• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Cybersecurity  /  NemucodAES malspam is back and this time it brought along Kovter Trojan
NemucodAES malspam is back and this time it brought along Kovter Trojan
21 July 2017

NemucodAES malspam is back and this time it brought along Kovter Trojan

Written by Rajib Singha
Rajib Singha
Cybersecurity

For the last few weeks, we have been observing a new malicious spam (malspam) variant that is spreading via an email claiming to be from the United Parcel Service (UPS) carriages. The email carries a zip attachment that contains NemucodAES Ransomware and fileless Kovter Trojan.

Earlier, such malspam campaigns were delivering Cerber Ransomware and Kovter Trojan.

Attack Methodology

Step1 – The user receives a spam email with a malicious zip that contains a JavaScript file.

nemucod1
Fig 1. Spam email

Spam emails sent in this campaign usually contain the below subject lines and attachment names to trick the user into opening the email.

Subject Lines Attachment Names
***INFECTED*** Problems with item delivery n.004640147 UPS-Package-004640147.zip
***INFECTED*** Problems with item delivery n.001656569 UPS-Label-001656569.zip
Parcel ID004692898 delivery problems please review UPS-Receipt-004692898.zip
We could not deliver your parcel #004522553 UPS-Delivery-004522553.zip
Our UPS courier can not contact you (parcel #008284689) UPS-Parcel-ID-008284689.zip
Notification status of your delivery (UPS 5952930) UPS-Delivery-Details-5952930.zip
Notification status of your delivery (UPS 001387092) UPS-Package-001387092.zip

 

Step2 – JavaScript execution

The JavaScript file has a long variable which is used to download “counter.js” files from compromised websites. This “counter.js” is responsible for switching into embedded PHP and download its PHP interpreter files which are, in turn, responsible for encryption.

 

Fig 2. Malicious JavaScript
Fig 2. Malicious JavaScript

 

Fig3: Dropped files at %temp% location
Fig 3: Dropped files at %temp% location

After execution, files are encrypted without any extensions or name change. For encryption, a mix of AES-128 in ECB mode and RSA encryption algorithms are used in order to make the decryption of files more difficult.

After encryption, the below ransom note is displayed.

Fig 4. Ransom note
Fig 4. Ransom note

Along with with Nemucod Ransomware, the user’s computer is infected with the Kovter fileless malware. Kovter hides in the Windows registry which is used in campaigns that generate fraudulent clicks on online ads to make money for the attacker.

Fig 5. Kovter registry entry
Fig 5. Kovter registry entry

How Seqrite helps

1. Seqrite Endpoint Security Email Protection successfully blocks such malicious attachments even before they infect the system.

Seqrite Endpoint Security Email Protection
Fig 6. Seqrite Endpoint Security Email Protection

2. Seqrite Endpoint Security Virus Protection detects and deletes the malicious script file used in the attack.

Seqrite Endpoint Security Online Protection
Fig 7. Seqrite Endpoint Security Virus Protection

3. The below graph shows the trend of the spam emails we received from 1st to 16th July 2017.

Fig 8
Fig 8

Security Tips

  1. Do not click on links or open attachments received in unexpected and unknown emails
  2. Do not open files with double extensions (e.g. doc.js, wsf.js, etc.)
  3. Avoid clicking on pop-up ads, especially those that talk about unbelievable offers
  4. Avoid visiting less-popular websites
  5. Keep your computer’s Operating System and software such as Adobe, Java, Internet browser, etc., patched and up-to-date

Acknowledgment

  • Subject Matter Expert
    Prashant Tilekar, Swati Gaikwad | Quick Heal Security Labs

 Previous PostCyber security challenges of the future
Next Post  Why Education Institutions Need Security Software?
Rajib Singha

About Rajib Singha

Rajib is an IT security news junkie and a computer security blogger at Quick Heal. He is passionate about promoting cybersecurity awareness, content and digital...

Articles by Rajib Singha »

Related Posts

  • ZTNA Use Cases and Benefits for BFSI

    May 19, 2025
  • Market Guide for Choosing the Right ZTNA Solution

    May 14, 2025
  • Protect What Matters Most with Data Discovery and Classification

    May 12, 2025
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies