payment instructions are provided. Furthermore, paying cyber criminals only monetizes their infections and gives them ground for future attacks.
So, if you’re a victim, have a look at the instructions below our article to remove MIRCOP and try and get your files back via alternative methods.
- Guide 1: How to Remove MIRCOP ransomware from Windows.
- Guide 2: Get rid of MIRCOP ransomware from Mac OS X.
- Guide 3: Remove MIRCOP ransomware from Google Chrome.
- Guide 4: Erase MIRCOP ransomware from Mozilla Firefox.
- Guide 5: Uninstall MIRCOP ransomware from Microsoft Edge.
- Guide 6: Remove MIRCOP ransomware from Safari.
- Guide 7: Eliminate MIRCOP ransomware from Internet Explorer.
Windows Mac OS X Google Chrome Mozilla Firefox Microsoft Edge Safari Internet Explorer
How to Remove MIRCOP ransomware from Windows.
Step 1: Boot Your PC In Safe Mode to isolate and remove MIRCOP ransomware





Step 2: Uninstall MIRCOP ransomware and related software from Windows
Here is a method in few easy steps that should be able to uninstall most programs. No matter if you are using Windows 10, 8, 7, Vista or XP, those steps will get the job done. Dragging the program or its folder to the recycle bin can be a very bad decision. If you do that, bits and pieces of the program are left behind, and that can lead to unstable work of your PC, errors with the file type associations and other unpleasant activities. The proper way to get a program off your computer is to Uninstall it. To do that:



Step 3: Clean any registries, created by MIRCOP ransomware on your computer.
The usually targeted registries of Windows machines are the following:
- HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
- HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
- HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce
- HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce
You can access them by opening the Windows registry editor and deleting any values, created by MIRCOP ransomware there. This can happen by following the steps underneath:



Before starting "Step 4", please boot back into Normal mode, in case you are currently in Safe Mode.
This will enable you to install and use SpyHunter 5 successfully.
Windows Mac OS X Google Chrome Mozilla Firefox Microsoft Edge Safari Internet Explorer
Get rid of MIRCOP ransomware from Mac OS X.
Step 1: Uninstall MIRCOP ransomware and remove related files and objects
1. Hit the ⇧+⌘+U keys to open Utilities. Another way is to click on “Go” and then click “Utilities”, like the image below shows:
- Go to Finder.
- In the search bar type the name of the app that you want to remove.
- Above the search bar change the two drop down menus to “System Files” and “Are Included” so that you can see all of the files associated with the application you want to remove. Bear in mind that some of the files may not be related to the app so be very careful which files you delete.
- If all of the files are related, hold the ⌘+A buttons to select them and then drive them to “Trash”.
In case you cannot remove MIRCOP ransomware via Step 1 above:
In case you cannot find the virus files and objects in your Applications or other places we have shown above, you can manually look for them in the Libraries of your Mac. But before doing this, please read the disclaimer below:
You can repeat the same procedure with the following other Library directories:
→ ~/Library/LaunchAgents
/Library/LaunchDaemons
Tip: ~ is there on purpose, because it leads to more LaunchAgents.
Step 2: Scan for and remove MIRCOP ransomware files from your Mac
When you are facing problems on your Mac as a result of unwanted scripts and programs such as MIRCOP ransomware, the recommended way of eliminating the threat is by using an anti-malware program. SpyHunter for Mac offers advanced security features along with other modules that will improve your Mac’s security and protect it in the future.
Windows Mac OS X Google Chrome Mozilla Firefox Microsoft Edge Safari Internet Explorer
Remove MIRCOP ransomware from Google Chrome.
Step 1: Start Google Chrome and open the drop menu
Step 2: Move the cursor over "Tools" and then from the extended menu choose "Extensions"
Step 3: From the opened "Extensions" menu locate the unwanted extension and click on its "Remove" button.
Step 4: After the extension is removed, restart Google Chrome by closing it from the red "X" button at the top right corner and start it again.
Windows Mac OS X Google Chrome Mozilla Firefox Microsoft Edge Safari Internet Explorer
Erase MIRCOP ransomware from Mozilla Firefox.
Step 1: Start Mozilla Firefox. Open the menu window
Step 2: Select the "Add-ons" icon from the menu.
Step 3: Select the unwanted extension and click "Remove"
Step 4: After the extension is removed, restart Mozilla Firefox by closing it from the red "X" button at the top right corner and start it again.
Windows Mac OS X Google Chrome Mozilla Firefox Microsoft Edge Safari Internet Explorer
Uninstall MIRCOP ransomware from Microsoft Edge.
Step 1: Start Edge browser.
Step 2: Open the drop menu by clicking on the icon at the top right corner.
Step 3: From the drop menu select "Extensions".
Step 4: Choose the suspected malicious extension you want to remove and then click on the gear icon.
Step 5: Remove the malicious extension by scrolling down and then clicking on Uninstall.
Windows Mac OS X Google Chrome Mozilla Firefox Microsoft Edge Safari Internet Explorer
Remove MIRCOP ransomware from Safari.
Step 1: Start the Safari app.
Step 2: After hovering your mouse cursor to the top of the screen, click on the Safari text to open its drop down menu.
Step 3: From the menu, click on "Preferences".
Step 4: After that, select the 'Extensions' Tab.
Step 5: Click once on the extension you want to remove.
Step 6: Click 'Uninstall'.
A pop-up window will appear asking for confirmation to uninstall the extension. Select 'Uninstall' again, and the MIRCOP ransomware will be removed.
Windows Mac OS X Google Chrome Mozilla Firefox Microsoft Edge Safari Internet Explorer
Eliminate MIRCOP ransomware from Internet Explorer.
Step 1: Start Internet Explorer.
Step 2: Click on the gear icon labeled 'Tools' to open the drop menu and select 'Manage Add-ons'
Step 3: In the 'Manage Add-ons' window.
Step 4: Select the extension you want to remove and then click 'Disable'. A pop-up window will appear to inform you that you are about to disable the selected extension, and some more add-ons might be disabled as well. Leave all the boxes checked, and click 'Disable'.
Step 5: After the unwanted extension has been removed, restart Internet Explorer by closing it from the red 'X' button located at the top right corner and start it again.