{"id":84523,"date":"2017-07-21T19:58:15","date_gmt":"2017-07-21T14:28:15","guid":{"rendered":"https:\/\/blogs_admin.quickheal.com\/?p=84523"},"modified":"2017-07-21T20:19:06","modified_gmt":"2017-07-21T14:49:06","slug":"nemucodaes-malspam-back-time-brought-along-kovter-trojan","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/nemucodaes-malspam-back-time-brought-along-kovter-trojan\/","title":{"rendered":"NemucodAES malspam is back and this time it brought along Kovter Trojan"},"content":{"rendered":"<p>For the last few weeks, we have been observing a new malicious spam (malspam) variant that is spreading via an email claiming to be from the United Parcel Service (UPS) carriages. The email carries a zip attachment that contains NemucodAES Ransomware and fileless Kovter Trojan.<\/p>\n<p>Earlier, such malspam campaigns were delivering Cerber Ransomware and Kovter Trojan.<\/p>\n<p><strong>Attack Methodology <\/strong><\/p>\n<p><strong>Step1 &#8211;<\/strong> The user receives a spam email with a malicious zip that contains a JavaScript file.<\/p>\n<figure id=\"attachment_84524\" aria-describedby=\"caption-attachment-84524\" style=\"width: 758px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-84524\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2017\/07\/Nemucod1.jpg\" alt=\"nemucod1\" width=\"758\" height=\"506\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/07\/Nemucod1.jpg 855w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/07\/Nemucod1-300x200.jpg 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/07\/Nemucod1-768x513.jpg 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/07\/Nemucod1-584x390.jpg 584w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/07\/Nemucod1-789x527.jpg 789w\" sizes=\"(max-width: 758px) 100vw, 758px\" \/><figcaption id=\"caption-attachment-84524\" class=\"wp-caption-text\">Fig 1. Spam email<\/figcaption><\/figure>\n<p>Spam emails sent in this campaign usually contain the below subject lines and attachment names to trick the user into opening the email.<\/p>\n<p>&nbsp;<\/p>\n<table width=\"620\">\n<tbody>\n<tr>\n<td width=\"379\"><strong>Subject Lines<\/strong><\/td>\n<td width=\"241\"><strong>Attachment Names<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"379\">***INFECTED*** Problems with item delivery n.004640147<\/td>\n<td width=\"241\">UPS-Package-004640147.zip<\/td>\n<\/tr>\n<tr>\n<td width=\"379\">***INFECTED*** Problems with item delivery n.001656569<\/td>\n<td width=\"241\">UPS-Label-001656569.zip<\/td>\n<\/tr>\n<tr>\n<td width=\"379\">Parcel ID004692898 delivery problems please review<\/td>\n<td width=\"241\">UPS-Receipt-004692898.zip<\/td>\n<\/tr>\n<tr>\n<td width=\"379\">We could not deliver your parcel #004522553<\/td>\n<td width=\"241\">UPS-Delivery-004522553.zip<\/td>\n<\/tr>\n<tr>\n<td width=\"379\">Our UPS courier can not contact you (parcel #008284689)<\/td>\n<td width=\"241\">UPS-Parcel-ID-008284689.zip<\/td>\n<\/tr>\n<tr>\n<td width=\"379\">Notification status of your delivery (UPS 5952930)<\/td>\n<td width=\"241\">UPS-Delivery-Details-5952930.zip<\/td>\n<\/tr>\n<tr>\n<td width=\"379\">Notification status of your delivery (UPS 001387092)<\/td>\n<td width=\"241\">UPS-Package-001387092.zip<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>Step2 &#8211; <\/strong>JavaScript execution<\/p>\n<p>The JavaScript file has a long variable which is used to download \u201ccounter.js\u201d files from compromised websites. This \u201ccounter.js\u201d is responsible for switching into embedded PHP and download its PHP interpreter files which are, in turn, responsible for encryption.<\/p>\n<p>&nbsp;<\/p>\n<figure id=\"attachment_84525\" aria-describedby=\"caption-attachment-84525\" style=\"width: 900px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-84525\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2017\/07\/Nemucod2.jpg\" alt=\"Fig 2. Malicious JavaScript\" width=\"900\" height=\"676\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/07\/Nemucod2.jpg 1010w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/07\/Nemucod2-300x225.jpg 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/07\/Nemucod2-768x577.jpg 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/07\/Nemucod2-519x390.jpg 519w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/07\/Nemucod2-789x593.jpg 789w\" sizes=\"(max-width: 900px) 100vw, 900px\" \/><figcaption id=\"caption-attachment-84525\" class=\"wp-caption-text\">Fig 2. Malicious JavaScript<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<figure id=\"attachment_84527\" aria-describedby=\"caption-attachment-84527\" style=\"width: 1100px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-84527\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2017\/07\/Nemucod3.jpg\" alt=\"Fig3: Dropped files at %temp% location\" width=\"1100\" height=\"320\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/07\/Nemucod3.jpg 1100w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/07\/Nemucod3-300x87.jpg 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/07\/Nemucod3-768x223.jpg 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/07\/Nemucod3-650x189.jpg 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/07\/Nemucod3-789x230.jpg 789w\" sizes=\"(max-width: 1100px) 100vw, 1100px\" \/><figcaption id=\"caption-attachment-84527\" class=\"wp-caption-text\">Fig 3: Dropped files at %temp% location<\/figcaption><\/figure>\n<p>After execution, files are encrypted without any extensions or name change. For encryption, a mix of AES-128 in ECB mode and RSA encryption algorithms are used in order to make the decryption of files more difficult.<\/p>\n<p>After encryption, the below ransom note is displayed.<\/p>\n<figure id=\"attachment_84526\" aria-describedby=\"caption-attachment-84526\" style=\"width: 921px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-84526\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2017\/07\/Nemucod4.jpg\" alt=\"Fig 4. Ransom note\" width=\"921\" height=\"642\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/07\/Nemucod4.jpg 921w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/07\/Nemucod4-300x209.jpg 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/07\/Nemucod4-768x535.jpg 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/07\/Nemucod4-559x390.jpg 559w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/07\/Nemucod4-789x550.jpg 789w\" sizes=\"(max-width: 921px) 100vw, 921px\" \/><figcaption id=\"caption-attachment-84526\" class=\"wp-caption-text\">Fig 4. Ransom note<\/figcaption><\/figure>\n<p>Along with with Nemucod Ransomware, the user\u2019s computer is infected with the Kovter fileless malware. Kovter hides in the Windows registry which is used in campaigns that generate fraudulent clicks on online ads to make money for the attacker.<\/p>\n<figure id=\"attachment_84531\" aria-describedby=\"caption-attachment-84531\" style=\"width: 1010px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-84531\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2017\/07\/Nemucod5.jpg\" alt=\"Fig 5. Kovter registry entry\" width=\"1010\" height=\"614\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/07\/Nemucod5.jpg 1010w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/07\/Nemucod5-300x182.jpg 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/07\/Nemucod5-768x467.jpg 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/07\/Nemucod5-642x390.jpg 642w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/07\/Nemucod5-789x480.jpg 789w\" sizes=\"(max-width: 1010px) 100vw, 1010px\" \/><figcaption id=\"caption-attachment-84531\" class=\"wp-caption-text\">Fig 5. Kovter registry entry<\/figcaption><\/figure>\n<p><strong>How Quick Heal helps<\/strong><\/p>\n<p>1. Quick heal <strong>Email Protection<\/strong> successfully blocks such malicious attachments even before they infect the system.<\/p>\n<figure id=\"attachment_84532\" aria-describedby=\"caption-attachment-84532\" style=\"width: 300px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-84532\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2017\/07\/Nemucod6-1.jpg\" alt=\"Fig 6. Quick Heal Email Protection\" width=\"300\" height=\"183\" \/><figcaption id=\"caption-attachment-84532\" class=\"wp-caption-text\">Fig 6. Quick Heal Email Protection<\/figcaption><\/figure>\n<p>2. Quick Heal <strong>Virus Protection <\/strong>successfully detects and deletes the malicious script file used in the attack.<\/p>\n<figure id=\"attachment_84530\" aria-describedby=\"caption-attachment-84530\" style=\"width: 296px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-84530\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2017\/07\/Nemucod6.jpg\" alt=\"Fig 7. Quick Heal Web Security\" width=\"296\" height=\"157\" \/><figcaption id=\"caption-attachment-84530\" class=\"wp-caption-text\">Fig 7. Quick Heal Virus Protectio<\/figcaption><\/figure>\n<p>3. The below graph shows the trend of the spam emails we received from 1<sup>st<\/sup> to 16<sup>th<\/sup> July 2017.<\/p>\n<figure id=\"attachment_84528\" aria-describedby=\"caption-attachment-84528\" style=\"width: 891px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-84528\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2017\/07\/Nemucod8.png\" alt=\"Fig 8\" width=\"891\" height=\"422\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/07\/Nemucod8.png 891w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/07\/Nemucod8-300x142.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/07\/Nemucod8-768x364.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/07\/Nemucod8-650x308.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/07\/Nemucod8-789x374.png 789w\" sizes=\"(max-width: 891px) 100vw, 891px\" \/><figcaption id=\"caption-attachment-84528\" class=\"wp-caption-text\">Fig 8<\/figcaption><\/figure>\n<p><strong>Security Tips<\/strong><\/p>\n<ol>\n<li>Do not click on links or open attachments received in unexpected and unknown emails<\/li>\n<li>Do not open files with double extensions (e.g. doc.js, wsf.js, etc.)<\/li>\n<li>Avoid clicking on pop-up ads, especially those that talk about unbelievable offers<\/li>\n<li>Avoid visiting less-popular websites<\/li>\n<li>Keep your computer\u2019s Operating System and software such as Adobe, Java, Internet browser, etc., patched and up-to-date<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p><strong>Acknowledgment<\/strong><\/p>\n<ul>\n<li><strong>Subject Matter Expert<\/strong><br \/>\nPrashant Tilekar, Swati Gaikwad | Quick Heal Security Labs<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>For the last few weeks, we have been observing a new malicious spam (malspam) variant that is spreading via an email claiming to be from the United Parcel Service (UPS) carriages. The email carries a zip attachment that contains NemucodAES Ransomware and fileless Kovter Trojan. Earlier, such malspam campaigns were delivering Cerber Ransomware and Kovter [&hellip;]<\/p>\n","protected":false},"author":29,"featured_media":84533,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-84523","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/84523"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/29"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=84523"}],"version-history":[{"count":4,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/84523\/revisions"}],"predecessor-version":[{"id":84537,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/84523\/revisions\/84537"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/84533"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=84523"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=84523"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=84523"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}