{"id":6316,"date":"2017-01-23T15:50:19","date_gmt":"2017-01-23T23:50:19","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/01\/23\/news-154\/"},"modified":"2017-01-23T15:50:19","modified_gmt":"2017-01-23T23:50:19","slug":"news-154","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/01\/23\/news-154\/","title":{"rendered":"Gamarue, Nemucod, and JavaScript"},"content":{"rendered":"<p>JavaScript is now being used largely to download malware because it&#8217;s easy to obfuscate the code and it has a small size. Most recently, one of the most predominant JavaScript malware that has been spreading other malware is <a href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/entry.aspx?Name=TrojanDownloader:JS\/Nemucod\">Nemucod<\/a>.<\/p>\n<p>This JavaScript trojan downloads additional malware (such as <a href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/entry.aspx?Name=Win32\/Tescrypt\">Win32\/Tescrypt<\/a> and <a href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/entry.aspx?Name=Win32\/Crowti\">Win32\/Crowti<\/a> \u2013 two pervasive ransomware trojans that have been doing the rounds for a few years<a href=\"#_ftn1\" name=\"_ftnref1\">[1]<\/a> &#8211; and <a href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/entry.aspx?Name=Win32\/Fareit\">Win32\/Fareit<\/a>) and installs it on a victim&#8217;s system through spam email.<\/p>\n<p>Recently, however, we\u2019ve seen another version of Nemucod distributing <a href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/entry.aspx?Name=Win32%2FGamarue\">Gamarue<\/a> malware to users.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/entry.aspx?Name=Win32%2FGamarue\">Gamarue<\/a><span style=\"text-decoration: underline\">,<\/span> also known as \u201cAndromeda bot\u201d, has been known to arrive through exploit kits, other executable malware downloaders (including <a href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/entry.aspx?Name=Win32%2fDofoil\">Win32\/Dofoil<\/a> and <a href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=Win32\/Beebone\">Win32\/Beebone<\/a>), removable drives, and through that old stand-by: spam campaigns.<\/p>\n<p>The shift to a JavaScript-obfuscated downloader might be an attempt by the malware authors to evade the increasing detection capabilities and sophistication in antimalware products.<\/p>\n<p>A quick look into the obfuscated JavaScript code shows us that, aside from the encrypted strings, it uses variables with random names to hide its real code.<\/p>\n<p><a href=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/05\/NG_1.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-6905\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/05\/NG_1.jpg\" alt=\"Sample of an obfuscated JavaScript code\" width=\"975\" height=\"216\" \/><\/a><\/p>\n<p><em>Figure 1: Obfuscated code<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>The decrypted code is shown in the following image:<\/p>\n<p><a href=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/05\/NG_2.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-6915\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/05\/NG_2.jpg\" alt=\"Sample of a decrypted JavaScript previously-obfuscated code\" width=\"657\" height=\"214\" \/><\/a><\/p>\n<p><em>Figure 2: De-obfuscated code<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>Nemucod is known to have different hashes for each variant. For this one particular hash, since the detection was written in early April, 2016, it reached in total of 982 distinct machines with 4,192 reports &#8211; which indicates the number of Gamarue installations that could have occurred if it was not detected.<\/p>\n<p><a href=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/05\/NG_3.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-6925\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/05\/NG_3-1024x250.jpg\" alt=\"Nemucod detection rate\" width=\"1024\" height=\"250\" \/><\/a><\/p>\n<p><em>Figure 3: \u00a0Nemucod detection rate<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>Gamarue has been observed stealing vital information from your PC. It can also accept commands from a command and control (C&amp;C) server. Depending on the commands received, a malicious hacker can perform various actions on the machine. See our family description of <a href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/entry.aspx?Name=Win32\/Gamarue\">Win32\/Gamarue<\/a> for more information.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h2>Nemucod impact<\/h2>\n<p>Since the start of 2016, Nemucod has risen in prevalence.<\/p>\n<p><a href=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/05\/NG_4b.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-6955\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/05\/NG_4b.jpg\" alt=\"Rising Nemucod prevalence trend\" width=\"783\" height=\"434\" \/><\/a><\/p>\n<p><em>Figure 4:\u00a0\u00a0Rising Nemucod prevalence trend shows that it peaked on April<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>For the top 10 countries for Nemucod detections, the US takes a third, followed by Italy and Japan. The spread of infections is quite widespread across the globe.<\/p>\n<p><a href=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/05\/NG_5.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone  wp-image-6965\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/05\/NG_5.jpg\" alt=\"Nemucod geoloc distribution from January to April 2016\" width=\"597\" height=\"490\" \/><\/a><\/p>\n<p><em>Figure 5: Majority of the Nemucod infections are seen in the United States<\/em><\/p>\n<p>Overall, however, it still remains relatively low, especially when compared to Gamarue.<\/p>\n<p>&nbsp;<\/p>\n<h2>Gamarue impact<\/h2>\n<p>Unlike Nemucod, Gamarue detections started high and have remained high since late last year. Overall, numbers have dropped a small amount since the start of 2016. Interestingly, there are large troughs during every weekend, with a return to higher numbers on Monday. This can indicate that Gamarue is especially pervasive either in enterprises, or in spam email campaigns.<\/p>\n<p><a href=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/05\/NG_6.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-6975\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/05\/NG_6.jpg\" alt=\"Gamarue prevalence chart shows steady pattern from January to April 2016\" width=\"879\" height=\"442\" \/><\/a><\/p>\n<p><em>Figure 6: The Gamarue infection trend shows a steady pattern <\/em><\/p>\n<p>&nbsp;<\/p>\n<p>For Gamarue, the top 10 countries see distribution largely through India, Asia, Mexico, and Pakistan.<\/p>\n<p><a href=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/05\/NG_7.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone  wp-image-6976\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/05\/NG_7.jpg\" alt=\"Gamarue geoloc distribution from January to April 2016\" width=\"649\" height=\"497\" \/><\/a><\/p>\n<p><em>Figure 7: Majority of the Gamarue infection hits third world countries<\/em><\/p>\n<p>&nbsp;<\/p>\n<h2>Mitigation and prevention<\/h2>\n<p>To help stay protected from Nemucod, Gamarue, and other threats, use\u00a0<a href=\"http:\/\/www.microsoft.com\/security\/pc-security\/windows-defender.aspx\">Windows Defender<\/a>\u00a0for Windows 10, or other <a href=\"http:\/\/www.microsoft.com\/security\/portal\/mmpc\/help\/updatesoftware.aspx\">up-to-date<\/a> real-time product as your antimalware scanner.<\/p>\n<p><strong>Use advanced threat and cloud protection<\/strong><\/p>\n<p>You can boost your protection by using Office 365 Advanced Threat Protection and enabling\u00a0<a href=\"https:\/\/blogs.technet.microsoft.com\/mmpc\/2015\/01\/14\/maps-in-the-cloud-how-can-it-help-your-enterprise\/\">Microsoft Active Protection Service<\/a> (MAPS).<\/p>\n<p>Office 365 helps by\u00a0<a href=\"https:\/\/blogs.office.com\/2016\/01\/14\/leading-the-way-in-the-fight-against-dangerous-email-threats\/\">blocking dangerous email threats<\/a>; see <a href=\"https:\/\/www.youtube.com\/watch?v=GEE5y9sE_t4\">Overview of Advanced Threat Protection in Exchange: new tools to stop unknown attacks<\/a>, for details.<\/p>\n<p>MAPS uses cloud protection to help guard against the latest malware threats. You should\u00a0<a href=\"http:\/\/windows.microsoft.com\/en-us\/windows-8\/join-maps-community\">check if MAPS is enabled on your PC<\/a>.<\/p>\n<p>Some additional preventive measures that you or your administrators can proactively do:<\/p>\n<ul>\n<li>Block the IP addresses of the corresponding compromised websites as soon as the administrator identifies the list of sites that Nemucod and Gamarue maliciously connect to<\/li>\n<li>Be aware of and avoid JavaScript-laden spam emails<\/li>\n<li><a href=\"https:\/\/blogs.windows.com\/msedgedev\/2015\/12\/16\/smartscreen-drive-by-improvements\/\">Use Microsoft Edge to get SmartScreen protection<\/a>. SmartScreen can help prevent you from inadvertently browsing sites that are known to be hosting exploits, and helps protect you from socially-engineered attacks such as phishing and malware downloads.<\/li>\n<li>Keep your software\u00a0<a href=\"http:\/\/www.microsoft.com\/security\/portal\/definitions\/adl.aspx\">up-to-date<\/a>\u00a0to mitigate possible software exploits.<\/li>\n<li>Protect derived domain credentials with\u00a0<a href=\"https:\/\/technet.microsoft.com\/en-us\/library\/mt483740%28v=vs.85%29.aspx\">Credential Guard\u00a0for Windows 10 Enterprise<\/a>.<\/li>\n<li>Secure your code integrity with\u00a0<a href=\"https:\/\/technet.microsoft.com\/en-us\/library\/dn986865%28v=vs.85%29.aspx\">Device Guard for Windows 10 Enterprise<\/a><\/li>\n<li><a href=\"http:\/\/download.microsoft.com\/download\/5\/1\/6\/516F59A7-91EE-4463-8612-C85FD3BEBDC7\/pop-securing-lateral-account-movement.pdf\">Secure the lateral account movement in your\u00a0enterprise<\/a>.<\/li>\n<li>Use two-factor authentication with\u00a0<a href=\"https:\/\/blogs.windows.com\/buildingapps\/2016\/01\/26\/convenient-two-factor-authentication-with-microsoft-passport-and-windows-hello\/\">Microsoft Passport and Windows Hello<\/a>.<\/li>\n<li>Ensure that a strong\u00a0<a href=\"https:\/\/technet.microsoft.com\/en-us\/library\/cc770394%28v=ws.10%29.aspx\">password policy<\/a>\u00a0is implemented throughout the enterprise<\/li>\n<li>Turn on your firewall<\/li>\n<li><a href=\"http:\/\/www.microsoft.com\/en-us\/security\/portal\/mmpc\/shared\/prevention.aspx?d13d832f-046d-4936-9102-0516c1a4cdd9=True\">Limit user privileges<\/a><\/li>\n<li><a href=\"https:\/\/support.office.com\/en-us\/article\/Create-remove-or-change-a-trusted-location-for-your-files-f5151879-25ea-4998-80a5-4208b3540a62\">Use trusted locations for files in your enterprise<\/a><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8211;<\/p>\n<p><a href=\"#_ftnref1\" name=\"_ftn1\">[1]<\/a> We\u2019ve published a number of blogs about Crowti, including:<\/p>\n<ul>\n<li><a href=\"https:\/\/blogs.technet.microsoft.com\/mmpc\/2015\/01\/13\/crowti-update-cryptowall-3-0\/\">Crowti update \u2013 CryptoWall 3.0<\/a> (January 2015)<\/li>\n<li><a href=\"https:\/\/blogs.technet.microsoft.com\/mmpc\/2014\/10\/28\/the-dangers-of-opening-suspicious-emails-crowti-ransomware\/\">The dangers of opening suspicious emails: Crowti ransomware<\/a> (October 2014)<\/li>\n<\/ul>\n<p>It was also featured in the July 2015 version of the Malicious Software Removal Tool (MSRT):<\/p>\n<ul>\n<li><a href=\"https:\/\/blogs.technet.microsoft.com\/mmpc\/2015\/07\/13\/msrt-july-2015-crowti\/\">MSRT blog July 2015: Crowti<\/a><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em>Donna Sibangan<\/em><\/p>\n<p><em>MMPC<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/blogs.technet.microsoft.com\/mmpc\/2016\/05\/09\/gamarue-nemucod-and-javascript\/\" target=\"bwo\" >https:\/\/blogs.technet.microsoft.com\/mmpc\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>JavaScript is now being used largely to download malware because it&#8217;s easy to obfuscate the code and it has a small size. Most recently, one of the most predominant JavaScript malware that has been spreading other malware is Nemucod. This JavaScript trojan downloads additional malware (such as Win32\/Tescrypt and Win32\/Crowti \u2013 two pervasive ransomware trojans&#8230;<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10759,10378],"tags":[10872,10873,10874,10875,10871,6490,10851,3765,10518,10876,10762,10787],"class_list":["post-6316","post","type-post","status-publish","format-standard","hentry","category-microsoft","category-security","tag-code-obfuscation","tag-crowti","tag-fareit","tag-gamarue","tag-javascript","tag-maps","tag-nemucod","tag-ransomware","tag-spam","tag-tescrypt","tag-windows-defender","tag-windows-defender-for-windows-10"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6316","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=6316"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6316\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=6316"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=6316"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=6316"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}