{"id":99427,"date":"2020-04-02T11:21:35","date_gmt":"2020-04-02T18:21:35","guid":{"rendered":"\/blogs\/?p=99427"},"modified":"2024-02-19T00:43:20","modified_gmt":"2024-02-19T08:43:20","slug":"nemty-ransomware-learning-by-doing","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/nemty-ransomware-learning-by-doing\/","title":{"rendered":"Nemty Ransomware &#8211; Learning by Doing"},"content":{"rendered":"<h2>Executive Summary<\/h2>\n<p>The McAfee Advanced Threat Research Team (ATR) observed a new ransomware family named \u2018Nemty\u2019 on 20 August 2019.<\/p>\n<p>We are in an era where ransomware developers face multiple struggles, from the great work done by the security community to protect against their malware, to initiatives such as the <a href=\"https:\/\/www.nomoreransom.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">No More Ransom project<\/a> that offer some victims a way to decrypt their files. Not only that, but the underground criminal community around such ransomware developers can also be hyper critical, calling out bad code and choosing not to purchase ransomware that is not professionally developed.<\/p>\n<p>After one such developer, going by the name jsworm, announced Nemty on underground forums, we noted how the ransomware was not well received by some users in the criminal community. Certain sectors of that forum started to rebuke jsworm for technical decisions made about the functions in the ransomware, as well as the encryption mechanism used.<\/p>\n<p>Jsworm replied to all the comments, adding evidence about how the critical statements made were wrong and showcased the value of their new versions. They also fixed some ugly bugs revealed by users in the forum:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-99429\" src=\"\/wp-content\/uploads\/2020\/04\/forum-post.png\" alt=\"\" width=\"1857\" height=\"800\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/forum-post.png 1857w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/forum-post-300x129.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/forum-post-1024x441.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/forum-post-768x331.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/forum-post-1536x662.png 1536w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/forum-post-205x88.png 205w\" sizes=\"auto, (max-width: 1857px) 100vw, 1857px\" \/><\/p>\n<p>One of the users in the forum highlighted a function for how Nemty detects extension dupes in a system, which needed to be re-written by the author:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-99430\" src=\"\/wp-content\/uploads\/2020\/04\/extension-dupes.png\" alt=\"\" width=\"1206\" height=\"691\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/extension-dupes.png 1206w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/extension-dupes-300x172.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/extension-dupes-1024x587.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/extension-dupes-768x440.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/extension-dupes-205x117.png 205w\" sizes=\"auto, (max-width: 1206px) 100vw, 1206px\" \/><\/p>\n<p>Despite the shortcomings in their ransomware, the Nemty developers are still in the underground forum, releasing new samples and infecting users through their affiliate program.<\/p>\n<h2>Telemetry<\/h2>\n<p>Based on our telemetry, we have seen Nemty activity in these locations:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-99431\" src=\"\/wp-content\/uploads\/2020\/04\/telemtry.png\" alt=\"\" width=\"1339\" height=\"748\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/telemtry.png 1339w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/telemtry-300x168.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/telemtry-1024x572.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/telemtry-768x429.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/telemtry-205x115.png 205w\" sizes=\"auto, (max-width: 1339px) 100vw, 1339px\" \/><\/p>\n<p style=\"text-align: center;\">FIGURE 1. Telemetry Map<\/p>\n<h2>Nemty Technical Analysis<\/h2>\n<p>Nemty runs on a Ransomware-as-a-Service (RaaS) model. We\u2019ve observed it being delivered using:<\/p>\n<ul>\n<li>RIG Exploit Kit in September 2019<\/li>\n<li>Paypal dummy sites<\/li>\n<li>RDP attacks through affiliates in their campaigns<\/li>\n<li>Botnet: Distributed through Phorpiex botnet in November 2019<\/li>\n<li>Loader: SmokeBot<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-99432\" src=\"\/wp-content\/uploads\/2020\/04\/Nemty-announcement.png\" alt=\"\" width=\"1431\" height=\"378\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/Nemty-announcement.png 1431w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/Nemty-announcement-300x79.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/Nemty-announcement-1024x270.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/Nemty-announcement-768x203.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/Nemty-announcement-205x54.png 205w\" sizes=\"auto, (max-width: 1431px) 100vw, 1431px\" \/><\/p>\n<p style=\"text-align: center;\">FIGURE 2. Nemty ransomware announcement<\/p>\n<p>In the release announcement the Nemty developers offered two types of collaboration: affiliation or private partnership. We found two aliases advertising Nemty, one of which is jsworm, who is quite active in the forums and announces all the news and updates there.<\/p>\n<p>This is the timeline of the operations performed by the Nemty crew:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-99433\" src=\"\/wp-content\/uploads\/2020\/04\/nemty-timeline.png\" alt=\"\" width=\"1658\" height=\"620\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/nemty-timeline.png 1658w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/nemty-timeline-300x112.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/nemty-timeline-1024x383.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/nemty-timeline-768x287.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/nemty-timeline-1536x574.png 1536w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/nemty-timeline-205x77.png 205w\" sizes=\"auto, (max-width: 1658px) 100vw, 1658px\" \/><\/p>\n<p>We observed how the Nemty developers adopted some characteristics from other old ransomware families like the defunct Gandcrab. One example of this is the reuse and reference to a URL that leads to an image featuring Russian text and a picture of the Russian president, like Gandcrab had in its code.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-99573\" src=\"\/wp-content\/uploads\/2020\/04\/Nemty-image.png\" alt=\"\" width=\"1367\" height=\"599\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/Nemty-image.png 1367w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/Nemty-image-300x131.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/Nemty-image-1024x449.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/Nemty-image-768x337.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/Nemty-image-205x90.png 205w\" sizes=\"auto, (max-width: 1367px) 100vw, 1367px\" \/><\/p>\n<p style=\"text-align: center;\">FIGURE 3. Hardcoded URL inside the Nemty ransomware pointing to the same image as GandCrab<\/p>\n<p>The Nemty authors released different versions of their ransomware. In this research article we will highlight how the first version works and the significant changes added in subsequent versions.<\/p>\n<p>Hash:\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 505c0ca5ad0552cce9e047c27120c681ddce127d13afa8a8ad96761b2487191b<\/p>\n<p>Compile Time:\u00a0 \u00a0 2019-08-20 19:13:54<\/p>\n<p>Version:\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 1.0<\/p>\n<p>The malware sample is a 32-bit binary. The packer and malware are written in the C\/C++ language as the author announced on the underground forum.<\/p>\n<p>The compilation date in the PE header is the 20th of August 2019.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-99435\" src=\"\/wp-content\/uploads\/2020\/04\/EXEinfo-image.png\" alt=\"\" width=\"516\" height=\"231\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/EXEinfo-image.png 516w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/EXEinfo-image-300x134.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/EXEinfo-image-205x92.png 205w\" sizes=\"auto, (max-width: 516px) 100vw, 516px\" \/><\/p>\n<p style=\"text-align: center;\">FIGURE 4. EXEInfo Image<\/p>\n<p>Nemty uses RunPE in execution, meaning it unpacks in memory before execution.<\/p>\n<p>Analyzing the sample, we could find how the developer added certain protections to their code, such as:<\/p>\n<ul>\n<li>Decrypting certain information in the memory only if the encryption process is working as planned<\/li>\n<li>Clearing the memory after finishing some operations<\/li>\n<li>Information sharing between different memory addresses, cleaning the previous memory space used<\/li>\n<\/ul>\n<h2>Ransomware Note Creation Process<\/h2>\n<p>In order to create the ransomware note, Nemty takes each string and saves it into memory. When the ransomware compiles all the required strings it will join them together to create the entire ransomware note. In this operation, Nemty will decrypt line by line, moving the data to another memory address and cleaning the previous one to leave the information only in the new memory space.<\/p>\n<p>For the first version of Nemty, the encryption method was not applied consistently to all the strings, which is why it is possible to see some strings and spot part of the functionalities or juicy files from them.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-99436\" src=\"\/wp-content\/uploads\/2020\/04\/clear-strings-in-Nemty.png\" alt=\"\" width=\"1430\" height=\"295\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/clear-strings-in-Nemty.png 1430w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/clear-strings-in-Nemty-300x62.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/clear-strings-in-Nemty-1024x211.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/clear-strings-in-Nemty-768x158.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/clear-strings-in-Nemty-205x42.png 205w\" sizes=\"auto, (max-width: 1430px) 100vw, 1430px\" \/><\/p>\n<p style=\"text-align: center;\">FIGURE 5. Clear strings in Nemty<\/p>\n<h2>Nemty and the Logical Units<\/h2>\n<p>In execution, Nemty will check all the logical units available in the system, saving the information about them in a static list with the following information:<\/p>\n<ul>\n<li>Type of unit<\/li>\n<li>Available free space<\/li>\n<\/ul>\n<p>Through the use of the Windows API, \u2018GetDriveTypeA\u2019, the ransomware will differentiate units between:<\/p>\n<ul>\n<li>Removable<\/li>\n<li>Fixed<\/li>\n<li>Network<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-99437\" src=\"\/wp-content\/uploads\/2020\/04\/checking-the-type-of-logic-units.png\" alt=\"\" width=\"919\" height=\"424\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/checking-the-type-of-logic-units.png 919w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/checking-the-type-of-logic-units-300x138.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/checking-the-type-of-logic-units-768x354.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/checking-the-type-of-logic-units-205x95.png 205w\" sizes=\"auto, (max-width: 919px) 100vw, 919px\" \/><\/p>\n<p style=\"text-align: center;\">FIGURE 6. Checking the type of logic units<\/p>\n<p>To check the free space available in the system, Nemty will use \u201cGetDiskFreeSpaceExA\u201d, again through the Windows API:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-99438\" src=\"\/wp-content\/uploads\/2020\/04\/checking-free-disk-space.png\" alt=\"\" width=\"809\" height=\"231\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/checking-free-disk-space.png 809w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/checking-free-disk-space-300x86.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/checking-free-disk-space-768x219.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/checking-free-disk-space-205x59.png 205w\" sizes=\"auto, (max-width: 809px) 100vw, 809px\" \/><\/p>\n<p style=\"text-align: center;\">FIGURE 7. Checking free disk space<\/p>\n<h2>Extracting Public IP Address from the Victim<\/h2>\n<p>Since the first version, Nemty has implemented a functionality to extract the public IP address of the victim. The information is extracted through a request to the IPIFY service at <a href=\"http:\/\/api.ipify.org\">http:\/\/api.ipify.org<\/a>. These types of services are frequently used by RaaS to check the location where the victim was infected.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-99439\" src=\"\/wp-content\/uploads\/2020\/04\/Nemty-getting-public-IP.png\" alt=\"\" width=\"454\" height=\"298\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/Nemty-getting-public-IP.png 454w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/Nemty-getting-public-IP-300x197.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/Nemty-getting-public-IP-197x129.png 197w\" sizes=\"auto, (max-width: 454px) 100vw, 454px\" \/><\/p>\n<p style=\"text-align: center;\">FIGURE 8. Nemty getting the public IP<\/p>\n<p>The User-agent for some of the Nemty versions was the \u2018Chrome\u2019 string. The user-agent is hardcoded as a single string in the ransomware instead of using an original user-agent.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-99440\" src=\"\/wp-content\/uploads\/2020\/04\/getting-victim-IP.png\" alt=\"\" width=\"973\" height=\"359\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/getting-victim-IP.png 973w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/getting-victim-IP-300x111.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/getting-victim-IP-768x283.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/getting-victim-IP-205x76.png 205w\" sizes=\"auto, (max-width: 973px) 100vw, 973px\" \/><\/p>\n<p style=\"text-align: center;\">FIGURE 9. Getting the IP address of the victim machine<\/p>\n<p>The IPIFY service is used to retrieve the public IP address of the victim and, with the extracted data, Nemty makes another connection to http:\/\/api.db-api.com\/v2\/free\/countryName using the data previously obtained as an argument. The extracted IP address and country data is used later used as a part of the ransomware note creation.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-99442\" src=\"\/wp-content\/uploads\/2020\/04\/country-name-strings.png\" alt=\"\" width=\"1063\" height=\"495\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/country-name-strings.png 1063w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/country-name-strings-300x140.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/country-name-strings-1024x477.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/country-name-strings-768x358.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/country-name-strings-205x95.png 205w\" sizes=\"auto, (max-width: 1063px) 100vw, 1063px\" \/><\/p>\n<p style=\"text-align: center;\">FIGURE 10. Getting the country name strings based on the IP address<\/p>\n<h2>Victim Information Extraction<\/h2>\n<p>Nemty will extract the following information from the victim:<\/p>\n<ul>\n<li>Username\n<ul>\n<li>Using the windows API GetUserNameA<\/li>\n<\/ul>\n<\/li>\n<li>Computer name\n<ul>\n<li>Using the windows API GetComputerNameA<\/li>\n<\/ul>\n<\/li>\n<li>Hardware profile\n<ul>\n<li>Using the windows API GetCurrentHwProfileA<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>With this data, the authors ensure that the infected victim is unique, which helps the RaaS operators quantify how many victims they were able to infect themselves or through the use of affiliates.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-99444\" src=\"\/wp-content\/uploads\/2020\/04\/getting-user-data.png\" alt=\"\" width=\"859\" height=\"465\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/getting-user-data.png 859w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/getting-user-data-300x162.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/getting-user-data-768x416.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/getting-user-data-205x111.png 205w\" sizes=\"auto, (max-width: 859px) 100vw, 859px\" \/><\/p>\n<p style=\"text-align: center;\">FIGURE 11. Get Username, Computer Name and Hardware Profile from the victim machine<\/p>\n<h2>Nemty 1.0, Wrongly Applying the Country Protection<\/h2>\n<p>RaaS families usually apply some protections to prevent infecting certain geographic regions. In the first version, Nemty still had this feature in development as our analysis showed that the ransomware did not check whether the victim belonged to any of the supposed blacklisted countries. During our analysis of ransomware it is quite usual to find functions that are still in development and are then incorporated in future versions.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-99445\" src=\"\/wp-content\/uploads\/2020\/04\/countries.png\" alt=\"\" width=\"146\" height=\"176\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/countries.png 146w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/countries-107x129.png 107w\" sizes=\"auto, (max-width: 146px) 100vw, 146px\" \/><\/p>\n<p>If the detected country is in the blacklist, Nemty returns the string \u201ctrue\u201d and keeps it in the config. If the country is not found, the value of the field will be false.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-99446\" src=\"\/wp-content\/uploads\/2020\/04\/country-name-check.png\" alt=\"\" width=\"848\" height=\"529\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/country-name-check.png 848w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/country-name-check-300x187.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/country-name-check-768x479.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/country-name-check-205x129.png 205w\" sizes=\"auto, (max-width: 848px) 100vw, 848px\" \/><\/p>\n<p style=\"text-align: center;\">FIGURE 12. Check the country name and return true or false string<\/p>\n<h2>Nemty Encryption Keys<\/h2>\n<p>Immediately after making this check, Nemty will decode, from base64, the value of the master key and keep it in a memory address to use later. In parallel, it will prepare a random string with a fixed size of 7 characters and use it with the string \u201c_NEMTY_\u201d to create the ransomware note with the specific extension used in the encrypted files. Nemty will create a pair of RSA keys, one public and one private, in this process.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-99447\" src=\"\/wp-content\/uploads\/2020\/04\/export-public-keys.png\" alt=\"\" width=\"817\" height=\"485\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/export-public-keys.png 817w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/export-public-keys-300x178.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/export-public-keys-768x456.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/export-public-keys-205x122.png 205w\" sizes=\"auto, (max-width: 817px) 100vw, 817px\" \/><\/p>\n<p style=\"text-align: center;\">FIGURE 13. Export public RSA and private keys<\/p>\n<p>Within this operation, Nemty will encode those keys in base64:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-99448\" src=\"\/wp-content\/uploads\/2020\/04\/encode-of-RSA-keys.png\" alt=\"\" width=\"818\" height=\"394\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/encode-of-RSA-keys.png 818w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/encode-of-RSA-keys-300x144.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/encode-of-RSA-keys-768x370.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/encode-of-RSA-keys-205x99.png 205w\" sizes=\"auto, (max-width: 818px) 100vw, 818px\" \/><\/p>\n<p style=\"text-align: center;\">FIGURE 14. Encode of RSA keys generated<\/p>\n<p>After this encoding, Nemty will decode again the victim RSA public key and import it for later use.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-99449\" src=\"\/wp-content\/uploads\/2020\/04\/decoding-RSA-key.png\" alt=\"\" width=\"990\" height=\"544\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/decoding-RSA-key.png 990w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/decoding-RSA-key-300x165.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/decoding-RSA-key-768x422.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/decoding-RSA-key-205x113.png 205w\" sizes=\"auto, (max-width: 990px) 100vw, 990px\" \/><\/p>\n<p style=\"text-align: center;\">FIGURE 15. Decoding of the RSA public key for later use<\/p>\n<p>The same operation is again used but this time with the master RSA public key from the ransomware developers.<\/p>\n<h2>Nemty Encryption Keys<\/h2>\n<p>In the encryption process, with all the data collected from the user, Nemty will create their config file, all in memory. The config file is a JSON structured file with all the collected data and the AES key previously created. Regarding the key used, it is the same for all of the files, however Nemty uses a different IV for each file.<\/p>\n<h2>Nemty Configuration File:<\/h2>\n<p>An example of the information collected by Nemty and later used in the config file can be found below:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-99450\" src=\"\/wp-content\/uploads\/2020\/04\/information-collected-by-Nemty.png\" alt=\"\" width=\"245\" height=\"271\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/information-collected-by-Nemty.png 245w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/information-collected-by-Nemty-117x129.png 117w\" sizes=\"auto, (max-width: 245px) 100vw, 245px\" \/><\/p>\n<p>This is an example Nemty configuration file:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-99451\" src=\"\/wp-content\/uploads\/2020\/04\/Nemty-config-file.png\" alt=\"\" width=\"1428\" height=\"831\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/Nemty-config-file.png 1428w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/Nemty-config-file-300x175.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/Nemty-config-file-1024x596.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/Nemty-config-file-768x447.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/Nemty-config-file-205x119.png 205w\" sizes=\"auto, (max-width: 1428px) 100vw, 1428px\" \/><\/p>\n<p style=\"text-align: center;\">FIGURE 16. Nemty config file<\/p>\n<p>The different fields for the configuration file are:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-99452\" src=\"\/wp-content\/uploads\/2020\/04\/configuration-fields.png\" alt=\"\" width=\"786\" height=\"387\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/configuration-fields.png 786w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/configuration-fields-300x148.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/configuration-fields-768x378.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/configuration-fields-205x101.png 205w\" sizes=\"auto, (max-width: 786px) 100vw, 786px\" \/><\/p>\n<p>The configuration file will be saved on the disk encrypted with a RSA public key of 8192 bits and encoded in base64.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-99453\" src=\"\/wp-content\/uploads\/2020\/04\/crypt-the-config-file.png\" alt=\"\" width=\"830\" height=\"559\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/crypt-the-config-file.png 830w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/crypt-the-config-file-300x202.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/crypt-the-config-file-768x517.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/crypt-the-config-file-192x129.png 192w\" sizes=\"auto, (max-width: 830px) 100vw, 830px\" \/><\/p>\n<p style=\"text-align: center;\">FIGURE 17. Crypt the config file and encode in base64<\/p>\n<p>Nemty will get the username logged in the system through \u2018SHGetFolderPathW\u2019 and will save and encrypt it with the .nemty extension on that folder.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-99454\" src=\"\/wp-content\/uploads\/2020\/04\/getting-root-folder.png\" alt=\"\" width=\"938\" height=\"124\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/getting-root-folder.png 938w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/getting-root-folder-300x40.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/getting-root-folder-768x102.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/getting-root-folder-205x27.png 205w\" sizes=\"auto, (max-width: 938px) 100vw, 938px\" \/><\/p>\n<p style=\"text-align: center;\">FIGURE 18. Getting the user\u2019s root folder<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-99455\" src=\"\/wp-content\/uploads\/2020\/04\/creation-of-config-file.png\" alt=\"\" width=\"889\" height=\"361\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/creation-of-config-file.png 889w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/creation-of-config-file-300x122.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/creation-of-config-file-768x312.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/creation-of-config-file-205x83.png 205w\" sizes=\"auto, (max-width: 889px) 100vw, 889px\" \/><\/p>\n<p style=\"text-align: center;\">FIGURE 19. Creation of the config file on the disk<\/p>\n<h2>Nemty Encryption Threads<\/h2>\n<p>For the encryption, Nemty will create a new thread per each logic unit found in the system in order to encrypt the files.<\/p>\n<p>The method used to encrypt the files is similar to other RaaS families, getting all the files using the function \u2018FindFirstFileW\u2019 and \u2018FindNextFileW. Nemty will avoid encrypting folders with the following names:<\/p>\n<ul>\n<li>.<\/li>\n<li>..<\/li>\n<li>\u2026<\/li>\n<\/ul>\n<p>The encryption process will also avoid using files with the following names:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-99456\" src=\"\/wp-content\/uploads\/2020\/04\/ignored-files.png\" alt=\"\" width=\"304\" height=\"241\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/ignored-files.png 304w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/ignored-files-300x238.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/ignored-files-163x129.png 163w\" sizes=\"auto, (max-width: 304px) 100vw, 304px\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-99457\" src=\"\/wp-content\/uploads\/2020\/04\/blacklisted-folder-and-file-names.png\" alt=\"\" width=\"666\" height=\"561\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/blacklisted-folder-and-file-names.png 666w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/blacklisted-folder-and-file-names-300x253.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/blacklisted-folder-and-file-names-153x129.png 153w\" sizes=\"auto, (max-width: 666px) 100vw, 666px\" \/><\/p>\n<p style=\"text-align: center;\">FIGURE 20. Check of the blacklisted folder and file names<\/p>\n<p>This check is done using the insensitive function \u201clstrcmpiW\u201d. Where Nemty is encrypting a file it will try two combinations, one in lower case, one in uppercase.<\/p>\n<p>The extensions checked are:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-99458\" src=\"\/wp-content\/uploads\/2020\/04\/extension-check.png\" alt=\"\" width=\"283\" height=\"344\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/extension-check.png 283w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/extension-check-247x300.png 247w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/extension-check-106x129.png 106w\" sizes=\"auto, (max-width: 283px) 100vw, 283px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-99459\" src=\"\/wp-content\/uploads\/2020\/04\/file-extension-check.png\" alt=\"\" width=\"963\" height=\"529\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/file-extension-check.png 963w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/file-extension-check-300x165.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/file-extension-check-768x422.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/file-extension-check-205x113.png 205w\" sizes=\"auto, (max-width: 963px) 100vw, 963px\" \/><\/p>\n<p style=\"text-align: center;\">FIGURE 21. Check of the file extensions<\/p>\n<p>If Nemty has successful checks, it will create a random IV and encrypt part of the file with the AES keys previously generated. It then begins the IV using the victim\u2019s RSA public key and appends it to the encrypted file.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-99460\" src=\"\/wp-content\/uploads\/2020\/04\/write-crypted-file.png\" alt=\"\" width=\"780\" height=\"497\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/write-crypted-file.png 780w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/write-crypted-file-300x191.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/write-crypted-file-768x489.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/write-crypted-file-202x129.png 202w\" sizes=\"auto, (max-width: 780px) 100vw, 780px\" \/><\/p>\n<p style=\"text-align: center;\">FIGURE 22. Write the crypted file and put the IV in it<\/p>\n<p>Nemty will put the information required to decrypt the file in the encrypted part of it and then add the extension \u201c.nemty\u201d and continue with the next folder or file.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-99461\" src=\"\/wp-content\/uploads\/2020\/04\/Nemty-extension.png\" alt=\"\" width=\"1044\" height=\"394\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/Nemty-extension.png 1044w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/Nemty-extension-300x113.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/Nemty-extension-1024x386.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/Nemty-extension-768x290.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/Nemty-extension-205x77.png 205w\" sizes=\"auto, (max-width: 1044px) 100vw, 1044px\" \/><\/p>\n<p style=\"text-align: center;\">FIGURE 23. Renaming of the new file with the Nemty extension<\/p>\n<p>After finishing the encryption process Nemty will use the function \u2018WaitForSingleObjects\u2019 and wait for all the pending threads. It will also download the Tor Browser and open a connection in the loopback with the configuration file.<\/p>\n<p>As a final action, Nemty will execute the command prompt of the machine with the hardcoded word \u201ccmd.exe\u201d and open the ransomware note.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-99462\" src=\"\/wp-content\/uploads\/2020\/04\/opening-the-ransom-note.png\" alt=\"\" width=\"968\" height=\"543\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/opening-the-ransom-note.png 968w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/opening-the-ransom-note-300x168.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/opening-the-ransom-note-768x431.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/opening-the-ransom-note-205x115.png 205w\" sizes=\"auto, (max-width: 968px) 100vw, 968px\" \/><\/p>\n<p style=\"text-align: center;\">FIGURE 24. Opening the ransom note<\/p>\n<p>The style of the ransomware note changed across the different versions that the Nemty developers released.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-99463\" src=\"\/wp-content\/uploads\/2020\/04\/ransom-note-versions.png\" alt=\"\" width=\"1430\" height=\"528\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/ransom-note-versions.png 1430w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/ransom-note-versions-300x111.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/ransom-note-versions-1024x378.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/ransom-note-versions-768x284.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/ransom-note-versions-205x76.png 205w\" sizes=\"auto, (max-width: 1430px) 100vw, 1430px\" \/><\/p>\n<p style=\"text-align: center;\">FIGURE 25. Different ransom notes between versions<\/p>\n<p>On the left side, we can see Nemty version 1.4. On the right side, the ransomware note belongs to Nemty version 1.0.<\/p>\n<p>Like other ransomware families, Nemty will perform these actions at the end:<\/p>\n<ul>\n<li>Delete the shadow copies using vssadmin<\/li>\n<li>Disable boot protections with bcedit and wbadmin<\/li>\n<li>Delete the Windows catalog with WMIC using the class shadow copy<\/li>\n<\/ul>\n<p>All these calls are made with the function \u201cShellExecuteA\u201d with the \u201ccmd.exe\u201d string as the main program and the other as an argument.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-99464\" src=\"\/wp-content\/uploads\/2020\/04\/deleting-shadow-volumes.png\" alt=\"\" width=\"962\" height=\"273\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/deleting-shadow-volumes.png 962w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/deleting-shadow-volumes-300x85.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/deleting-shadow-volumes-768x218.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/deleting-shadow-volumes-205x58.png 205w\" sizes=\"auto, (max-width: 962px) 100vw, 962px\" \/><\/p>\n<p style=\"text-align: center;\">FIGURE 26. Deletion of the shadow volumes, disabling boot protections, and deleting the catalog<\/p>\n<h2>Mutex<\/h2>\n<p>Nemty will create a specific mutex in the system every time it infects a system:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-99465\" src=\"\/wp-content\/uploads\/2020\/04\/mutex.png\" alt=\"\" width=\"554\" height=\"192\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/mutex.png 554w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/mutex-300x104.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/mutex-205x71.png 205w\" sizes=\"auto, (max-width: 554px) 100vw, 554px\" \/><\/p>\n<p>The ransomware will check the existence of the mutex using the function \u201cGetLastError\u201d.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-99467\" src=\"\/wp-content\/uploads\/2020\/04\/creation-of-hardcoded-mutex.png\" alt=\"\" width=\"1148\" height=\"330\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/creation-of-hardcoded-mutex.png 1148w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/creation-of-hardcoded-mutex-300x86.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/creation-of-hardcoded-mutex-1024x294.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/creation-of-hardcoded-mutex-768x221.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/creation-of-hardcoded-mutex-205x59.png 205w\" sizes=\"auto, (max-width: 1148px) 100vw, 1148px\" \/><\/p>\n<p style=\"text-align: center;\">FIGURE 27. Creation of the hardcoded mutex<\/p>\n<p>If the system was infected previously with Nemty and it contains the mutex, the ransomware will finish the execution using the function \u201cExitThread\u201d. This call will end the main thread of the malware, finishing the execution and returning the control to the operative system.<\/p>\n<p>The \u201cExitProcess\u201d function is often used to avoid simple API monitoring.<\/p>\n<p>Nemty uses RC4 to encrypt its strings and, in execution, those will be decrypted and decoded from base64 and then be used as a part of the ransomware note.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-99468\" src=\"\/wp-content\/uploads\/2020\/04\/calculating-memory-size.png\" alt=\"\" width=\"990\" height=\"298\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/calculating-memory-size.png 990w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/calculating-memory-size-300x90.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/calculating-memory-size-768x231.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/calculating-memory-size-205x62.png 205w\" sizes=\"auto, (max-width: 990px) 100vw, 990px\" \/><\/p>\n<p style=\"text-align: center;\">FIGURE 28. Calculating the size of memory to decode from base64<\/p>\n<p>The RC4 key used for Nemty 1.0 is \u2018f*ckav\u2019. Other malware families also often use offensive names or expressions regarding the security industry in their implementations.<\/p>\n<p>For decryption, the developers implemented a function through the API to reserve the needed space with \u2018malloc\u2019 and later decode the string in memory. As a protection, if the ransomware fails to get the size or on the decoding operation, the execution will finish using \u201cExitThread\u201d.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-99469\" src=\"\/wp-content\/uploads\/2020\/04\/decrypt-with-RC4.png\" alt=\"\" width=\"783\" height=\"388\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/decrypt-with-RC4.png 783w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/decrypt-with-RC4-300x149.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/decrypt-with-RC4-768x381.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/decrypt-with-RC4-205x102.png 205w\" sizes=\"auto, (max-width: 783px) 100vw, 783px\" \/><\/p>\n<p style=\"text-align: center;\">FIGURE 29. Decrypt the data with RC4<\/p>\n<h2>Nemty &#8211; Learning by Doing<\/h2>\n<p>Since the first version of Nemty was released, the authors started to evolve their ransomware by adding new capabilities and fixing aspects of its code.<\/p>\n<p>Analyzing the early versions of Nemty, we can state that they were more advanced in techniques and obfuscation compared to other RaaS families, but the first version still contained functions with some mistakes, such as references to API calls that were not used by the ransomware.<\/p>\n<p>At the time we wrote this article, the developers behind the ransomware have released 9 different versions:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-99470\" src=\"\/wp-content\/uploads\/2020\/04\/Nemty-versions.png\" alt=\"\" width=\"848\" height=\"520\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/Nemty-versions.png 848w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/Nemty-versions-300x184.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/Nemty-versions-768x471.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/Nemty-versions-205x126.png 205w\" sizes=\"auto, (max-width: 848px) 100vw, 848px\" \/><\/p>\n<h2>Changelog Nemty 1.4<\/h2>\n<p>We have observed changes across the different versions of Nemty. For version 1.4, the developers applied the following changes:<\/p>\n<ul>\n<li>The ransomware will gather information regarding the logical units after checking if the victim has the Nemty mutex.<\/li>\n<li>Language check\n<ul>\n<li>In this version, Nemty will respect and avoid encrypting files for victims inside the CIS countries.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-99471\" src=\"\/wp-content\/uploads\/2020\/04\/blacklisted-languages.png\" alt=\"\" width=\"709\" height=\"134\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/blacklisted-languages.png 709w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/blacklisted-languages-300x57.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/blacklisted-languages-205x39.png 205w\" sizes=\"auto, (max-width: 709px) 100vw, 709px\" \/><\/p>\n<p style=\"text-align: center;\">FIGURE 30. Check to avoid crypting if the language is blacklisted<\/p>\n<h2>CHANGES IN VERSION 1.5<\/h2>\n<p>Compared with Nemty 1.4, this newer version was a major release, adding the following changes:<\/p>\n<ul>\n<li>Victim information stored in the registry<\/li>\n<li>Persistence<\/li>\n<li>Ability to kill processes and services<\/li>\n<li>New mutex<\/li>\n<li>Hardcoded image change<\/li>\n<li>C2 panel publicly accessible<\/li>\n<li>4 new blacklisted countries<\/li>\n<\/ul>\n<h2>Victim Information Stored in the Registry<\/h2>\n<p>The first major change in this version of Nemty was the use of the Windows registry to store information about the infected machine. The hive used is HKCU with the NEMTY identifier.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-99472\" src=\"\/wp-content\/uploads\/2020\/04\/information-saved-in-the-registry.png\" alt=\"\" width=\"832\" height=\"438\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/information-saved-in-the-registry.png 832w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/information-saved-in-the-registry-300x158.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/information-saved-in-the-registry-768x404.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/information-saved-in-the-registry-205x108.png 205w\" sizes=\"auto, (max-width: 832px) 100vw, 832px\" \/><\/p>\n<p style=\"text-align: center;\">FIGURE 31. Information saved in the registry<\/p>\n<h2>Ability to Kill Processes and Services<\/h2>\n<p>The second feature added is the possibility to kill certain processes to facilitate file encryption in the system, something that is commonly implemented by other RaaS families.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-99473\" src=\"\/wp-content\/uploads\/2020\/04\/processes.png\" alt=\"\" width=\"257\" height=\"160\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/processes.png 257w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/processes-205x129.png 205w\" sizes=\"auto, (max-width: 257px) 100vw, 257px\" \/><\/p>\n<p>In order to kill those processes, Nemty will use taskkill \/im PROCESSNAME.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-99474\" src=\"\/wp-content\/uploads\/2020\/04\/termination-of-processes.png\" alt=\"\" width=\"750\" height=\"449\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/termination-of-processes.png 750w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/termination-of-processes-300x180.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/termination-of-processes-205x123.png 205w\" sizes=\"auto, (max-width: 750px) 100vw, 750px\" \/><\/p>\n<p style=\"text-align: center;\">FIGURE 32. Termination of processes<\/p>\n<p>Among certain kill processes, Nemty will stop certain services in the system with the same objectives:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-99475\" src=\"\/wp-content\/uploads\/2020\/04\/stop-services.png\" alt=\"\" width=\"435\" height=\"190\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/stop-services.png 435w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/stop-services-300x131.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/stop-services-205x90.png 205w\" sizes=\"auto, (max-width: 435px) 100vw, 435px\" \/><\/p>\n<p>To stop the services Nemty, will use \u201cnet stop\u201d and the service name.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-99476\" src=\"\/wp-content\/uploads\/2020\/04\/stop-of-services.png\" alt=\"\" width=\"726\" height=\"288\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/stop-of-services.png 726w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/stop-of-services-300x119.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/stop-of-services-205x81.png 205w\" sizes=\"auto, (max-width: 726px) 100vw, 726px\" \/><\/p>\n<p style=\"text-align: center;\">FIGURE 33. Stop of services on the victim machine<\/p>\n<h2>Persistence<\/h2>\n<p>The first versions of Nemty did not have any persistence technique, so the author decided to add it in version 1.5. The persistence is done through a scheduled task, \u201ccreate \/sc onlogon\u201d. The binary is copied into the main user directory with the name hardcoded (this can be adapted for every binary released) \u201cAdobeUpdate.exe\u201d and the task launched using \u201cShellExecute\u201d.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-99477\" src=\"\/wp-content\/uploads\/2020\/04\/persistence.png\" alt=\"\" width=\"977\" height=\"526\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/persistence.png 977w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/persistence-300x162.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/persistence-768x413.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/persistence-205x110.png 205w\" sizes=\"auto, (max-width: 977px) 100vw, 977px\" \/><\/p>\n<p style=\"text-align: center;\">FIGURE 34. Creation of a schedule task to persistence<\/p>\n<h2>Hardcoded Image Change<\/h2>\n<p>Regarding the picture hardcoded in the first versions, for this version, Nemty decided to change it and include a new one.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-99478\" src=\"\/wp-content\/uploads\/2020\/04\/new-image.png\" alt=\"\" width=\"965\" height=\"623\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/new-image.png 965w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/new-image-300x194.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/new-image-768x496.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/new-image-200x129.png 200w\" sizes=\"auto, (max-width: 965px) 100vw, 965px\" \/><\/p>\n<p style=\"text-align: center;\">FIGURE 35. New image referenced in the malware<\/p>\n<h2>C2 Panel Publicly Accessible<\/h2>\n<p>The author, decided to swap TOR for a public C2 panel where Nemty will send the victim\u2019s data.<\/p>\n<p style=\"text-align: center;\">https:\/\/nemty.hk\/public\/gate?data=&lt;victim_data&gt;<\/p>\n<h2>4 New Blacklisted Countries<\/h2>\n<p>For this version, the author added four new countries to the blacklist:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-99479\" src=\"\/wp-content\/uploads\/2020\/04\/new-country-blacklist.png\" alt=\"\" width=\"134\" height=\"147\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/new-country-blacklist.png 134w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/new-country-blacklist-118x129.png 118w\" sizes=\"auto, (max-width: 134px) 100vw, 134px\" \/><\/p>\n<h2>Changes in Version 1.6<\/h2>\n<p>Compared with the previous version, Nemty in the 1.6 version only implemented one single change. The author used their own implementation of the AES algorithm instead of using the CryptoAPI.<\/p>\n<p>The way that the malware previously generated the random key was based on functions of time but with version 1.6 it mostly used some other value to generate the random key.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-99480\" src=\"\/wp-content\/uploads\/2020\/04\/changes-in-key-generation.png\" alt=\"\" width=\"705\" height=\"543\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/changes-in-key-generation.png 705w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/changes-in-key-generation-300x231.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/changes-in-key-generation-167x129.png 167w\" sizes=\"auto, (max-width: 705px) 100vw, 705px\" \/><\/p>\n<p style=\"text-align: center;\">FIGURE 36. Changes in the key generation function<\/p>\n<p>One of the partners in the <a href=\"https:\/\/www.nomoreransom.org\/\">No More Ransom project<\/a>, Tesorion, decided to publish a free decryptor for victims infected by Nemty. After the announcement, the Nemty authors released a new version utilizing a proper AES function using CryptoAPI.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-99481\" src=\"\/wp-content\/uploads\/2020\/04\/new-implementation-of-AES-crypto.png\" alt=\"\" width=\"786\" height=\"556\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/new-implementation-of-AES-crypto.png 786w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/new-implementation-of-AES-crypto-300x212.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/new-implementation-of-AES-crypto-768x543.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/new-implementation-of-AES-crypto-182x129.png 182w\" sizes=\"auto, (max-width: 786px) 100vw, 786px\" \/><\/p>\n<p style=\"text-align: center;\">FIGURE 37. New implementation of the AES crypto using CryptoAPI<\/p>\n<p>Like in a game of cat and mouse, Tesorion released a new decryptor for this specific version. The Nemty authors responded by including a harcoded message to Tesorion in the samples:<\/p>\n<p style=\"text-align: center;\"><em>Tesorion \u201ctesorion, thanks for your article\u201d.<\/em><\/p>\n<h2>Second Version of 1.6<\/h2>\n<p>Instead of changing the Nemty version number in this new binary, the authors released a new version of 1.6 with some changes.<\/p>\n<p>The changes added for this version are:<\/p>\n<ul>\n<li>New vssadmin utility used<\/li>\n<li>New processes and services to kill<\/li>\n<li>FakeNet feature<\/li>\n<\/ul>\n<p>This new version was released just 2 days after the first 1.6 version was released; this means that the actor is quite active in developing this ransomware.<\/p>\n<h2>New Vssadmin Utility Used<\/h2>\n<p>The first change for this version is how the logical units where enumerated. The Nemty author implemented the use of the utility \u201cvssadmin\u201d and also reduced the capacity of the shadow volumes to 401MB. This change probably helped the ransomware in terms of performance.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-99482\" src=\"\/wp-content\/uploads\/2020\/04\/resizing-shadow-volumes.png\" alt=\"\" width=\"825\" height=\"604\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/resizing-shadow-volumes.png 825w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/resizing-shadow-volumes-300x220.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/resizing-shadow-volumes-768x562.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/resizing-shadow-volumes-176x129.png 176w\" sizes=\"auto, (max-width: 825px) 100vw, 825px\" \/><\/p>\n<p style=\"text-align: center;\">FIGURE 38. Resize of the shadow volumes in the target logic unit<\/p>\n<p>The idea of this change was to remain more stealthy against endpoint security products, instead of just deleting the shadow copy and executing queries through WMI, BCEDIT, etc. The author changed their approach to use vssadmin with the delete flag.<\/p>\n<h2>New Processes and Services to Kill<\/h2>\n<p>The Nemty authors added new processes to kill in order to facilitate file encryption:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-99483\" src=\"\/wp-content\/uploads\/2020\/04\/new-processes-to-kill.png\" alt=\"\" width=\"127\" height=\"157\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/new-processes-to-kill.png 127w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/new-processes-to-kill-104x129.png 104w\" sizes=\"auto, (max-width: 127px) 100vw, 127px\" \/><\/p>\n<p>In addition to new processes, the author also included new services:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-99484\" src=\"\/wp-content\/uploads\/2020\/04\/new-services.png\" alt=\"\" width=\"318\" height=\"64\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/new-services.png 318w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/new-services-300x60.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/new-services-205x41.png 205w\" sizes=\"auto, (max-width: 318px) 100vw, 318px\" \/><\/p>\n<h2>FakeNET Feature<\/h2>\n<p>For this version the Nemty authors decided to add one interesting feature. The ransomware in execution had implemented a function to retrieve the victim\u2019s public IP address. In the case that Nemty cannot connect with the external IP address, the ransomware will add fake data in order to continue the encryption process. The fake data will be:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-99485\" src=\"\/wp-content\/uploads\/2020\/04\/fake-data.png\" alt=\"\" width=\"203\" height=\"53\" \/><\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-99486\" src=\"\/wp-content\/uploads\/2020\/04\/fake-IP-address-and-country-name-information.png\" alt=\"\" width=\"689\" height=\"393\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/fake-IP-address-and-country-name-information.png 689w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/fake-IP-address-and-country-name-information-300x171.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/fake-IP-address-and-country-name-information-205x117.png 205w\" sizes=\"auto, (max-width: 689px) 100vw, 689px\" \/><\/p>\n<p style=\"text-align: center;\">FIGURE 39. Nemty using fake IP address and country name information if it cannot connect to the URL to get a WAN IP<\/p>\n<p>This feature implemented by Nemty will expose users in the protected countries as it will encrypt the system, even if the user belongs to one of the countries specified in the static blacklist.<\/p>\n<h2>Version 2.0<\/h2>\n<p>In this version the developers decided to remove certain features and added a new encryption process:<\/p>\n<ul>\n<li>The FakeNet feature was deleted and Nemty only used the old mechanism to check the victim\u2019s region.<\/li>\n<li>An initial function that prepares a container to use the RC4 algorithm with the name \u201crc4\u201d and get a key based in the hardcoded string (can change in other samples) \u201csosorin :)\u201d. This key is used to decrypt part of the ransom note and certain strings. It changes the use of the authors\u2019 own RC4 implementation to now use the RC4 algorithm with CryptoAPI.<\/li>\n<li>A new generation of RSA containers of keys, improving the key generation process.<\/li>\n<li>The ransom note text included \u201cNEMTY REVENGE\u201d instead of \u201cNEMTY PROJECT\u201d and also added the sentence: \u201cDon\u2019t trust anyone. Even your dog\u201d.<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-99487\" src=\"\/wp-content\/uploads\/2020\/04\/ransomware-note.png\" alt=\"\" width=\"1230\" height=\"546\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/ransomware-note.png 1230w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/ransomware-note-300x133.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/ransomware-note-1024x455.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/ransomware-note-768x341.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/ransomware-note-205x91.png 205w\" sizes=\"auto, (max-width: 1230px) 100vw, 1230px\" \/><\/p>\n<p style=\"text-align: center;\">FIGURE 40. Nemty ransomware note<\/p>\n<h2>Version 2.2<\/h2>\n<p>For this version, the Nemty developers only made two minor changes:<\/p>\n<ul>\n<li>Change of the mutex name<\/li>\n<li>A new ransom note:<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-99488\" src=\"\/wp-content\/uploads\/2020\/04\/example-of-new-ransom-notes.png\" alt=\"\" width=\"955\" height=\"305\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/example-of-new-ransom-notes.png 955w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/example-of-new-ransom-notes-300x96.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/example-of-new-ransom-notes-768x245.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/example-of-new-ransom-notes-205x65.png 205w\" sizes=\"auto, (max-width: 955px) 100vw, 955px\" \/><\/p>\n<p style=\"text-align: center;\">FIGURE 41. Example of the new ransom note<\/p>\n<h2>Version 2.3<\/h2>\n<p>In this version, we found major changes compared with the prior version:<\/p>\n<ul>\n<li>A new mutex value<\/li>\n<li>The service used to get the public IP changed from https:\/\/api.ipify.org to https:\/\/www.myexternalip.com\/raw\n<ul>\n<li>In case the lookup fails, the external address changes from NONE to NOT_DEFINED.<\/li>\n<\/ul>\n<\/li>\n<li>The Windows OS check for XP was duped in prior versions and now only has one specific check.<\/li>\n<li>The configuration fields changed, certain fields were removed and new ones were added.\n<ul>\n<li>This is an example for the new configuration file:<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><em>{<\/em><\/p>\n<p><em>\u00a0\u00a0 &#8220;fileid&#8221;:&#8221;NEMTY_E1EIVPU&#8221;,<\/em><\/p>\n<p><em>\u00a0\u00a0 &#8220;configid&#8221;:&#8221;mArJi2x3q3yFrbvL8EYkKezDeGPgWeOG&#8221;,<\/em><\/p>\n<p><em>\u00a0\u00a0 &#8220;compid&#8221;:&#8221;{a3cande1-f85f-1341-769f-806d6172f54544}&#8221;,<\/em><\/p>\n<p><em>\u00a0\u00a0 &#8220;ip&#8221;:&#8221;NONE&#8221;,<\/em><\/p>\n<p><em>\u00a0\u00a0 &#8220;country&#8221;:&#8221;{\u00a0\u00a0\u00a0 &#8221;\u00a0\u00a0 &#8220;errorCode&#8221;\u00a0\u00a0 &#8220;: &#8221;\u00a0\u00a0 &#8220;INVALID_ADDRESS&#8221;\u00a0\u00a0 &#8220;,\u00a0\u00a0\u00a0 &#8221;\u00a0\u00a0 &#8220;error&#8221;\u00a0\u00a0 &#8220;: &#8221;\u00a0\u00a0 &#8220;invalid addr&#8221;\u00a0\u00a0 &#8220;,&#8221;\u00a0\u00a0 &#8220;version&#8221;\u00a0\u00a0 &#8220;:&#8221;\u00a0\u00a0 2.3\u00a0\u00a0 &#8220;,&#8221;\u00a0\u00a0 &#8220;computer_name&#8221;\u00a0\u00a0 &#8220;:&#8221;\u00a0\u00a0 &#8220;USERPC&#8221;\u00a0\u00a0 &#8220;,&#8221;\u00a0\u00a0 &#8220;username&#8221;\u00a0\u00a0 &#8220;:&#8221;\u00a0\u00a0 &#8220;User&#8221;\u00a0\u00a0 &#8220;,&#8221;\u00a0\u00a0 &#8220;os&#8221;\u00a0\u00a0 &#8220;:&#8221;\u00a0\u00a0 &#8220;Windows XP&#8221;\u00a0\u00a0 &#8220;,&#8221;\u00a0\u00a0 &#8220;pr_key&#8221;\u00a0\u00a0 &#8220;:&#8221;\u00a0\u00a0 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\u00a0\u00a0 &#8220;,&#8221;\u00a0\u00a0 &#8220;drives&#8221;\u00a0\u00a0 &#8220;:[{&#8221;\u00a0\u00a0 &#8220;drive_type&#8221;\u00a0\u00a0 &#8220;:&#8221;\u00a0\u00a0 &#8220;FIXED&#8221;\u00a0\u00a0 &#8220;,&#8221;\u00a0\u00a0 &#8220;drive_letter&#8221;\u00a0\u00a0 &#8220;:&#8221;\u00a0\u00a0 &#8220;C&#8221;:&#8221;\/&#8221;\u00a0\u00a0 &#8220;,&#8221;\u00a0\u00a0 &#8220;total_size&#8221;\u00a0\u00a0 &#8220;:&#8221;\u00a0\u00a0 9GB\u00a0\u00a0 &#8220;,&#8221;\u00a0\u00a0 &#8220;used_size&#8221;\u00a0\u00a0 &#8220;:&#8221;\u00a0\u00a0 9GB\u00a0\u00a0 &#8220;},{&#8221;\u00a0\u00a0 &#8220;drive_type&#8221;\u00a0\u00a0 &#8220;:&#8221;\u00a0\u00a0 &#8220;NETWORK&#8221;\u00a0\u00a0 &#8220;,&#8221;\u00a0\u00a0 &#8220;drive_letter&#8221;\u00a0\u00a0 &#8220;:&#8221;\u00a0\u00a0 &#8220;E&#8221;:&#8221;\/&#8221;\u00a0\u00a0 &#8220;,&#8221;\u00a0\u00a0 &#8220;total_size&#8221;\u00a0\u00a0 &#8220;:&#8221;\u00a0\u00a0 9GB\u00a0\u00a0 &#8220;,&#8221;\u00a0\u00a0 &#8220;used_size&#8221;\u00a0\u00a0 &#8220;:&#8221;\u00a0\u00a0 9GB \u00a0\u00a0&#8220;\\&#8221;}]}&#8221;<\/em><\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li>The User-agent changed to a new one, \u201cNaruto Uzumake\u201d.<\/li>\n<li>Concatenating a lot of taskkill commands through the use of \u201cShellExecuteA\u201d; this version of Nemty kills a lot of new processes.<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-99489\" src=\"\/wp-content\/uploads\/2020\/04\/killing-processes-with-CMD.png\" alt=\"\" width=\"1070\" height=\"118\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/killing-processes-with-CMD.png 1070w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/killing-processes-with-CMD-300x33.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/killing-processes-with-CMD-1024x113.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/killing-processes-with-CMD-768x85.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/killing-processes-with-CMD-205x23.png 205w\" sizes=\"auto, (max-width: 1070px) 100vw, 1070px\" \/><\/p>\n<p style=\"text-align: center;\">FIGURE 42. Killing processes with CMD<\/p>\n<ul>\n<li>For this version, the authors added PowerShell executions using a command prompt with the function \u201cShellExecuteA\u201d :<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-99490\" src=\"\/wp-content\/uploads\/2020\/04\/launching-a-PowerShell-command.png\" alt=\"\" width=\"1056\" height=\"123\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/launching-a-PowerShell-command.png 1056w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/launching-a-PowerShell-command-300x35.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/launching-a-PowerShell-command-1024x119.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/launching-a-PowerShell-command-768x89.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/launching-a-PowerShell-command-205x24.png 205w\" sizes=\"auto, (max-width: 1056px) 100vw, 1056px\" \/><\/p>\n<p style=\"text-align: center;\">FIGURE 43. Launching a PowerShell command<\/p>\n<ul>\n<li>This version added a new subkey in the registry key \u201cRun\u201d in the hive HKEY_CURRENT_USER with the name \u201cdaite drobovik\u201d:<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-99491\" src=\"\/wp-content\/uploads\/2020\/04\/creating-persistence.png\" alt=\"\" width=\"1289\" height=\"506\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/creating-persistence.png 1289w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/creating-persistence-300x118.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/creating-persistence-1024x402.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/creating-persistence-768x301.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/creating-persistence-205x80.png 205w\" sizes=\"auto, (max-width: 1289px) 100vw, 1289px\" \/><\/p>\n<p style=\"text-align: center;\">FIGURE 44. Creating persistence<\/p>\n<ul>\n<li>The ransom note was again changed for this version:<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-99492\" src=\"\/wp-content\/uploads\/2020\/04\/ransom-note-2.3.png\" alt=\"\" width=\"1511\" height=\"567\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/ransom-note-2.3.png 1511w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/ransom-note-2.3-300x113.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/ransom-note-2.3-1024x384.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/ransom-note-2.3-768x288.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/ransom-note-2.3-205x77.png 205w\" sizes=\"auto, (max-width: 1511px) 100vw, 1511px\" \/><\/p>\n<p style=\"text-align: center;\">FIGURE 45. Example of the ransom note in version 2.3<\/p>\n<h2>Version 2.4<\/h2>\n<p>This version was a minor release like Nemty 2.2. In our analysis we only noted changes for the ransom note:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-99493\" src=\"\/wp-content\/uploads\/2020\/04\/ransom-note-2.4.png\" alt=\"\" width=\"894\" height=\"308\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/ransom-note-2.4.png 894w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/ransom-note-2.4-300x103.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/ransom-note-2.4-768x265.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/ransom-note-2.4-205x71.png 205w\" sizes=\"auto, (max-width: 894px) 100vw, 894px\" \/><\/p>\n<p style=\"text-align: center;\">FIGURE 46. Example of the ransom note in version 2.4<\/p>\n<h2>Version 2.5<\/h2>\n<p>This is the last version of Nemty we discovered. This one represents a minor release and we only spotted two changes for this version:<\/p>\n<ul>\n<li>A new mutex value<\/li>\n<li>A new ransom note:<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-99494\" src=\"\/wp-content\/uploads\/2020\/04\/ransom-note-2.5.png\" alt=\"\" width=\"950\" height=\"307\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/ransom-note-2.5.png 950w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/ransom-note-2.5-300x97.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/ransom-note-2.5-768x248.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/ransom-note-2.5-205x66.png 205w\" sizes=\"auto, (max-width: 950px) 100vw, 950px\" \/><\/p>\n<p style=\"text-align: center;\">FIGURE 47. Example of the ransom note in version 2.5<\/p>\n<h2>Relationship between JSWORM and Nemty<\/h2>\n<p>Our Advanced Threat Research (ATR) team followed the activity of the user jsworm in the underground forums, and uncovered another piece of their ransomware, called JSWORM ransomware. Below is an announcement they made on the same forum on which they presented Nemty:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-99495\" src=\"\/wp-content\/uploads\/2020\/04\/JSWORM-Nemty-announcement.png\" alt=\"\" width=\"1429\" height=\"548\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/JSWORM-Nemty-announcement.png 1429w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/JSWORM-Nemty-announcement-300x115.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/JSWORM-Nemty-announcement-1024x393.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/JSWORM-Nemty-announcement-768x295.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/JSWORM-Nemty-announcement-205x79.png 205w\" sizes=\"auto, (max-width: 1429px) 100vw, 1429px\" \/><\/p>\n<p style=\"text-align: center;\">FIGURE 48. JSWORM ransomware and Nemty announcement<\/p>\n<p>We analyzed all the samples we had of JSWORM and Nemty and could not find any relationship in the code base between them, but it is clear that both pieces of ransomware belong to the same moniker.<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"268\"><strong>HASH<\/strong><\/td>\n<td width=\"72\"><strong>FAMILY<\/strong><\/td>\n<td width=\"246\"><strong>Compilation timestamp<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"268\"><strong>0b33471bbd9fbbf08983eff34ee4ddc9<\/strong><\/td>\n<td width=\"72\">Nemty<\/td>\n<td width=\"246\">2019-08-29 08:31:32<\/td>\n<\/tr>\n<tr>\n<td width=\"268\"><strong>0e0b7b238a06a2a37a4de06a5ab5e615<\/strong><\/td>\n<td width=\"72\">Nemty<\/td>\n<td width=\"246\">2019-08-19 04:34:25<\/td>\n<\/tr>\n<tr>\n<td width=\"268\"><strong>27699778d2d27872f99ee491460485aa<\/strong><\/td>\n<td width=\"72\">JSWORM<\/td>\n<td width=\"246\">1992-06-19 22:22:17<\/td>\n<\/tr>\n<tr>\n<td width=\"268\"><strong>31adc85947ddef5ce19c401d040aee82<\/strong><\/td>\n<td width=\"72\">JSWORM<\/td>\n<td width=\"246\">2019-07-19 05:21:52<\/td>\n<\/tr>\n<tr>\n<td width=\"268\"><strong>348c3597c7d31c72ea723d5f7082ff87<\/strong><\/td>\n<td width=\"72\">Nemty<\/td>\n<td width=\"246\">2019-08-25 11:58:28<\/td>\n<\/tr>\n<tr>\n<td width=\"268\"><strong>37aaba6b18c9c1b8150dae4f1d31e97d<\/strong><\/td>\n<td width=\"72\">Nemty<\/td>\n<td width=\"246\">2019-08-20 19:13:54<\/td>\n<\/tr>\n<tr>\n<td width=\"268\"><strong>4ca39c0aeb0daeb1be36173fa7c2a25e<\/strong><\/td>\n<td width=\"72\">Nemty<\/td>\n<td width=\"246\">2019-08-13 14:46:54<\/td>\n<\/tr>\n<tr>\n<td width=\"268\"><strong>5126b88347c24245a9b141f76552064e<\/strong><\/td>\n<td width=\"72\">Nemty<\/td>\n<td width=\"246\">2019-08-21 16:16:54<\/td>\n<\/tr>\n<tr>\n<td width=\"268\"><strong>5cc1bf6122d38de907d558ec6851377c<\/strong><\/td>\n<td width=\"72\">Nemty<\/td>\n<td width=\"246\">2019-08-21 14:27:55<\/td>\n<\/tr>\n<tr>\n<td width=\"268\"><strong>74701302d6cb1e2f3874817ac499b84a<\/strong><\/td>\n<td width=\"72\">JSWORM<\/td>\n<td width=\"246\">2019-07-10 08:44:29<\/td>\n<\/tr>\n<tr>\n<td width=\"268\"><strong>7def79329823f3c81a6d27d2c92460ef<\/strong><\/td>\n<td width=\"72\">JSWORM<\/td>\n<td width=\"246\">2019-07-09 18:54:23<\/td>\n<\/tr>\n<tr>\n<td width=\"268\"><strong>dcec4fed3b60705eafdc5cbff4062375<\/strong><\/td>\n<td width=\"72\">Nemty<\/td>\n<td width=\"246\">2019-08-21 19:25:16<\/td>\n<\/tr>\n<tr>\n<td width=\"268\"><strong>de9e1a5fc0f0a29b97eb99542d1f297a<\/strong><\/td>\n<td width=\"72\">JSWORM<\/td>\n<td width=\"246\">2019-07-09 20:25:14<\/td>\n<\/tr>\n<tr>\n<td width=\"268\"><strong>f270805668e8aecf13d27c09055bad5d<\/strong><\/td>\n<td width=\"72\">Nemty<\/td>\n<td width=\"246\">2019-08-21 18:42:10<\/td>\n<\/tr>\n<tr>\n<td width=\"268\"><strong>f796af497399c256129f2ce61eb8855b<\/strong><\/td>\n<td width=\"72\">JSWORM<\/td>\n<td width=\"246\">2019-07-19 05:24:00<\/td>\n<\/tr>\n<tr>\n<td width=\"268\"><strong>fbf7ba464d564dbf42699c34b239b73a<\/strong><\/td>\n<td width=\"72\">JSWORM<\/td>\n<td width=\"246\">1992-06-19 22:22:17<\/td>\n<\/tr>\n<tr>\n<td width=\"268\"><strong>0f3deda483df5e5f8043ea20297d243b<\/strong><\/td>\n<td width=\"72\">Nemty<\/td>\n<td width=\"246\">2018-12-04 11:00:39<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Some of the samples released contain custom packers so the compilation timestamp is not accurate for those cases.<\/p>\n<p>Based on the data of the binaries we found, we can see how Nemty activity started some time after the JSWORM ramsomware disappeared. This could indicate that the threat actor jsworm was developing both pieces of ransomware at the same time.<\/p>\n<h2>Free Decryptor Available Through No More Ransom<\/h2>\n<p>One of the partners of <a href=\"https:\/\/www.nomoreransom.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">NoMoreRansom<\/a> was able to release a working version of a Nemty decryptor. If someone is affected by this ransomware, it is possible <a href=\"https:\/\/mdsassets.blob.core.windows.net\/downloads\/NemtyDecryptor.exe\" target=\"_blank\" rel=\"noopener noreferrer\">to contact them<\/a> through NoMoreRansom to get a decryptor.<\/p>\n<h2>Nemty Releases Customer Data Publicly<\/h2>\n<p>In our analysis of the Nemty ransomware, we spotted a new trend in how its authors managed the data of their victims.<\/p>\n<p>In this instance, much like we have seen with other ransomware families like Maze, Nemty has its own website on which customer data is publicly released.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-99496\" src=\"\/wp-content\/uploads\/2020\/04\/Nemty-website.jpg\" alt=\"\" width=\"1118\" height=\"696\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/Nemty-website.jpg 1118w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/Nemty-website-300x187.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/Nemty-website-1024x637.jpg 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/Nemty-website-768x478.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/04\/Nemty-website-205x129.jpg 205w\" sizes=\"auto, (max-width: 1118px) 100vw, 1118px\" \/><\/p>\n<p style=\"text-align: center;\">Image source: Bleeping Computer<\/p>\n<h2>Conclusion<\/h2>\n<p>Despite the number of RaaS families that appeared this year, Nemty represents another piece to observe and follow. Since we started to watch the activities of this ransomware, the criminals behind it have released multiple new versions with bug fixes and improvements. Such activity suggests that ransomware authors are feeling pressure from the great work done by security researchers and organizations, and in the case of Nemty, even from the underground criminal community which itself was quick to criticize some of its functions and implementations.<\/p>\n<p>Tesorion, now a partner in <a href=\"https:\/\/www.nomoreransom.org\/\">No More Ransom<\/a>, released a working decryptor for Nemty and so we now expect that the author will change the ransomware again to continue their activities. The last action we observed from this group was the website shown above, created to leak customer data.<\/p>\n<h2>Mitre ATT&amp;CK<\/h2>\n<p>The sample uses the following MITRE ATT&amp;CK&#x2122; techniques:<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"108\"><strong>Technique ID<\/strong><\/td>\n<td width=\"284\"><strong>Technique Description<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"108\"><strong>T1124<\/strong><\/td>\n<td width=\"284\">System Time Discovery<\/td>\n<\/tr>\n<tr>\n<td width=\"108\"><strong>T1083<\/strong><\/td>\n<td width=\"284\">File and Directory Discovery<\/td>\n<\/tr>\n<tr>\n<td width=\"108\"><strong>T1012<\/strong><\/td>\n<td width=\"284\">Query Registry<\/td>\n<\/tr>\n<tr>\n<td width=\"108\"><strong>T1057<\/strong><\/td>\n<td width=\"284\">Process Discovery<\/td>\n<\/tr>\n<tr>\n<td width=\"108\"><strong>T1047<\/strong><\/td>\n<td width=\"284\">Windows Management Instrumentation<\/td>\n<\/tr>\n<tr>\n<td width=\"108\"><strong>T1035<\/strong><\/td>\n<td width=\"284\">Service Execution<\/td>\n<\/tr>\n<tr>\n<td width=\"108\"><strong>T1215<\/strong><\/td>\n<td width=\"284\">Kernel Modules and Extensions<\/td>\n<\/tr>\n<tr>\n<td width=\"108\"><strong>T1179<\/strong><\/td>\n<td width=\"284\">Hooking<\/td>\n<\/tr>\n<tr>\n<td width=\"108\"><strong>T1112<\/strong><\/td>\n<td width=\"284\">Modify Registry<\/td>\n<\/tr>\n<tr>\n<td width=\"108\"><strong>T1107<\/strong><\/td>\n<td width=\"284\">File Deletion<\/td>\n<\/tr>\n<tr>\n<td width=\"108\"><strong>T1089<\/strong><\/td>\n<td width=\"284\">Disabling Security Tools<\/td>\n<\/tr>\n<tr>\n<td width=\"108\"><strong>T1055<\/strong><\/td>\n<td width=\"284\">Process Injection<\/td>\n<\/tr>\n<tr>\n<td width=\"108\"><strong>T1179<\/strong><\/td>\n<td width=\"284\">Hooking<\/td>\n<\/tr>\n<tr>\n<td width=\"108\"><strong>T1055<\/strong><\/td>\n<td width=\"284\">Process Injection<\/td>\n<\/tr>\n<tr>\n<td width=\"108\"><strong>T1132<\/strong><\/td>\n<td width=\"284\">Data Encoding<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3>Coverage<\/h3>\n<p>Generic Trojan.si<\/p>\n<p>GenericRXIS-SF!348C3597C7D3<\/p>\n<p>GenericRXIS-SF!37AABA6B18C9<\/p>\n<p>GenericRXIS-SF!5CC1BF6122D3<\/p>\n<p>GenericRXIU-OJ!0B33471BBD9F<\/p>\n<p>Ransom-Nemty!09F3B4E8D824<\/p>\n<p>Ransom-Nemty!2FAA102585F5<\/p>\n<p>Ransom-Nemty!65B07E2FD628<\/p>\n<p>Ransom-Nemty!9D6722A4441B<\/p>\n<p>RDN\/GenDownloader.alr<\/p>\n<p>RDN\/Generic.fps<\/p>\n<p>RDN\/Generic.fqr<\/p>\n<p>RDN\/Generic.fry<\/p>\n<p>RDN\/Generic.ftv<\/p>\n<p>RDN\/Generic.fxs<\/p>\n<p>RDN\/Generic.fyy<\/p>\n<p>RDN\/Ransom.gg<\/p>\n<p>RDN\/Ransom.gn<\/p>\n<p>Trojan-FRGK!484036EE8955<\/p>\n<h2>Indicators of Compromise<\/h2>\n<table width=\"712\">\n<tbody>\n<tr>\n<td width=\"510\"><strong>Hash<\/strong><\/td>\n<td width=\"202\"><strong>PE TimeStamp<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>64a1ce2faa2ab624afcbbbb6f43955e116b6c170d705677dba6c4818770903aa<\/strong><\/td>\n<td width=\"202\">1992:06:20 00:22:17+02:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>c537c695843ab87903a9dbc2b9466dfbe06e8e0dde0c4703cbac0febeb79353a<\/strong><\/td>\n<td width=\"202\">1992:06:20 00:22:17+02:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>8e6f56fef6ef12a9a201cad3be2d0bca4962b2745f087da34eaa4af0bd09b75f<\/strong><\/td>\n<td width=\"202\">1992:06:20 00:22:17+02:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>ca46814881f2d6698f64f31e8390fe155b9fd0d8f50b6ab304725a2251434aa7<\/strong><\/td>\n<td width=\"202\">2009:08:13 23:36:24+01:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>5d04d789d66152e3fc0a2d84a53c3d7aa0f5d953c1a946619deeb699f3866e26<\/strong><\/td>\n<td width=\"202\">2017:01:02 12:16:24+01:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>a743d29eb16f9b4a59b2fd8c89e59053bdccce362f544fe82974e80d580c88f6<\/strong><\/td>\n<td width=\"202\">2018:03:27 07:09:32+02:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>5439452012a052851fdd0625abc4559302b9d4f4580e2ec98680e9947841d75d<\/strong><\/td>\n<td width=\"202\">2018:04:17 01:50:07+02:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>20d432c171ec17e7c5105f032210a96ea726ffc52154b79ec43acd62d6e3f304<\/strong><\/td>\n<td width=\"202\">2018:06:09 22:43:06+02:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>9fad280bb034a4683be9ab4a35d2859e61dc796a6134436b4403c2cb9a9ebfea<\/strong><\/td>\n<td width=\"202\">2018:06:09 23:45:15+00:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>7c1aaccca9dd236b9271c734d987d0fccc3e91bfa4c445c5e1c7c41e61ffe3ca<\/strong><\/td>\n<td width=\"202\">2018:06:16 17:31:40+02:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>2f2aeb72dd127057fac1eeefdc0539fc3fa7bdff36d288bd7e20f2756194253d<\/strong><\/td>\n<td width=\"202\">2018:06:16 23:24:06+02:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>6b3fea34cb8bb5cc6d698e30933884e1fe55c942d8768da85eb1c8085525bb41<\/strong><\/td>\n<td width=\"202\">2018:06:20 00:56:49+01:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>345380e840249081cba552af4ab28d7c65d4052f6e4bedd748b673b8853e6e96<\/strong><\/td>\n<td width=\"202\">2018:06:20 01:56:49+02:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>0f6e82387a5fe0f64d7cec15466b17a623aa8faaf9971df3c49ab65d49d1422e<\/strong><\/td>\n<td width=\"202\">2018:07:06 02:30:25+02:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>4b86f102eff21382c1a40a28bd4db19356e1efd323336bcec6645e68592e754a<\/strong><\/td>\n<td width=\"202\">2018:07:07 17:59:57+01:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>b604a25ae4a668170bf28bfc885d0e137f4ff3a29eb7f772ba7098ecfb9bacb3<\/strong><\/td>\n<td width=\"202\">2018:07:08 12:47:46+02:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>664b45ba61cf7e17012b22374c0c2a52a2e661e9c8c1c40982137c910095179a<\/strong><\/td>\n<td width=\"202\">2018:07:14 02:09:27+01:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>536209365d143bf90a44f063eff9254639d7976b2f77edcc2a0ff6ac1e5a5464<\/strong><\/td>\n<td width=\"202\">2018:07:23 22:32:23+02:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>e29d154b067f298bab794d9f85ee7b3d58ebf17b56f6cff6601fb6ce48482f09<\/strong><\/td>\n<td width=\"202\">2018:08:01 20:19:32+02:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>c2a32b7094f4c171a56ca9da3005e7cc30489ae9d2020a6ccb53ff02b32e0be3<\/strong><\/td>\n<td width=\"202\">2018:08:06 17:50:00+02:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>5d58c85ba5bd7a4ca3d5ade7bff08942a12399f82defa370691524d8797a1095<\/strong><\/td>\n<td width=\"202\">2018:08:09 01:11:34+02:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>c8d44e8c91ed028626a8e2b3a526627790a2ac3e7078316172e35371fb984eee<\/strong><\/td>\n<td width=\"202\">2018:08:09 01:11:34+02:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>7eb2b5125f9fbcc2672c05031456b6a2432c8921e9fa561bb7d7fa72010638b0<\/strong><\/td>\n<td width=\"202\">2018:08:22 21:17:21+01:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>06c1428e1a41c30b80a60b5b136d7cb4a8ffb2f4361919ef7f72a6babb223dd3<\/strong><\/td>\n<td width=\"202\">2018:08:22 22:17:21+02:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>66e55d3ffc0dcc4c8db135474cb8549072f8b1015742038f2ebb60d8c5dbd77c<\/strong><\/td>\n<td width=\"202\">2018:08:24 01:21:20+02:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>7fab9295f28e9a6e746420cdf39a37fe2ae3a1c668e2b3ae08c9de2de4c10024<\/strong><\/td>\n<td width=\"202\">2018:08:27 18:49:08+02:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>bf3368254c8e62f17e610273e53df6f29cccc9c679245f55f9ee7dc41343c384<\/strong><\/td>\n<td width=\"202\">2018:08:28 00:50:58+02:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>eb98285ef506aa5b6d38bbd441db692b832f7ed1b9cb1dc4e2fec45369c8432a<\/strong><\/td>\n<td width=\"202\">2018:08:29 19:54:20+02:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>676224fb3ab782fc096351c2419ebd8f7df95a9180407f725c57e72d2bbec5b1<\/strong><\/td>\n<td width=\"202\">2018:08:29 20:05:56+02:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>9b5067d5e7f7fbf52b5069f5557d5b0cf45752a6b720f5a737b412600da8c845<\/strong><\/td>\n<td width=\"202\">2018:09:07 18:40:54+02:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>30832d5709f93b16a6972fca9159fbd886a4e9815ef0f029fade5ca663e9761e<\/strong><\/td>\n<td width=\"202\">2018:09:08 01:26:36+01:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>e5527d1bfc8b1448dcd698f23ac7142a066bb19b6109ef1c92df4d6214aa2d6a<\/strong><\/td>\n<td width=\"202\">2018:09:11 22:58:35+02:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>c09272b4a547aa5e675f9da4baf70670bd192b1dfd8dd33b52a42ee83f782cac<\/strong><\/td>\n<td width=\"202\">2018:09:30 18:36:38+02:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>aa36aa7425e9591531d5dad33b7e1de7ffbe980376fc39a7961133f5df8ab31a<\/strong><\/td>\n<td width=\"202\">2018:10:03 22:27:20+02:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>a54bca66aac95cb281d313375e38cd8058ace1e07c5176995531da241c50dbd6<\/strong><\/td>\n<td width=\"202\">2018:10:06 10:02:23+02:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>63ed68751000f7004bf951bc4a4c22799a94d28602f4022d901b6558ff93b46b<\/strong><\/td>\n<td width=\"202\">2018:10:09 22:04:03+02:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>fe639627cf827e72c30992c627fffd458f7afb86d5b87e811415b87c2276e59c<\/strong><\/td>\n<td width=\"202\">2018:10:12 20:11:41+02:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>74f8c39f3b0e4338eeaabad97c9303139336be9ebe059501a78174570540eb9e<\/strong><\/td>\n<td width=\"202\">2018:10:14 01:10:44+02:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>0a472cb6772f554afc9720064a0ba286ddc02250b9249cace39b3bdd77b5265c<\/strong><\/td>\n<td width=\"202\">2018:10:20 16:38:09+02:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>0a0fb6e146bf8473b8931c3775529b2a0c8baf0db9afae7d3bb53f3d1da8c6ca<\/strong><\/td>\n<td width=\"202\">2018:10:21 23:30:07+02:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>0285a046ecaa82e685275ea53ae56134cb992991ef0d2ac5af3f5c15ebd136cc<\/strong><\/td>\n<td width=\"202\">2018:10:25 23:28:29+02:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>3d852ca618763ced2e280f0c0079e804935b70dcd4adc3912c2e2b3965e196c4<\/strong><\/td>\n<td width=\"202\">2018:11:03 16:59:21+01:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>4f3c6b42a2182b530f44d37fb82df8c2e1ca3858bfdd6d921aa363efe3e6e7bb<\/strong><\/td>\n<td width=\"202\">2018:11:03 16:59:21+01:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>3d9742b2ca3756645f88e885d1dadb2827a19f01ca6fb4a5170f2888cced35e1<\/strong><\/td>\n<td width=\"202\">2018:11:03 16:59:21+01:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07<\/strong><\/td>\n<td width=\"202\">2018:11:10 17:30:47+01:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>b3dbfbd64088691b4bf07b9001890bc60ff7f95fb44acdc20d95e8dd3c72c050<\/strong><\/td>\n<td width=\"202\">2018:11:11 00:53:46+01:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>5e4a090b75ca915fc42a149c7ddfba0dbe1a6846fe3b36249923549656c31218<\/strong><\/td>\n<td width=\"202\">2018:11:25 19:51:19+01:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>a5590a987d125a8ca6629e33e3ff1f3eb7d5f41f62133025d3476e1a6e4c6130<\/strong><\/td>\n<td width=\"202\">2018:12:04 12:00:39+01:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>a7558decb9516122781243e791c982977660152813817fb7ed00359365fcb0d3<\/strong><\/td>\n<td width=\"202\">2018:12:06 17:53:43+01:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>b2c11e6126a7de326e5fef14679279bf9fa920b7ba7142984d99790d89155b69<\/strong><\/td>\n<td width=\"202\">2018:12:06 17:53:43+01:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>4379f688682395f0ebcd70acd14c304a1074928198b4d0bebb5362d56328f76e<\/strong><\/td>\n<td width=\"202\">2018:12:06 21:13:33+01:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>8dca973cccf5073a9f53f055fa275215520ba67416b5d206c673df533532efe5<\/strong><\/td>\n<td width=\"202\">2018:12:07 01:04:23+01:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>9913afe01dc4094bd3c5ff90ca27cc9e9ef7d77b6a7bdbf5f3042a8251b96325<\/strong><\/td>\n<td width=\"202\">2018:12:10 19:04:48+01:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>17864c4e21c0ebaf30cca1f35d67f46d3c3c33a5b8ea87d4c331e9d86d805965<\/strong><\/td>\n<td width=\"202\">2018:12:15 23:24:41+01:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>36bd705f58c11c22529a9299d8c0c1a33cf94fb9b7cce0a39a79e4d8f523308d<\/strong><\/td>\n<td width=\"202\">2018:12:16 21:12:50+01:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>1b18d04d4ca37ecc25bd8d4f229121c89a57c80615d40ff94868f380cdfaed7c<\/strong><\/td>\n<td width=\"202\">2018:12:24 21:33:38+01:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>b0bd94cf4f409bb5ba2661d875e0488e59492c95a539508172e2670d74feb0ea<\/strong><\/td>\n<td width=\"202\">2018:12:27 21:42:57+01:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>b9ff00a4b426742892e21601a68b19ffa44668f3274ec250e60843c3224b6b42<\/strong><\/td>\n<td width=\"202\">2018:12:30 01:14:36+01:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>4f5bb92d861601642aec31ecbd7864b2dcca9027ef3ff7256c0d12915580181b<\/strong><\/td>\n<td width=\"202\">2019:01:10 22:35:38+01:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>2a5f9e5d72b4841538a73ee2556865d8ed76e3da38571f00148368874edf55c8<\/strong><\/td>\n<td width=\"202\">2019:01:19 23:44:33+01:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>708922215acc1ddbe35a9549afce408aaa0aa74caa78feca96150e755ebf7b98<\/strong><\/td>\n<td width=\"202\">2019:02:02 11:07:14+01:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>03e46ba0d430afd4c85eaef47dcb38faf8cd7ef78ef25f8aa911c216a598245c<\/strong><\/td>\n<td width=\"202\">2019:02:02 23:01:04+01:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>cbb016cab1718c610f2bd98e0190bb5a426a2de38ddfccfec86196294e47bca0<\/strong><\/td>\n<td width=\"202\">2019:02:05 04:34:44+01:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>2ebe4c68225206161c70cf3e0da39294e9353ee295db2dc5d4f86ce7901210c5<\/strong><\/td>\n<td width=\"202\">2019:02:08 18:17:02+01:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>947bddf40d6dcf4cbbf174b2067a9f5e09fa2eb03d039974feba1d398ddeb184<\/strong><\/td>\n<td width=\"202\">2019:02:11 23:26:07+01:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>3207b5da6ecf0d6ea787c5047c1e886c0ee6342a5d79e4bcb757e7e817caa889<\/strong><\/td>\n<td width=\"202\">2019:02:16 17:40:03+01:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>ee3a8512f4109ec7a21831aee68ba53fb431d5eac613b66bf9877f50118c0cd4<\/strong><\/td>\n<td width=\"202\">2019:02:16 19:26:22+01:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>9caae99f53cc1446f04703754fa03b98a6303882e0999653c2c5fbfe656e3164<\/strong><\/td>\n<td width=\"202\">2019:02:26 00:00:02+01:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>cfe5682a41c5b4a3fd9c09070262171a05e0ce99868ef0e2058a5d65385ed681<\/strong><\/td>\n<td width=\"202\">2019:03:10 18:09:02+01:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>1ac0c87c3ff27dc6d630cb3f543311fb48edfc88d33470836438b1d388ae9687<\/strong><\/td>\n<td width=\"202\">2019:03:12 20:03:50+01:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>57a73c98866cd1aa0e57b84c0a13a54901077d23b6683d16b713d652d74fd1c7<\/strong><\/td>\n<td width=\"202\">2019:03:24 20:58:51+01:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>f2c6e0a2500876a3426b191cfbd3b65625bb182f23fda68d256f56a644f4f123<\/strong><\/td>\n<td width=\"202\">2019:04:02 11:44:51+02:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>5078a0940abc31a7fa271483ac345044a91a0e21c517bceb85091cd3fca310f7<\/strong><\/td>\n<td width=\"202\">2019:04:03 01:09:42+01:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>92981ed851493d6897339df02a77799645a0edf078daa8cf6cf09293f0801b7c<\/strong><\/td>\n<td width=\"202\">2019:04:06 02:29:49+02:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>084da93689b04f0a162bcd6fa2d43937f84182ac94d40b871d8650d89501c2bd<\/strong><\/td>\n<td width=\"202\">2019:04:10 00:40:47+01:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>e563bfae9ee7effe4c9766ded059dc2e91f7f76830973dfdadfb203c47fe8c2a<\/strong><\/td>\n<td width=\"202\">2019:04:12 17:33:50+01:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>a77beff2bf75a2a82b7c96438e9c55e2839cba2ea057892422b714876b8def58<\/strong><\/td>\n<td width=\"202\">2019:04:12 21:09:21+01:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>d341571f9b8ea62f52b9563ca1fb77bee5127a2a5b93d00682622eb116db0275<\/strong><\/td>\n<td width=\"202\">2019:04:12 22:26:26+01:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>510c0746a5d8b0175e80e2fbbbfbf194c8e20e56cccd5a9ec5fac4ad2e2f77f7<\/strong><\/td>\n<td width=\"202\">2019:04:15 19:01:48+02:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>e070a88883634bf7105f9744123adfd3890947e8da4754d2560293e68f809f10<\/strong><\/td>\n<td width=\"202\">2019:04:17 01:57:08+02:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>44c6edb224810748a0b15512a47647f5e35157fdaa30357d2820c1eb250273e4<\/strong><\/td>\n<td width=\"202\">2019:04:17 20:57:27+01:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>db25fd682243d4449c423a57591bd0d69a98f3e6149b815e6c556a76b5fbb71a<\/strong><\/td>\n<td width=\"202\">2019:04:19 19:05:12+02:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>405df2b5aa985c8386d347b6e7f269e546231a02abd1e793ae792010248bc9da<\/strong><\/td>\n<td width=\"202\">2019:04:27 00:59:44+02:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>081444b3b8b82c06c631d3106859ab530435af68292a8009c4b6eb2285cb9929<\/strong><\/td>\n<td width=\"202\">2019:04:27 22:03:27+02:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>a380640490d3aa7380255ed9269bb967a4daee6d2d20353a50154e7e6d399746<\/strong><\/td>\n<td width=\"202\">2019:04:28 23:52:25+02:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>fe244ab332b490623a8a313a8b64a1d280f3e03b2457f6c3235d01ee8f21c701<\/strong><\/td>\n<td width=\"202\">2019:04:29 00:49:00+02:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>abf148370f7cc9c16e20c30590a08f85208f4e594062c8a9e59c0c89cd8ff43f<\/strong><\/td>\n<td width=\"202\">2019:04:29 02:32:07+02:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>034b86e971f24282bd0c1b74a257c7c60ec7d83fa45ac5d5321e7c436675be89<\/strong><\/td>\n<td width=\"202\">2019:05:04 17:03:52+02:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>859e8f98203fa9b8fb68cf1e4c6f9a1143c970bd2830601841b83ee49b2a72ba<\/strong><\/td>\n<td width=\"202\">2019:05:05 22:59:32+02:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>2e436f4277a6cac69c5b484284160559752ef0679e27e2af8112e78c9074a17c<\/strong><\/td>\n<td width=\"202\">2019:05:07 23:20:09+02:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>6be9cc0bda98fee59c94d687c293b83f1b41588ca991f35328f4d56c9c1f38e4<\/strong><\/td>\n<td width=\"202\">2019:05:17 12:12:43+01:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>29ba2b8099985501ae9aafa964daeca66d964e9fbc1d0025928b49fcae0efb63<\/strong><\/td>\n<td width=\"202\">2019:05:17 12:58:42+02:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>a08dc1e27b9e92ba70dcd2bce611fa51ec3601e4a2e7cdbb7713b656160c3773<\/strong><\/td>\n<td width=\"202\">2019:05:28 21:36:33+02:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>cc496cec38bbc72bae3cb64416baca38b3706443c4f360bd4ba8300d64b210d2<\/strong><\/td>\n<td width=\"202\">2019:08:13 16:46:54+02:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>267a9dcf77c33a1af362e2080aaacc01a7ca075658beb002ab41e0712ffe066e<\/strong><\/td>\n<td width=\"202\">2019:08:19 05:34:25+01:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>505c0ca5ad0552cce9e047c27120c681ddce127d13afa8a8ad96761b2487191b<\/strong><\/td>\n<td width=\"202\">2019:08:20 20:13:54+01:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>6a07996bc77bc6fe54acc8fd8d5551a00deaea3cc48f097f18955b06098c4bd3<\/strong><\/td>\n<td width=\"202\">2019:08:21 16:27:55+02:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>d421d9b0cc9ce69fc4dea1d4bd230b666b15868e4778d227ead38b7572463253<\/strong><\/td>\n<td width=\"202\">2019:08:21 17:16:54+01:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>f854d7639a5db4c42b51aecd541aaf61879591adf42ebcba068f3b111fb61a34<\/strong><\/td>\n<td width=\"202\">2019:08:21 19:06:44+01:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>688994783ce56427f20e6e2d206e5eee009fcc157ba37737dce1b14a326cc612<\/strong><\/td>\n<td width=\"202\">2019:08:21 20:25:16+01:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>4cf87dd16d57582719a8fe6a144360f3dfa5d21196711dc140ce1a738ab9816e<\/strong><\/td>\n<td width=\"202\">2019:08:21 20:34:34+02:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>15084aa0f30f5797bd666f18d0992dfcdb1c080c8d25cf2f6d97f9166e45b93b<\/strong><\/td>\n<td width=\"202\">2019:08:31 14:06:01+01:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>7c638c17b3fc92393c421dff34a1c9245c26f9526fb20699af567e6a38535a06<\/strong><\/td>\n<td width=\"202\">2019:09:04 14:05:11+02:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>022076c2c8f1555ee98a08ff5714aa1db20e1841fe3b8d1362fed0d6bef1c87d<\/strong><\/td>\n<td width=\"202\">2019:09:19 22:32:44+02:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>fb81f82121f9604a664925790e83763f7dceb2adaa4aeafaf8af24f7986e1f12<\/strong><\/td>\n<td width=\"202\">2019:09:24 12:28:55+02:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>a41949b9cddc2838534c0f70c0a615a7135fc95e452270ff661247a60d6b638d<\/strong><\/td>\n<td width=\"202\">2019:09:24 14:55:26+01:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>3aeaf37af33b92dfa62489250ec2857d6bab1098fcf356cdb58e05efabe359cb<\/strong><\/td>\n<td width=\"202\">2019:09:27 12:59:27+02:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>9f2a0b1553f8b2e1a5c0c40023ac9abed76455cdb0f5a346601088615606eac0<\/strong><\/td>\n<td width=\"202\">2019:09:28 11:31:11+02:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>068575719283c1e33abb8530340d7ac0b4d44b15da1ee0877c03537216df3001<\/strong><\/td>\n<td width=\"202\">2019:09:30 02:31:49+02:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>9574f57f7a4192f0507fa3361fb3e00e1f1101fdd818fc8e27aaba6714cd373c<\/strong><\/td>\n<td width=\"202\">2019:10:02 17:22:33+01:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>98f260b52586edd447eaab38f113fc98b9ff6014e291c59c9cd639df48556e12<\/strong><\/td>\n<td width=\"202\">2019:10:04 09:56:21+02:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>30ad724c9b869ff9e732e95c7e3b94a0d118297c168ffd4c24bac240e0cba184<\/strong><\/td>\n<td width=\"202\">2019:10:04 13:01:21+01:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>62c3b52b5310393dbf0590bc246161249632a1d2f21c3aa7fb779dc8018a0edf<\/strong><\/td>\n<td width=\"202\">2019:10:05 03:10:25+01:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>d041cc7e2e9d8d6366b28abc0428b7d41ad75bcfb67631830a838c32e49fd365<\/strong><\/td>\n<td width=\"202\">2019:10:07 17:57:43+02:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>88fcdfd4c89a9d3108582e5746b58beda9e538f357f3b390a008a7e5925c19f5<\/strong><\/td>\n<td width=\"202\">2019:10:07 18:22:30+02:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>9b5a42c4dbb2df3e1457e8a7bdbe93a2a4b4382a4de70077ace34a3c5a04ba1f<\/strong><\/td>\n<td width=\"202\">2019:10:10 02:55:12+02:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>2497543441cf35647afa60d6bc76825cfebf24e3421fbe101b38838aed63ba21<\/strong><\/td>\n<td width=\"202\">2019:10:11 02:44:30+02:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>5e2c0b6d2f74605f11047a6b6ebff7026035471bccd3e2c6ba03df576eef08cd<\/strong><\/td>\n<td width=\"202\">2019:10:12 20:12:30+02:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>aaaa143d3636133fa952b79f3e447264a56a4db223a046906b95802e50a359f9<\/strong><\/td>\n<td width=\"202\">2019:10:25 11:04:07+02:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>0c18068dab291fcdd5a9aa94fb6cb07b8aeec1e4ecbab3746c3b0586e7bbd692<\/strong><\/td>\n<td width=\"202\">2019:10:26 06:58:37+01:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>36e66c1d562af0df6c493cb998b24f8b52da55452dce6514d92e14ee64ab41c6<\/strong><\/td>\n<td width=\"202\">2019:11:26 20:09:10+01:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>2160391fc7c69bc30dea5c4e0e3e6ca2045d021087d4f1170d74eacedae9ebd2<\/strong><\/td>\n<td width=\"202\">2019:11:26 20:09:10+01:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>b01054d750aaa982359bee75707847f30df668135ca139e25b142e18f8cf2f51<\/strong><\/td>\n<td width=\"202\">2019:11:26 20:09:10+01:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>97c5eeddaaa99a578a94609a69be099d7ac61f4d797f14a5f9a696566205366e<\/strong><\/td>\n<td width=\"202\">2019:11:26 20:09:10+01:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>c5d43698296b4e9b9f7491669b7b20ef651302593c72b827462c08c9d6e76ae3<\/strong><\/td>\n<td width=\"202\">2019:11:26 20:09:10+01:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>d5b4f6cd5c6d142cdcfeca789b58942ee01270cb52de1d0f4c8d3cb7f44fa6e4<\/strong><\/td>\n<td width=\"202\">2019:12:14 15:45:13+01:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>e04d28b43fcc11ef8869641c2795774ae139ee6ed06c295c772d8a4f2381e831<\/strong><\/td>\n<td width=\"202\">2019:12:15 09:55:10+01:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>1d3f2ba1c701ecf04c288b64d9f2470c6f58744d5284174c1cb8e8b3753f3fae<\/strong><\/td>\n<td width=\"202\">2019:12:15 09:55:10+01:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>45c3faeb8cdd2cbdcf6161f05b2e72aba7927594138da693b0020f24db9e60d8<\/strong><\/td>\n<td width=\"202\">2019:12:15 09:55:10+01:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>4402b31f717bfe82498d162adac0c9b4f5a9ca413c883ac94ab8e322c50f11db<\/strong><\/td>\n<td width=\"202\">2019:12:23 09:17:02+01:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>a3cb6814fcdb42517728815c875f2dc169ac7b15f615b971eff209c4e2937527<\/strong><\/td>\n<td width=\"202\">2019:12:23 17:10:14+01:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>0a14d4313ded36716d9de16b8487ac91b0dcf6a77c9f0c21531916c31a0a5ee9<\/strong><\/td>\n<td width=\"202\">2019:12:24 05:03:25+00:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>735ef043f3f64a9c57ba938dddc6fdac60ed30fa746a728635835c7162729710<\/strong><\/td>\n<td width=\"202\">2019:12:25 20:14:11+01:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>92cf38b5bee56490871c19e1ee31239c550a0eb6d177a37d02079465be9e4f7d<\/strong><\/td>\n<td width=\"202\">2019:12:27 18:55:35+01:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>4b4feffb0783aca42f0e9c38961340a76b4a2b3fd324f71e764a88ab500f1372<\/strong><\/td>\n<td width=\"202\">2019:12:27 18:55:35+01:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>5a022aba75d4986adedb1a5fb62fce8946d43f06846f663a851ba93e9e317f8c<\/strong><\/td>\n<td width=\"202\">2019:12:27 18:55:35+01:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>3ae7d44569b2885de360c0e6c3448772f74c1c3ff4ee3f594053a95bfc73850f<\/strong><\/td>\n<td width=\"202\">2019:12:27 18:55:35+01:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>42e9356feb10e5814fb73c6c8d702f010d4bd742e25550ae91413fa2a7e7c888<\/strong><\/td>\n<td width=\"202\">2019:12:27 18:55:35+01:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>bf6b8563773f7a05de33edcb1333d9e39e5bc60c91d111d3fb4ec7f5cfbb6c43<\/strong><\/td>\n<td width=\"202\">2019:12:28 03:06:43+01:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>842b92ed20115ff28fd5b8b204e80e88168594aa5ce44c288a560ec6f907516a<\/strong><\/td>\n<td width=\"202\">2019:12:28 03:06:43+01:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>eedefda5ff588f0b194b97a0244d6d3e4892b9a5f1539b33aa0fa86a47be7ea1<\/strong><\/td>\n<td width=\"202\">2019:12:28 03:06:43+01:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>d398280940af9fcb5aad2f0eb38d7b00b9d241ad1c4abfe3ca726accded70e2a<\/strong><\/td>\n<td width=\"202\">2019:12:29 09:38:39+01:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>6e18acc14f36010c4c07f022e853d25692687186169e50929e402c2adf2cb897<\/strong><\/td>\n<td width=\"202\">2020:01:07 10:57:37+00:00<\/td>\n<\/tr>\n<tr>\n<td width=\"510\"><strong>8e056ccffad1f5315a38abf14bcd3a7b662b440bda6a0291a648edcc1819eca6<\/strong><\/td>\n<td width=\"202\">2020:01:18 12:03:36+01:00<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>Executive Summary The McAfee Advanced Threat Research Team (ATR) observed a new ransomware family named \u2018Nemty\u2019 on 20 August 2019&#8230;.<\/p>\n","protected":false},"author":1028,"featured_media":96719,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[],"coauthors":[5540],"class_list":["post-99427","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mcafee-labs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Nemty Ransomware - Learning by Doing | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Executive Summary The McAfee Advanced Threat Research Team (ATR) observed a new ransomware family named \u2018Nemty\u2019 on 20 August 2019. We are in an era where\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Nemty Ransomware - Learning by Doing | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Executive Summary The McAfee Advanced Threat Research Team (ATR) observed a new ransomware family named \u2018Nemty\u2019 on 20 August 2019. We are in an era where\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/nemty-ransomware-learning-by-doing\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-02T18:21:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-19T08:43:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/iStock-954683756-min-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1280\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Alexandre Mundo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ValthekOn\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alexandre Mundo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"33 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/nemty-ransomware-learning-by-doing\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/nemty-ransomware-learning-by-doing\/\"},\"author\":{\"name\":\"Alexandre Mundo\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/c3f45299d8c53eed9afcc781d0664cb0\"},\"headline\":\"Nemty Ransomware &#8211; Learning by Doing\",\"datePublished\":\"2020-04-02T18:21:35+00:00\",\"dateModified\":\"2024-02-19T08:43:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/nemty-ransomware-learning-by-doing\/\"},\"wordCount\":6607,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/nemty-ransomware-learning-by-doing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/iStock-954683756-min-2.jpg\",\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/nemty-ransomware-learning-by-doing\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/nemty-ransomware-learning-by-doing\/\",\"name\":\"Nemty Ransomware - Learning by Doing | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/nemty-ransomware-learning-by-doing\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/nemty-ransomware-learning-by-doing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/iStock-954683756-min-2.jpg\",\"datePublished\":\"2020-04-02T18:21:35+00:00\",\"dateModified\":\"2024-02-19T08:43:20+00:00\",\"description\":\"Executive Summary The McAfee Advanced Threat Research Team (ATR) observed a new ransomware family named \u2018Nemty\u2019 on 20 August 2019. We are in an era where\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/nemty-ransomware-learning-by-doing\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/nemty-ransomware-learning-by-doing\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/nemty-ransomware-learning-by-doing\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/iStock-954683756-min-2.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/iStock-954683756-min-2.jpg\",\"width\":1920,\"height\":1280},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/nemty-ransomware-learning-by-doing\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Nemty Ransomware &#8211; Learning by Doing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/c3f45299d8c53eed9afcc781d0664cb0\",\"name\":\"Alexandre Mundo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/80b0982f90036536db33ea6886ff3c35\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/07\/alex-150x150.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/07\/alex-150x150.png\",\"caption\":\"Alexandre Mundo\"},\"description\":\"Alexandre Mundo, Senior Malware Analyst is part of Mcafee's Advanced Threat Research team. He reverses the new threads in advanced attacks and make research of them in a daily basis. He is focused in APT and new, and old but very active, ransomware attacks and malware. He performs malware and forensic analysis and teach junior malware analysts and has developed training courses, workshops and presentations of malware analysis. He worked as freelance and consultor in the past too.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/alexandre-mundo-alguacil-38a98011a\/\",\"https:\/\/x.com\/ValthekOn\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/alexandre-mundo\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Nemty Ransomware - Learning by Doing | McAfee Blog","description":"Executive Summary The McAfee Advanced Threat Research Team (ATR) observed a new ransomware family named \u2018Nemty\u2019 on 20 August 2019. We are in an era where","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Nemty Ransomware - Learning by Doing | McAfee Blog","og_description":"Executive Summary The McAfee Advanced Threat Research Team (ATR) observed a new ransomware family named \u2018Nemty\u2019 on 20 August 2019. We are in an era where","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/nemty-ransomware-learning-by-doing\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2020-04-02T18:21:35+00:00","article_modified_time":"2024-02-19T08:43:20+00:00","og_image":[{"width":1920,"height":1280,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/iStock-954683756-min-2.jpg","type":"image\/jpeg"}],"author":"Alexandre Mundo","twitter_card":"summary_large_image","twitter_creator":"@ValthekOn","twitter_site":"@McAfee","twitter_misc":{"Written by":"Alexandre Mundo","Est. reading time":"33 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/nemty-ransomware-learning-by-doing\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/nemty-ransomware-learning-by-doing\/"},"author":{"name":"Alexandre Mundo","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/c3f45299d8c53eed9afcc781d0664cb0"},"headline":"Nemty Ransomware &#8211; Learning by Doing","datePublished":"2020-04-02T18:21:35+00:00","dateModified":"2024-02-19T08:43:20+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/nemty-ransomware-learning-by-doing\/"},"wordCount":6607,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/nemty-ransomware-learning-by-doing\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/iStock-954683756-min-2.jpg","articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/nemty-ransomware-learning-by-doing\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/nemty-ransomware-learning-by-doing\/","name":"Nemty Ransomware - Learning by Doing | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/nemty-ransomware-learning-by-doing\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/nemty-ransomware-learning-by-doing\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/iStock-954683756-min-2.jpg","datePublished":"2020-04-02T18:21:35+00:00","dateModified":"2024-02-19T08:43:20+00:00","description":"Executive Summary The McAfee Advanced Threat Research Team (ATR) observed a new ransomware family named \u2018Nemty\u2019 on 20 August 2019. We are in an era where","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/nemty-ransomware-learning-by-doing\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/nemty-ransomware-learning-by-doing\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/nemty-ransomware-learning-by-doing\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/iStock-954683756-min-2.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/iStock-954683756-min-2.jpg","width":1920,"height":1280},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/nemty-ransomware-learning-by-doing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"Nemty Ransomware &#8211; Learning by Doing"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/c3f45299d8c53eed9afcc781d0664cb0","name":"Alexandre Mundo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/80b0982f90036536db33ea6886ff3c35","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/07\/alex-150x150.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/07\/alex-150x150.png","caption":"Alexandre Mundo"},"description":"Alexandre Mundo, Senior Malware Analyst is part of Mcafee's Advanced Threat Research team. He reverses the new threads in advanced attacks and make research of them in a daily basis. He is focused in APT and new, and old but very active, ransomware attacks and malware. He performs malware and forensic analysis and teach junior malware analysts and has developed training courses, workshops and presentations of malware analysis. He worked as freelance and consultor in the past too.","sameAs":["https:\/\/www.linkedin.com\/in\/alexandre-mundo-alguacil-38a98011a\/","https:\/\/x.com\/ValthekOn"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/alexandre-mundo\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/99427","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/1028"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=99427"}],"version-history":[{"count":1,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/99427\/revisions"}],"predecessor-version":[{"id":183078,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/99427\/revisions\/183078"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/96719"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=99427"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=99427"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=99427"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=99427"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}