JS/Nemucod.DMX!tr

description-logoAnalysis


JS/Nemucod.DMX!tr is a generic detection for a type of javascript downloader trojan. Since this is a generic detection, malware that are detected as S/Nemucod.DMX!tr may have varying behavior. At the time of this analysis, the javascript downloader has been observed to download and run the GlobeImposter ransomware.
Below are examples of some of these behavior:

  • This malware drops the following files:
    • undefinedinternet_cacheundefined\content.ie5\e36puy1s\87wefhi[1].txt : This file is detected as W32/GlobeImposter.A!tr.
    • undefinedTempundefined\lslqglvhn2.exe : This file is detected as W32/GlobeImposter.A!tr.
    • undefinedAllUsersProfileundefined\lslqglvhn2.exe : This file is detected as W32/GlobeImposter.A!tr .
    • undefinedTempundefined\__te.tmp.bat : This file is detected as BAT/Agent.352B!tr.

  • The following suspicious registry key(s) have been added to cause the program to be run each time a user logs on:
    • HKEY_CURRENT_USER\Software\Microsoft\Windows\Currentversion\Runonce
      • Certificatescheck = undefinedAllUsersProfileundefined\lslqglvhn2.exe
      Entries made by executable programs are deleted after being processed.

  • This javascript downloader downloads a file from the following URL:
    • hxxp://flooringforyo{Removed}.co.uk/87wefhi??LslqGlVHN=LslqGlVHN

  • Below is an example after the system get infected : How to decypt files:

    • Figure 1: Instruction to how to decrypt the encrypted files.


recommended-action-logoRecommended Action

  • Make sure that your FortiGate/FortiClient system is using the latest AV database.
  • Quarantine/delete files that are detected and replace infected files with clean backup copies.

Telemetry logoTelemetry

Detection Availability

FortiGate
Extended
FortiClient
Extreme
FortiAPS
FortiAPU
FortiMail
Extreme
FortiSandbox
Extreme
FortiWeb
Extreme
Web Application Firewall
Extreme
FortiIsolator
Extreme
FortiDeceptor
Extreme
FortiEDR

Version Updates

Date Version Detail
2021-03-16 84.00752