Nemty Ransomware 1.0: A Threat in its Early Stage
FortiGuard Labs was investigating the Sodinokibi ransomware family, when we came across the newly discovered Nemty Ransomware. Interestingly, as we analyzed this new malware, we also encountered an artifact embedded in its binary that we were very much familiar with since it was also used by the GandCrab ransomware before the threat actors’ announced retirement. It is also interesting to see that the Nemty ransomware is being distributed using the same method as Sodinokibi, a malware that has strong similarities to GandCrab.
This report discusses the technical aspects of the new ransomware, including some irregularities that make us think that it is still in its early stage of development.
Discovery
The first sample that we were able to analyze came from a link that was shared by the @BotySrt twitter bot account, which posts Pastebin links leading to the Sodinokibi and Buran malware families.
The links lead to Powershell scripts that execute embedded malware payloads using Reflective PE Injection. We collected the links that were tagged as Sodinokibi, expecting to extract samples of that ransomware. However, as we were running our automation to extract the embedded binaries, we found an unsupported file, and as we investigated further, we discovered it was the new Nemty ransomware instead.
A GandCrab Flashback
In our initial analysis of the ransomware, we found a link embedded in its binary which we are very familiar with. It is a statement that was actually used by GandCrab when it was having its vaccine war with Ahnlab, as we detailed previously in our article discussing the evolution of GandCrab v4.x.
The similarities end there, however, so it is hard to say early on if there is any real relation to the two. But the inclusion of this artifact, combined with the fact that it is being distributed by the same group as Sodinokibi (which many see as the reincarnation of GandCrab) makes us curious.
Technical Analysis
Obfuscation
The strings used throughout Nemty’s execution are obfuscated using a combination of simple base64 encoding and RC4 encryption. And to express their unsurprising animosity towards the security industry, this variant use ‘f**kavx00’ as its vulgar RC4 encryption key.
File Encryption
Nemty ransomware uses a combination of AES-128 in CBC mode, RSA-2048, and the unusual RSA-8192 for its file encryption and key protection. The following steps summarize its encryption process.
1. Generate a 32-byte value using a pseudo-random algorithm. This value is added to the configuration information later on. The first 16 bytes are used as the main AES key for file encryption.
2. Generate an RSA-2048 key pair.
3. Decrypt and import the embedded RSA-8192 Public Key using the same RC4-base64 function.
4. Include the generated Private Key from step 2 to the configuration file, which also contains other information gathered from the system (discussed in the next section)
5. Encrypt the configuration file using RSA-8192 Public Key imported in step 3 and encode it in base64.
NOTE: Using RSA encryption with 8192 bits of key size is very unusual. In fact, this may be the first time that we have seen a ransom malware use such strong – albeit overkill and inefficient for its purpose – encryption algorithm to protect information. In most cases, 2048 and 4096 key sizes are more than enough to secure any message. Using the longer key size adds a large overhead due to significantly longer key generation and encryption times. And lastly, RSA-8192 can only encrypt 1024 bytes at a time, even less if we consider the reserved size for padding. Since the configuration’s size will surely be more than that due to the fact that it contains the encoded Private Key (from step 4), the malware cuts the information into chunks of 1000 (0x3e8) bytes and performs multiple operations of the RSA-8192 until the entire information is encrypted.
6. Generate another 16-byte key using the same algorithm used in step 1. This is the IV (Initialization Vector) for the AES-128 CBC mode encryption. A new IV is generated for every file.
7. Encrypt the file content using the main AES Key from step 1 and the current IV.
8. Encrypt the current IV using RSA-2048 with the locally generated Public Key generated in step 2 and encode it in base64.
9. Append the encrypted IV to the file.
This means that, as of now, file decryption is not practically possible without the threat actor’s RSA Private Key pair of the embedded RSA Public Key.
The screenshot below shows files that it avoids during its encryption process. Notice that “boot.ini” is being compared twice. This is clearly an error, which implies that this malware may be in its early stages.
It also avoids files with specific extensions, as listed in the next image, although it is done in a very unusual and rather inefficient way using case-insensitive string comparison.
The confusion continues when it checks to see if the IP address of the victim is located in Russia, Belarus, Kazakhstan, Tajikistan, or Ukraine by accessing hxxp://api.db-ip.com/v2/free/{IP address}/countryName. Ironically, regardless of the result, it still proceeds to the file encryption stage.
Victim Configuration File
The configuration file, as referred to in the malware’s ransom note, acts as the victim’s identification and key for file decryption. The information is assembled and written in JSON format to %USERPROFILE%/{FileID}.nemty, wherein the FileID is _NEMTY_{7 random characters} (e.g. _NEMTY_NIZ8NSt_.nemty). In generating the random characters, it uses the same algorithm used in generating the AES Key and IVs.
The UserID is set to a value hardcoded in the binary. This is possibly an affiliate ID, which means that Nemty is possibly being sold as a Ransomware-as-a-Service (RaaS).
Ransom Note and Payment Page
The payment page is hosted in the Tor network for anonymity, which has become a standard for ransomware operations. To get to the main payment page, the victim must upload the encrypted configuration file and an encrypted file for a decryption test. As of this writing, the threat actors are demanding $1000 in bitcoins in exchange for the decryption of the victim’s files.
There is a function to send the encrypted configuration to ex-filtrate the configuration data from the victim’s machine, although it clearly has not yet been practically implemented. This is because the hardcoded IP address, which is supposed to be the threat actors’ C2 server, is actually the victim system’s loopback address, 127.0.0.1. It is possible that they simply have not configured an operational server to receive the data yet, which is another clue that this ransomware is still in the development stage.
As a result, all information needed for decryption and identification have to be manually submitted by the victim.
The payment page supports the Russian language, which is very unusual and confusing. Considering the embedded image with the Russian statement that was discussed later, it is easy to assume that the developers of Nemty are of Russian descent. Normally, they would avoid infecting Russian users so as to not attract attention from authorities in their region. However, this does not seem to be the case for this ransomware.
Conclusion
Nemty Ransomware is a new file encrypting malware that is being actively distributed. Although it is interesting to think that it may have some relation to GandCrab and Sodinokibi, aside from the insulting Russian statement and the similar distribution method, we have not found any compelling evidence to tie them together.
It also appears that this malware may be yet another RaaS (Ransomware-as-a-Service) due to the existence of a possible affiliate ID. This means we might be seeing more of this malware being distributed through other means pretty soon.
We have also discussed several irregularities and inefficiencies in its code, implying that it is still in its early stage of development. Despite that, however, in its current state it can still carry out file encryption on a victim’s system, making it a real threat.
As of this writing, a new version of this malware has been found and is already being analyzed. FortiGuard Labs will be releasing a new report about it.
-= FortiGuard Lion Team =-
Solutions
Fortinet customers are protected by the following:
- Samples are detected by our W32/Gen.NVV!tr.ransom signature
- FortiSandbox rates the malware’s behavior as high risk
IOCs
267a9dcf77c33a1af362e2080aaacc01a7ca075658beb002ab41e0712ffe066e (Nemty ransomware from Powershell) – W32/Gen.NVV!tr.ransom
hxxps://pastebin.com/raw/NE3TJ3z1 (link to the Powershell loader)
127.0.0.1:9050/public/gate?data={encrypted configuration}
Learn more about FortiGuard Labs and the FortiGuard Security Services portfolio. Sign up for our weekly FortiGuard Threat Brief.
Read about the FortiGuard Security Rating Service, which provides security audits and best practices.