Nemucod serves nasty package: Combining ransomware and ad-clickers

bumihills-623x410.jpg

Nemucod, previously one of the worst infecting malware types in Ireland is causing mayhem again.

Just last week ESET reported on Nemucod shifting away from ransomware and downloading the ad-clicking malware Kovter instead. Now, it seems that the operators of the notorious downloader went a step further and are serving their victims the whole package – ransomware as well as ad-clickers.

Same as before, the targeted user receives an email with infected attachment containing an executable .js file – the downloader. After unpacking and running it, it downloads five files at once. The first two are ad-clickers detected by ESET as Win32/Kovter and Win32/Boaxxe.

But that’s just the beginning, as the remaining three files have one very clear objective – to find the most valuable files on the computer and encrypt them. To run the ransomware, Nemucod installs a PHP interpreter and an additional PHP library (these two files are actually clean). Only after that a third file detected by ESET as PHP/Filecoder.D is downloaded and starts its malicious activities, using an encryption key hardcoded directly in the malware.

The result? Files with one of about 120 extensions, including MS Office files, images, videos, sound files and others get encrypted and get the “.crypted” extension. After the ransomware has finished with encryption, Nemucod creates a text file with a ransom demand. In the end, the PHP interpreter, its library and the filecoder file are removed from the system.

Looking at the rest of the payload, Boaxxe is a remotely controlled backdoor that is able to download and execute files or install extensions to popular browsers such as Chrome and Firefox. On top of this, the Trojan connects to a C&C server enabling its operator to misuse the infected machine as a proxy server, probably as a means for click-fraud or boosting traffic for selected websites.

Another interesting Nemucod activity was observed at the end of last week in Latin America. The downloader was delivering large amounts of Win32/Spy.Banker.ADEA to Brazilian users.

Hashes:

b0be940019e2adf0032532e537635a4e4e0e8ba33d45c9d2cf0a10068e6598dc a25fc09072a64fcbd73106cefb7e2d621a91cfe1f07651e816f85e8a6a5aa6ea 4ed142ac450d0ea86e0e31c46b1ca928bde991a7432dd6a0c2c3d79833ccac95 401901b995f8aaa07c6a9490ec7b320cac95baf9cd3c94c644d14fe3bec0ddac fe7d4052d937d85401fc6ed539904d0b97cd4306961c9861a643fed51b6bdc93

by Ondrej Kubovic, ESET IT Security Specialist


Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s