{"id":93918,"date":"2019-01-22T12:43:53","date_gmt":"2019-01-22T20:43:53","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=93918"},"modified":"2025-06-02T00:51:58","modified_gmt":"2025-06-02T07:51:58","slug":"happy-new-year-2019-anatova-is-here","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/happy-new-year-2019-anatova-is-here\/","title":{"rendered":"Happy New Year 2019! Anatova is here!"},"content":{"rendered":"<p>During our continuous hunt for new threats, we discovered a new ransomware family we call Anatova (based on the name of the ransom note). Anatova was discovered in a private peer-to-peer (p2p) network. After initial analysis, and making sure that our customers are protected, we decided to make this discovery public.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-93919 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/01\/Picture1-1.png\" alt=\"\" width=\"974\" height=\"560\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/Picture1-1.png 974w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/Picture1-1-300x172.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/Picture1-1-768x442.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/Picture1-1-870x500.png 870w\" sizes=\"auto, (max-width: 974px) 100vw, 974px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Our telemetry showed that although Anatova is relatively new, we already discovered a widespread detection of the thread around the globe<\/em><\/p>\n<p>We believe that Anatova can become a serious threat since the code is prepared for modular extension.<\/p>\n<p>Additionally, it will also check if network-shares are connected and will encrypt the files on these shares too. The developers\/actors behind Anatova are, according our assessment, skilled malware authors. We draw this conclusion as each sample has its own unique key, as well as other functions we will describe, which we do not often see in ransomware families.<\/p>\n<p>This post will explain the technical details of Anatova, as well as some interesting facts about this new ransomware family.<\/p>\n<p>For the analysis we used this particular hash: <strong>170fb7438316f7335f34fa1a431afc1676a786f1ad9dee63d78c3f5efd3a0ac0<\/strong><\/p>\n<p>The main goal of Anatova is to cipher all the files that it can before requesting payment from the victim.<\/p>\n<h2><strong>Anatova Overview<\/strong><\/h2>\n<p>Anatova usually uses the icon of a game or application to try and fool the user into downloading it. It has a manifest to request admin rights.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-93920 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/01\/Picture2-1.png\" alt=\"\" width=\"643\" height=\"329\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/Picture2-1.png 643w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/Picture2-1-300x153.png 300w\" sizes=\"auto, (max-width: 643px) 100vw, 643px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Information about the binary<\/em><\/p>\n<p>The Anatova ransomware is a 64bits application with the compile date of January 1<sup>st<\/sup>, 2019. The file size of this particular hash is 307kb, but it can change due to the amount of resources used in the sample. If we remove all these resources, the size is 32kb; a very small program with a powerful mechanism inside.<\/p>\n<p>Anatova has some strong protection techniques against static analysis which makes things slightly tricky:<\/p>\n<ul>\n<li>Most of the strings are encrypted (Unicode and Ascii), using different keys to decrypt them, embedded in the executable.<\/li>\n<li>90% of the calls are dynamic;, they only use the following non-suspicious Windows API\u2019s and standard library of C- programming language: GetModuleHandleW, LoadLibraryW, GetProcAddress, ExitProcess and MessageBoxA.<\/li>\n<li>When we open the binary in IDA Pro (included the latest version of IDA) the functions are bad detected, and they finish being processed after 3 opcodes. We are not sure if this is a bug in IDA Pro or perhaps the malware authors created something to cause this on purpose (which we doubt).<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-93921 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/01\/Picture3.png\" alt=\"\" width=\"972\" height=\"193\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/Picture3.png 972w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/Picture3-300x60.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/Picture3-768x152.png 768w\" sizes=\"auto, (max-width: 972px) 100vw, 972px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Problem in IDA Pro 7.2 last version<\/em><\/p>\n<p>&nbsp;<\/p>\n<h2><strong>Entry Vector<\/strong><\/h2>\n<p>At the moment we don\u00b4t know all entry vectors that Anatova is using, or will be using, in the near future. Our initial finding location was in private p2p.<\/p>\n<p>The goal of Anatova, as with other ransomware families, is to encrypt all or many files on an infected system and insist on payment to unlock them. The actor(s) demand a ransom payment in cryptocurrency of 10 DASH \u2013 currently valued at around $700 USD, a quite high amount compared to other ransomware families.<\/p>\n<h2><strong>In-depth highlights of version 1.0<\/strong><\/h2>\n<p>Since this is a novel family, we didn\u2019t find any version number inside the code, but let\u2019s call this version 1.0<\/p>\n<p>The first action that the malware executes is to get the module handle of the library \u201ckernel32.dll\u201d and get 29 functions from it using the function \u201cGetProcAddress\u201d.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-93922 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/01\/Picture4.png\" alt=\"\" width=\"622\" height=\"529\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/Picture4.png 622w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/Picture4-300x255.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/Picture4-588x500.png 588w\" sizes=\"auto, (max-width: 622px) 100vw, 622px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Get kernel32 functions after decrypt strings<\/em><\/p>\n<p>If the malware can\u00b4t get the module handle of kernel32, or some of the functions can\u00b4t be found, it will quit without executing any encryption.<\/p>\n<p>Later, the malware will try to create a mutex with a hardcoded name (in this case: 6a8c9937zFIwHPZ309UZMZYVnwScPB2pR2MEx5SY7B1xgbruoO) but the mutex name changes in each sample. If the mutex is created, and gets the handle, it will call the \u201cGetLastError\u201d function and look if the last error is ERROR_ALREADY_EXISTS or ERROR_ACCESS_DENIED. Both errors mean that a previous instance of this mutex object exists. If that is the case, the malware will enter in a flow of cleaning memory, that we will explain later in this post, and finish.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-93923 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/01\/Picture5.png\" alt=\"\" width=\"591\" height=\"481\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/Picture5.png 591w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/Picture5-300x244.png 300w\" sizes=\"auto, (max-width: 591px) 100vw, 591px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Check mutex<\/em><\/p>\n<p>After this check, Anatova will get some functions from the library \u201cadvapi32.dll\u201d, \u201cCrypt32.dll\u201d and \u201cShell32.dll\u201d using the same procedure as in the kernel case. All text is encrypted and decrypted one per one, get the function, free the memory, and continue with the next one.<\/p>\n<p>If it fails in getting some of these modules or some of the functions it needs, it will go to the flow of cleaning tool and exit.<\/p>\n<p>One interesting function we discovered was that Anatova will retrieve the username of the logged in and\/or active user and compare with a list of names encrypted. If one of the names is detected, it will go to the cleaning flow procedure and exit.<\/p>\n<p>The list of users searched are:<\/p>\n<ul>\n<li>LaVirulera<\/li>\n<li>tester<\/li>\n<li>Tester<\/li>\n<li>analyst<\/li>\n<li>Analyst<\/li>\n<li>lab<\/li>\n<li>Lab<\/li>\n<li>Malware<\/li>\n<li>malware<\/li>\n<\/ul>\n<p>Some analysts or virtual machines\/sandboxes are using these default usernames in their setup, meaning that the ransomware will not work on these machines\/sandboxes.<\/p>\n<p>After this user-check, Anatova will check the language of the system. When we say language, we mean the system language. When a user installs the Windows OS, they choose a language to install it with (though later the user could install a different language). Anatova checks for the first installed language on the system to ensure that a user cannot install one of these blacklisted languages to avoid encryption of the files.<\/p>\n<p>The list of the countries that Anatova doesn\u2019t affect are:<\/p>\n<ul>\n<li>All CIS countries<\/li>\n<li>Syria<\/li>\n<li>Egypt<\/li>\n<li>Morocco<\/li>\n<li>Iraq<\/li>\n<li>India<\/li>\n<\/ul>\n<p>It\u2019s quite normal to see the CIS countries being excluded from execution and often an indicator that the authors might be originating from one of these countries. In this case it was surprising to see the other countries being mentioned. We do not have a clear hypothesis on why these countries in particular are excluded.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-93924 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/01\/Picture6.png\" alt=\"\" width=\"735\" height=\"552\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/Picture6.png 735w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/Picture6-300x225.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/Picture6-666x500.png 666w\" sizes=\"auto, (max-width: 735px) 100vw, 735px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Check system language<\/em><\/p>\n<p>After the language check, Anatova looks for a flag that, in all samples we looked at, has the value of 0, but if this flag would change to the value of 1 (the current malware samples never change that value), it will load two DLLs with the names (after decryption) of \u201cextra1.dll\u201d and \u201cextra2.dll\u201d. This might indicate that Anatova is prepared to be modular or to be extended with more functions in the near future.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-93925 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/01\/Picture7.png\" alt=\"\" width=\"652\" height=\"477\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/Picture7.png 652w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/Picture7-300x219.png 300w\" sizes=\"auto, (max-width: 652px) 100vw, 652px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Load extra modules<\/em><\/p>\n<p>After this, the malware enumerates all processes in the system and compares them with a large list including, for example \u201csteam.exe\u201d, \u201csqlserver.exe\u201d, etc. If some of these processes are discovered, the malware will open them and terminate them. This action is typical of ransomware that attempts to unlock files that later will be encrypted, such as database files, game files, Office related files, etc.<\/p>\n<p>The next action is to create an RSA Pair of Keys using the crypto API that will cipher all strings. This function is the same as in other ransomware families, such as GandCrab or Crysis, for example. It makes sure that the keys that will be used, are per user and per execution.<\/p>\n<p>If the malware can\u00b4t create the keys, it will go to the clean flow and exit.<\/p>\n<p>After this, Anatova will make a random key of 32 bits and another value of 8 bytes using the function of the crypto API \u201cCryptGenRandom\u201d to encrypt using the Salsa20 algorithm and the private previous blob key in runtime.<\/p>\n<p>During the encryption process of the files, it will decrypt the master RSA public key of the sample of 2 layers of crypto, the first one is a XOR with the value 0x55 and the second one is to decrypt it using a hardcoded key and IV in the sample using the Salsa20 algorithm.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-93926 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/01\/Picture8.png\" alt=\"\" width=\"974\" height=\"270\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/Picture8.png 974w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/Picture8-300x83.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/Picture8-768x213.png 768w\" sizes=\"auto, (max-width: 974px) 100vw, 974px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Decrypt from first layer the master RSA public key of sample<\/em><\/p>\n<p>After this, it will import the public key and with it, will encrypt the Salsa20 key and IV used to encrypt the private RSA key in runtime.<\/p>\n<p>The next step is to prepare a buffer of memory and with all of the info encrypted (Salsa20 key, Salsa20 IV, and private RSA key). It makes a big string in BASE64 using the function \u201cCryptBinaryToStringA\u201d. The ransomware will later clean the computer\u2019s memory of the key, IV, and private RSA key values, to prevent anyone dumping this information from memory and creating a decrypter.<\/p>\n<p>This BASE64 string will be written later in the ransom note. Only the malware authors can decrypt the Salsa20 key and IV and the private RSA key that the user would need \u00a0to decrypt the files.<\/p>\n<p>If this does not work, Anatova will delete itself, enter in the clean flow and exit.<\/p>\n<p>When the keys are encrypted in the memory buffer, Anatova will enumerate all logic units and will search for all existing instances of the type DRIVE_FIXED (a normal hard disk for example) or DRIVE_REMOTE (for remote network shares that are mounted). Anatova will try to encrypt the files on each of those locations. This means that one corporate victim can cause a major incident when files on network-shares are being encrypted.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-93927 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/01\/Picture9.png\" alt=\"\" width=\"827\" height=\"537\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/Picture9.png 827w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/Picture9-300x195.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/Picture9-768x499.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/Picture9-770x500.png 770w\" sizes=\"auto, (max-width: 827px) 100vw, 827px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Check all logic units<\/em><\/p>\n<p>For each mounted drive \u2013 hard disk or remote share, Anatova will get all files and folders. It will later check if it is a folder and, if it is, will check that the folder name doesn\u2019t have the name of \u201c.\u201d and \u201c..\u201d, to avoid the same directory and the previous directory.<\/p>\n<p>In the list of gathered folder names, Anatova checks against a list of blacklisted names such as \u201cWindows\u201d, \u201cProgram Files\u201d, \u201cProgram Files(x86)\u201d, etc. This is usual in many ransomware families, because the authors want to avoid destroying the Operating System, instead targeting the high value files. Anatova does the same for file-extensions .exe, .dll and .sys that are critical for the Operating system as well.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-93928 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/01\/Picture10.png\" alt=\"\" width=\"972\" height=\"652\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/Picture10.png 972w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/Picture10-300x201.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/Picture10-768x515.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/Picture10-745x500.png 745w\" sizes=\"auto, (max-width: 972px) 100vw, 972px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Check file name and extension<\/em><\/p>\n<p>If this check is passed, Anatova will open the file and get its size, comparing it to1 MB. Anatova will only encrypt files1 MB or smaller to avoid lost time with big files; it wants to encrypt fast. By setting pointers at the end of the encrypted files, Anatova makes sure that it does not encrypt files that are already encrypted.<\/p>\n<p>Next, Anatova will create a random value of 32bits as a key for the Salsa20 algorithm and another value of 8 bytes that will be used as IV for Salsa20.<\/p>\n<p>With these values, it will read all files in memory or files with a maximum size of 1 MB and encrypt this information with the key and IV using the Salsa20 algorithm (this is very popular lately because it is a very quick algorithm and has open source implementations).<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-93929 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/01\/Picture11.png\" alt=\"\" width=\"764\" height=\"616\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/Picture11.png 764w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/Picture11-300x242.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/Picture11-620x500.png 620w\" sizes=\"auto, (max-width: 764px) 100vw, 764px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Encryption of files function<\/em><\/p>\n<p>It will import the RSA public key created in runtime and with it, encrypt the key and IV used to encrypt the file. Next, it will write the encrypted content in the same file from the beginning of the file and then it will set the pointer to the end of the file and write the next things:<\/p>\n<ul>\n<li>The block encrypted of the Salsa20 key is ciphered with the public RSA key.<\/li>\n<li>The block encrypted of the Salsa20 IV is ciphered with the public RSA key.<\/li>\n<li>The size of the file is smaller than 1 MB.<\/li>\n<li>A special hardcoded value for each sample that will appear in the ransom note.<\/li>\n<li>A special hardcoded value in the sample that is the mark of infection checked before to avoid encrypting the same file twice.<\/li>\n<\/ul>\n<p>When this is completed, Anatova will write a ransom note in the same folder. So, if Anatova can\u00b4t encrypt at least something in a folder, it won\u2019t create a ransom note in this folder, only in the affected folders.<\/p>\n<p>This behavior is different from other ransomware families that write a ransom note in all folders.<\/p>\n<p>The ransom note text is fully encrypted in the binary, except for the mail addresses to contact the author(s) and the dash address to pay.<\/p>\n<p>Anatova doesn\u2019t overwrite the ransom note if it already exists in a folder in order to save time.The ransom note contains the base64 block with all encrypted information that is needed to decrypt the files in a block that start with the string \u201c&#8212;-KEY&#8212;-\u201d, as well asthe id number.<\/p>\n<p>Responding victims are then allowed to decrypt one .jpg file of maximum size 200kb free of charge, as proof that they the decrypted files can be retrieved.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-93930 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/01\/Picture12.png\" alt=\"\" width=\"974\" height=\"466\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/Picture12.png 974w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/Picture12-300x144.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/Picture12-768x367.png 768w\" sizes=\"auto, (max-width: 974px) 100vw, 974px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Example of ransom note<\/em><\/p>\n<p>When all this is done, Anatova will destroy the Volume Shadow copies 10 times in very quick succession. Like most ransomware families, it is using the vssadmin program, which required admin rights, to run and delete the volume shadow copies.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-93931 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/01\/Picture13.png\" alt=\"\" width=\"974\" height=\"512\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/Picture13.png 974w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/Picture13-300x158.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/Picture13-768x404.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/Picture13-951x500.png 951w\" sizes=\"auto, (max-width: 974px) 100vw, 974px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Delete of Shadow Volumes 10 times<\/em><\/p>\n<p>Finally, when all steps are completed, the ransomware will follow the flow of cleaning code, as described earlier, mainly to prevent dumping memory code that could assist in creating a decryption tool.<\/p>\n<h2><strong>COVERAGE<\/strong><\/h2>\n<p>Customers of McAfee gateway and endpoint products are protected against this version. Detection names include Ransom-Anatova![partialhash].<\/p>\n<h2><strong>INDICATORS OF<\/strong> <strong>COMPROMISE<\/strong><\/h2>\n<p>The samples use the following MITRE ATT&amp;CK\u2122 techniques:<\/p>\n<ul>\n<li>Execution through API<\/li>\n<li>Application processes discovery<\/li>\n<li>File and directory discovery: to search files to encrypt<\/li>\n<li>Encrypt files<\/li>\n<li>Process discovery: enumerating all processes on the endpoint to kill some special ones<\/li>\n<li>Create files<\/li>\n<li>Elevation of privileges: request it to run.<\/li>\n<li>Create mutants<\/li>\n<\/ul>\n<h2><strong>Hashes<\/strong><\/h2>\n<p>2a0da563f5b88c4d630aefbcd212a35e<\/p>\n<p>366770ebfd096b69e5017a3e33577a94<\/p>\n<p>9d844d5480eec1715b18e3f6472618aa<\/p>\n<p>61139db0bbe4937cd1afc0b818049891<\/p>\n<p>596ebe227dcd03863e0a740b6c605924<\/p>\n","protected":false},"excerpt":{"rendered":"<p>During our continuous hunt for new threats, we discovered a new ransomware family we call Anatova (based on the name&#8230;<\/p>\n","protected":false},"author":1028,"featured_media":93005,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[],"coauthors":[5540],"class_list":["post-93918","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mcafee-labs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Happy New Year 2019! Anatova is here! | McAfee Blog<\/title>\n<meta name=\"description\" content=\"During our continuous hunt for new threats, we discovered a new ransomware family we call Anatova (based on the name of the ransom note). Anatova was\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Happy New Year 2019! Anatova is here! | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"During our continuous hunt for new threats, we discovered a new ransomware family we call Anatova (based on the name of the ransom note). Anatova was\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/happy-new-year-2019-anatova-is-here\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-01-22T20:43:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-02T07:51:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/12\/Digitally-Generated-Image-of-Online-Virus-Concept.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2048\" \/>\n\t<meta property=\"og:image:height\" content=\"1415\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Alexandre Mundo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ValthekOn\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alexandre Mundo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/happy-new-year-2019-anatova-is-here\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/happy-new-year-2019-anatova-is-here\/\"},\"author\":{\"name\":\"Alexandre Mundo\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/c3f45299d8c53eed9afcc781d0664cb0\"},\"headline\":\"Happy New Year 2019! Anatova is here!\",\"datePublished\":\"2019-01-22T20:43:53+00:00\",\"dateModified\":\"2025-06-02T07:51:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/happy-new-year-2019-anatova-is-here\/\"},\"wordCount\":2289,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/happy-new-year-2019-anatova-is-here\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/12\/Digitally-Generated-Image-of-Online-Virus-Concept.jpg\",\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/happy-new-year-2019-anatova-is-here\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/happy-new-year-2019-anatova-is-here\/\",\"name\":\"Happy New Year 2019! Anatova is here! | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/happy-new-year-2019-anatova-is-here\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/happy-new-year-2019-anatova-is-here\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/12\/Digitally-Generated-Image-of-Online-Virus-Concept.jpg\",\"datePublished\":\"2019-01-22T20:43:53+00:00\",\"dateModified\":\"2025-06-02T07:51:58+00:00\",\"description\":\"During our continuous hunt for new threats, we discovered a new ransomware family we call Anatova (based on the name of the ransom note). Anatova was\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/happy-new-year-2019-anatova-is-here\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/happy-new-year-2019-anatova-is-here\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/happy-new-year-2019-anatova-is-here\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/12\/Digitally-Generated-Image-of-Online-Virus-Concept.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/12\/Digitally-Generated-Image-of-Online-Virus-Concept.jpg\",\"width\":2048,\"height\":1415},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/happy-new-year-2019-anatova-is-here\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Happy New Year 2019! Anatova is here!\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/c3f45299d8c53eed9afcc781d0664cb0\",\"name\":\"Alexandre Mundo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/80b0982f90036536db33ea6886ff3c35\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/07\/alex-150x150.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/07\/alex-150x150.png\",\"caption\":\"Alexandre Mundo\"},\"description\":\"Alexandre Mundo, Senior Malware Analyst is part of Mcafee's Advanced Threat Research team. He reverses the new threads in advanced attacks and make research of them in a daily basis. He is focused in APT and new, and old but very active, ransomware attacks and malware. He performs malware and forensic analysis and teach junior malware analysts and has developed training courses, workshops and presentations of malware analysis. He worked as freelance and consultor in the past too.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/alexandre-mundo-alguacil-38a98011a\/\",\"https:\/\/x.com\/ValthekOn\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/alexandre-mundo\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Happy New Year 2019! Anatova is here! | McAfee Blog","description":"During our continuous hunt for new threats, we discovered a new ransomware family we call Anatova (based on the name of the ransom note). Anatova was","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Happy New Year 2019! Anatova is here! | McAfee Blog","og_description":"During our continuous hunt for new threats, we discovered a new ransomware family we call Anatova (based on the name of the ransom note). Anatova was","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/happy-new-year-2019-anatova-is-here\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2019-01-22T20:43:53+00:00","article_modified_time":"2025-06-02T07:51:58+00:00","og_image":[{"width":2048,"height":1415,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/12\/Digitally-Generated-Image-of-Online-Virus-Concept.jpg","type":"image\/jpeg"}],"author":"Alexandre Mundo","twitter_card":"summary_large_image","twitter_creator":"@ValthekOn","twitter_site":"@McAfee","twitter_misc":{"Written by":"Alexandre Mundo","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/happy-new-year-2019-anatova-is-here\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/happy-new-year-2019-anatova-is-here\/"},"author":{"name":"Alexandre Mundo","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/c3f45299d8c53eed9afcc781d0664cb0"},"headline":"Happy New Year 2019! Anatova is here!","datePublished":"2019-01-22T20:43:53+00:00","dateModified":"2025-06-02T07:51:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/happy-new-year-2019-anatova-is-here\/"},"wordCount":2289,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/happy-new-year-2019-anatova-is-here\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/12\/Digitally-Generated-Image-of-Online-Virus-Concept.jpg","articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/happy-new-year-2019-anatova-is-here\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/happy-new-year-2019-anatova-is-here\/","name":"Happy New Year 2019! Anatova is here! | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/happy-new-year-2019-anatova-is-here\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/happy-new-year-2019-anatova-is-here\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/12\/Digitally-Generated-Image-of-Online-Virus-Concept.jpg","datePublished":"2019-01-22T20:43:53+00:00","dateModified":"2025-06-02T07:51:58+00:00","description":"During our continuous hunt for new threats, we discovered a new ransomware family we call Anatova (based on the name of the ransom note). Anatova was","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/happy-new-year-2019-anatova-is-here\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/happy-new-year-2019-anatova-is-here\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/happy-new-year-2019-anatova-is-here\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/12\/Digitally-Generated-Image-of-Online-Virus-Concept.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/12\/Digitally-Generated-Image-of-Online-Virus-Concept.jpg","width":2048,"height":1415},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/happy-new-year-2019-anatova-is-here\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"Happy New Year 2019! Anatova is here!"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/c3f45299d8c53eed9afcc781d0664cb0","name":"Alexandre Mundo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/80b0982f90036536db33ea6886ff3c35","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/07\/alex-150x150.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/07\/alex-150x150.png","caption":"Alexandre Mundo"},"description":"Alexandre Mundo, Senior Malware Analyst is part of Mcafee's Advanced Threat Research team. He reverses the new threads in advanced attacks and make research of them in a daily basis. He is focused in APT and new, and old but very active, ransomware attacks and malware. He performs malware and forensic analysis and teach junior malware analysts and has developed training courses, workshops and presentations of malware analysis. He worked as freelance and consultor in the past too.","sameAs":["https:\/\/www.linkedin.com\/in\/alexandre-mundo-alguacil-38a98011a\/","https:\/\/x.com\/ValthekOn"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/alexandre-mundo\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/93918","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/1028"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=93918"}],"version-history":[{"count":2,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/93918\/revisions"}],"predecessor-version":[{"id":214794,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/93918\/revisions\/214794"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/93005"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=93918"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=93918"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=93918"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=93918"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}