- Distribution Method : Mail attachment file
- MD5 : 8f20235e28723c5024db81d16777b3e8
- Major Detection Name : Trojan.Ransom.Nemty (ALYac), Trojan:Win32/Wacatac.B!ml (Microsoft)
- Encrypted File Pattern : ._NEMTY_<7-Digit Random>_
- Malicious File Creation Location :
- C:\Users\%UsrName%\AppData\Roaming\tor
- C:\Users\%UsrName%\TorDir
- C:\Users\%UsrName%\TorDir\Data
- C:\Users\%UsrName%\TorDir\Data\Tor
- C:\Users\%UsrName%\TorDir\Data\Tor\geoip
- C:\Users\%UsrName%\TorDir\Data\Tor\geoip6
- C:\Users\%UsrName%\TorDir\Tor
- C:\Users\%UsrName%\TorDir\Tor\libeay32.dll
- C:\Users\%UsrName%\TorDir\Tor\libevent_core-2-1-6.dll
- C:\Users\%UsrName%\TorDir\Tor\libevent_extra-2-1-6.dll
- C:\Users\%UsrName%\TorDir\Tor\libevent-2-1-6.dll
- C:\Users\%UsrName%\TorDir\Tor\libgcc_s_sjlj-1.dll
- C:\Users\%UsrName%\TorDir\Tor\libssp-0.dll
- C:\Users\%UsrName%\TorDir\Tor\libwinpthread-1.dll
- C:\Users\%UsrName%\TorDir\Tor\ssleay32.dll
- C:\Users\%UsrName%\TorDir\Tor\tor.exe
- C:\Users\%UsrName%\TorDir\Tor\tor-gencert.exe
- C:\Users\%UsrName%\TorDir\Tor\zlib1.dll
- C:\Users\%UsrName%\NEMTY-DECRYPT.txt
- C:\Users\%UsrName%\_NEMTY_<7-Digit Random>_.nemty
- Payment Instruction File : NEMTY-DECRYPT.txt
- Major Characteristics :
- Checking IP address (api.db-ip.com)
- Disable system restore (vssadmin.exe delete shadows /all /quiet, bcdedit /set {default} bootstatuspolicy ignoreallfailures, bcdedit /set {default} recoveryenabled no, wbadmin delete catalog -quiet, wmic shadowcopy delete)
List