SonicWall Security Center
Share: Linkedin Share Facebook Like
Back to SonicALERT


New Locky Ransomware Uses JScript files to avoid detection in the wild (Jul 27,2016)



Description


The Dell Sonicwall Threats Research team observed reports of a new Spam wave of Locky Malware family named GAV: JScript.Nemucod.AY and JScript.Grabber.KM actively spreading in the wild.

This recently discovered variant of the Locky uses Encrypted JScript files to avoid detection.

The malware spreads via spam waves and since the malware comes with a simple Jscript file its seems legitimate and trustworthy at first glance.

Infection Cycle:

The Malware uses the following icons:

The Malware adds the following files to the system:

  • detailed analysis.wsf

    • %Userprofile%\Local Settings\Temp\Xobkg60rnv.exe

  • Sales report.wsf

    • %Userprofile%\Local Settings\Temp\mSsruTKAbsXRp.exe

The Malware comes in two different versions, one acts as downloader and the other act as dropper.

Here is an example of downloader version:

As you can see the malware uses some Jscript technique to evade detections by firewalls.

Here is the dropper example witch comes with an embedded executable file.

Once the computer is compromised, the malware copies its own executable file to %Userprofile%\Local Settings\ Temp\ folder.

The Malware encrypts the victims files with a strong RSA 2048 encryption algorithm until the victim pays a fee to get them back.

After encrypting all the personal documents and files it shows the following web page:

It demanded victims pay the equivalent of Money in Bitcoin virtual currency in order to receive the decryption key that allows them to recover their files.

Command and Control (C&C) Traffic

The Malware performs C&C communication over 80 ports. The malware sends your system information to its own C&C server via following format, here are some examples:

We have been monitoring varying hits over the past few days for the signature that blocks this threat:

SonicWALL Gateway AntiVirus provides protection against this threat via the following signatures:

  • GAV: JScript.Nemucod.AY (Trojan)

  • GAV: JScript.Grabber.KM (Trojan)




Back to top

Back to SonicALERT

Follow: Follow us on Facebook Follow us on Twitter Join the Conversation
#SonicWall
© 2019 SonicWall | Privacy Policy | Conditions for use | Feedback | Live Demo | SonicALERT | Document Library | Report Issues
Version: 14.6 | S2MSW04