Short bio

Ransom.Megacortex is Malwarebytes’ detection name for a small family of ransomware that is used in targeted attacks on enterprises.


Ransom.Megacortex tries to stop several processes that belong to security software.

Ransom.MegaCortex adds the extension .aes128ctr to the encrypted files.

When the encryption routine has completed it will show a ransom note which mentions a tsv file in the root directory and two email addresses.

MegaCortex ransom note

Type and source of infection

Ransom.Megacortex is ransomware. Ransomware is a type of malware that prevents users from accessing their system or personal files and demands ransom payment in order to regain access.
Ransom.Megacortex is introduced on enterprise networks by use of stolen or leaked administrative credentials. There are also some reports of the threat actors using Trojan downloaders that are spread through instant messaging networks. These are spread and then used to download and install the ransomware.


Malwarebytes protects users from Ransom.Megacortex by using real-time protection and by using Anti-Ransomware technology.

block Ransom.Megacortex

Malwarebytes blocks Ransom.Megacortex

Malwarebytes anti-ransomware

Business remediation

Malwarebytes can detect and remove Ransom.Megacortex on business machines without further user interaction.
To remove Ransom.Megacortex using Malwarebytes business products, follow the instructions below.

How to remove {detection name} with Malwarebytes Endpoint Protection

  1. Go to the Malwarebytes Cloud console.
  2. To allow you to invoke a scan while the machine is off the network, go to Settings > Policies > your policy > General.
  3. Under Endpoint Interface Options, turn ON:
    1. Show Malwarebytes icon in notification area
    2. Allow users to run a Threat Scan (all threats will be quarantined automatically)
  4. Once the endpoint has been updated with the latest policy changes: take the client off the network

If you have infected machines that are not registered endpoints in Malwarebytes Endpoint Protection, you can remove {detection name} with our Breach Remediation tool (MBBR).

  1. Log into your My Account page and copy your license key. The key is needed to activate MBBR tool.
  2. Open your Cloud console.
  3. From a clean and safe machine, go to Endpoints > Add > Malwarebytes Breach Remediation. This will download the MBBR zip package.
  4. Unzip the package.
  5. Access a Windows command line prompt and issue the following commands:
    mbbr register –key:<prodkey>
    mbbr update
    Note: You must substitute your license key for <prodkey>.
  6. Copy the MBBR folder to a flash drive.
  7. From an infected, offline machine, copy the MBBR folder from the flash drive.
  8. Start a scan using the following command:
    mbbr scan –full –ark –remove –noreboot
  9. Refer to the Malwarebytes Breach Remediation Windows Administrator Guide for all supported scanning commands.

How to remove {detection name} with Malwarebytes Endpoint Security

You can use Malwarebytes Anti-Malware v1.80, which is included in your Malwarebytes Endpoint Security deployment to scan and remove {detection name}.

Option 1
  1. Remove the infected endpoint from the network.
  2. On the infected machine, right click the system tray icon and click on Start Scanner.
    MBES start scanner
  3. Select Perform full scan.
    MBES scan options
  4. Click on Scan button.
Option 2
  1. Open CMD
  2. CD to C:\Program Files (x86)\Malwarebytes’ Anti-Malware
  3. Run mbamapi /scan –full –remove -reboot


Malwarebytes can detect and remove Ransom.Megacortex without further user interaction.

  1. Please download Malwarebytes to your desktop.
  2. Double-click mb3-setup-consumer-{version}.exe and follow the prompts to install the program.
  3. Then click Finish.
  4. Once the program has fully updated, select Scan Now on the Dashboard. Or select the Threat Scan from the Scan menu.
  5. If another update of the definitions is available, it will be implemented before the rest of the scanning procedure.
  6. When the scan is complete, make sure that all Threats are selected, and click Remove Selected.
  7. Restart your computer when prompted to do so.

Take note, however, that removing this ransomware does not decrypt your files. You can only get your files back from backups you made before the infection happened.


IP address:



File hashes:

Ransom note:
Key file:
c:\********.tsv  (********= 8 random characters)

Select your language