{"id":1824,"date":"2024-09-25T07:10:34","date_gmt":"2024-09-25T07:10:34","guid":{"rendered":"https:\/\/xdr-mdr.lmntrix.com\/main_web\/?p=1824"},"modified":"2025-07-29T02:59:18","modified_gmt":"2025-07-29T02:59:18","slug":"ransomware-double-dip-is-the-same-group-behind-the-recent-nemucod-and-globeimposter-campaigns","status":"publish","type":"post","link":"https:\/\/lmntrix.com\/blog\/ransomware-double-dip-is-the-same-group-behind-the-recent-nemucod-and-globeimposter-campaigns\/","title":{"rendered":"Ransomware double-dip: is the same group behind the recent Nemucod and Globeimposter campaigns?"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/dd-1.webp\" alt=\"\"\/><\/figure>\n\n\n\n<p>In the few weeks, the Nemucod and Globeimposter ransomware strains have been dusted off and launched against organizations across the globe. In analyzing the samples, LMNTRIX Cyber Defence Centre analysts discovered that the strains share a number of common of features, suggesting the two campaigns may have been coordinated to dovetail into each other.&nbsp;<br><br>In this post, we\u2019ll analyse how the Nemucod Trojan Downloader \u2013 which was prolific in 2015 \u2013 had its delivery network upgraded to produce ransomware samples appending (.725) file extensions delivered through JavaScript attachments. Immediately following this, was a Globeimposter campaign which added (.726) encrypted file extensions to victim files.<br><br>Both variants were first identified in 2015 and used widely before witnessing a decline in distribution. Interestingly, in the weeks leading up to the recent campaign, both malware families had their payload versions updated.<br><br>Below, the <a href=\"https:\/\/www.checkpoint.com\/\" target=\"_blank\" rel=\"noopener\">Checkpoint <\/a>Threat Map illustrates the global ransomware attack trends during the last week of July and the first week of August \u2013 the period in which the Nemucod and Globeimposter campaigns were their most active.<br><br><img fetchpriority=\"high\" decoding=\"async\" width=\"700\" height=\"264\" class=\"wp-image-1850\" style=\"width: 700px;\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/map.webp\" alt=\"\"><br><br><strong>DELIVERY<\/strong><br><br>The initial attack wave was carried out by the Nemucod Trojan downloader. Although the Command and Control (C2) servers communicating with the malware had been previously established for malware families like TeslaCrypt, Miruef, Crowti, this campaign differed as it included a JavaScript (JS) attachment embedded into the \u201c\\bUPS_Parcel_ID_\\d+\\s{0,3}\\b\\.zip\\b$\u201d.&nbsp;<br><br>The malicious JS code is as follows:<br><br><img decoding=\"async\" width=\"600\" height=\"344\" class=\"wp-image-1849\" style=\"width: 600px;\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/N1.webp\" alt=\"\"><br><br>Above, we can see the C&amp;C domains were statically added into the code (i.e. www.shiashop.com, lamancha.club and infosoft.pl) for payload download. The Globeimposter ransomware followed the same delivery method as Nemucod.<br><br><strong>INFECTION CHAIN ANALYSIS<\/strong><br><img decoding=\"async\" width=\"700\" height=\"371\" class=\"wp-image-1848\" style=\"width: 700px;\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/N2.webp\" alt=\"\"><br><br>After witnessing the similarities, our researchers decided to take a closer look at the infection chain. As expected, both ransomware families had the same technique, tactics and procedures (TTPs) adding further weight to the hypotheses that the two were linked.&nbsp;<br><br><em><strong>A.&nbsp;&nbsp; &nbsp;NEMUCOD&nbsp;&nbsp;<\/strong><\/em><br><br><strong>Static Analysis<\/strong><br><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>&nbsp;File name<\/strong><\/td><td>&nbsp;Nemocod.js<\/td><\/tr><tr><td>&nbsp;<strong>File type<\/strong><\/td><td>&nbsp;Javascript (.js) file<\/td><\/tr><tr><td>&nbsp;<strong>Md5 hash<\/strong><\/td><td>&nbsp;662deb567110ce61b0efd921b594f66a<\/td><\/tr><tr><td>&nbsp;<strong>SHA1 hash<\/strong><\/td><td>&nbsp;3d43d4188fb7aa235b955aaf3edbbfd66d6562ae<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>Upon viewing the obfuscated (.js) file code, several instances of wscript shell execution were observed:<br><br>&nbsp;<img loading=\"lazy\" decoding=\"async\" width=\"700\" height=\"143\" class=\"wp-image-1847\" style=\"width: 700px;\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/N3.webp\" alt=\"\" srcset=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/N3.webp 1563w, https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/N3-1536x313.webp 1536w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><br><br>&nbsp;<img loading=\"lazy\" decoding=\"async\" width=\"700\" height=\"135\" class=\"wp-image-1846\" style=\"width: 700px;\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/N4.webp\" alt=\"\"><br><br><img loading=\"lazy\" decoding=\"async\" width=\"700\" height=\"136\" class=\"wp-image-1845\" style=\"width: 700px;\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/N5.webp\" alt=\"\"><br><br>It also contained various encoded browser detection capabilities:<br><br><img loading=\"lazy\" decoding=\"async\" width=\"700\" height=\"130\" class=\"wp-image-1844\" style=\"width: 700px;\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/N6.webp\" alt=\"\"><br><\/p>\n\n\n\n<p>&nbsp;Below we can see the process by which Nemucod tries to establish communication with the C&amp;C domain via encoded request:<br><br><img loading=\"lazy\" decoding=\"async\" width=\"700\" height=\"87\" class=\"wp-image-1843\" style=\"width: 700px;\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/N7.webp\" alt=\"\"><br><br><img loading=\"lazy\" decoding=\"async\" width=\"700\" height=\"107\" class=\"wp-image-1842\" style=\"width: 700px;\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/N8.webp\" alt=\"\"><br><\/p>\n\n\n\n<p><br><br>On visiting the URL, an executable gets dropped in the %TEMP% location.<br><br><strong>Dynamic Analysis<\/strong><br><br>Executing the .js wscript established a connection with the IP address \u201c107.189.3.214\u201d as shown below:<br><br><img loading=\"lazy\" decoding=\"async\" width=\"700\" height=\"145\" class=\"wp-image-1841\" style=\"width: 700px;\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/N9.webp\" alt=\"\" srcset=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/N9.webp 770w, https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/N9-768x160.webp 768w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/>&nbsp;<br><br>This contacts the domain \u201czubairfazal[.]com\u201d to download another binary file (starting with \u2018MZ\u2019 \u2013 the identification marker of a portable executable):<br><br><img loading=\"lazy\" decoding=\"async\" width=\"700\" height=\"365\" class=\"wp-image-1840\" style=\"width: 700px;\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/N10.webp\" alt=\"\">&nbsp;<br><br>Another binary \u201csYDqyCiKm1.exe\u201d and various other files are then subsequently dropped: &nbsp;<br><br><img loading=\"lazy\" decoding=\"async\" width=\"700\" height=\"301\" class=\"wp-image-1839\" style=\"width: 700px;\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/N11.webp\" alt=\"\"><br><br>Once the necessary files are in place, \u2018sYDqyCiKm1.exe\u2019 starts executing in the background:<br><br><img loading=\"lazy\" decoding=\"async\" width=\"700\" height=\"502\" class=\"wp-image-1838\" style=\"width: 700px;\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/N12.webp\" alt=\"\">&nbsp;<br><br>&nbsp;A bat file, \u2018_tD2A9.tmp.bat\u2019, deletes the volume shadow copies using the \u2018vssadmin.exe Delete shadows\u2019 command, adds and removes some registries using \u2018reg add\u2019 and \u2018reg Delete\u2019 commands and changes the default file attributes using \u2018attrib command\u2019.<br><br>&nbsp;<img loading=\"lazy\" decoding=\"async\" width=\"700\" height=\"418\" class=\"wp-image-1837\" style=\"width: 700px;\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/N13.webp\" alt=\"\"><br><br>As a result, system files are encrypted with .725 extensions:<br><br><img loading=\"lazy\" decoding=\"async\" width=\"700\" height=\"344\" class=\"wp-image-1836\" style=\"width: 700px;\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/N14.webp\" alt=\"\"><br><br>The following files are also added:<br><br><img loading=\"lazy\" decoding=\"async\" width=\"700\" height=\"986\" class=\"wp-image-1835\" style=\"width: 700px;\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/N15.webp\" alt=\"\"><br><\/p>\n\n\n\n<p><em><strong>B.&nbsp;&nbsp; &nbsp;GLOBEIMPOSTER RANSOMWARE<\/strong><\/em><br><br><strong>Static Analysis<\/strong><br><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>&nbsp;File Name<\/td><td>&nbsp;GlobeImposter.exe<\/td><\/tr><tr><td>&nbsp;File type<\/td><td>&nbsp;Portable executable (PE) file<\/td><\/tr><tr><td>&nbsp;Md5 hash&nbsp;<\/td><td>&nbsp;25e8bf41343bda75a9170aad44094647<\/td><\/tr><tr><td>&nbsp;SHA1 hash<\/td><td>&nbsp;0976b97981640eab4b8c66dc48ed4547d4cb26e6<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>Upon viewing the strings, there are several malicious API calls used by this malware sample:<br><br>\u2022&nbsp;&nbsp; &nbsp;\u2018CreateFileW,Writefile\u2019 for file dropping&nbsp;<br><br>\u2022&nbsp;&nbsp; &nbsp;\u2018GetCommandlineA\u2019 for accessing windows command line<br><br>\u2022&nbsp;&nbsp; &nbsp;\u2018GetFileAttributes\u2019 to check file permissions on the system<br><br>\u2022&nbsp;&nbsp; &nbsp;\u2018GetStartupinfo\u2019 to confirm startup information while the system boots up<br><br>\u2022&nbsp;&nbsp; &nbsp;\u2018Isdebuggerpresent\u2019 and \u2018VirtualAlloc\u2019 to check if the sample is running on a virtual machine<br><br><img loading=\"lazy\" decoding=\"async\" width=\"700\" height=\"573\" class=\"wp-image-1834\" style=\"width: 700px;\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/N16.webp\" alt=\"\"><br><br><strong>Dynamic Analysis<\/strong><br><br>On executing the malware sample, it was found that it initiates another child process with the same name as \u2018cmd.exe\u2019:<br><br>&nbsp;<img loading=\"lazy\" decoding=\"async\" width=\"700\" height=\"66\" class=\"wp-image-1833\" style=\"width: 700px;\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/N17.webp\" alt=\"\"><br><br>These processes then disappear from the processes list until only one instance of globeimposter.exe was left running:<br><br>&nbsp;<img loading=\"lazy\" decoding=\"async\" width=\"700\" height=\"110\" class=\"wp-image-1832\" style=\"width: 700px;\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/N18.webp\" alt=\"\"><br><br>After the initial execution of the instruction set, the encryption process starts, resulting in all the files on the user\u2019s system being encrypted with .726 extensions:<br><br><img loading=\"lazy\" decoding=\"async\" width=\"700\" height=\"1076\" class=\"wp-image-1831\" style=\"width: 700px;\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/N19.webp\" alt=\"\"><br><br>&nbsp;<img loading=\"lazy\" decoding=\"async\" width=\"700\" height=\"866\" class=\"wp-image-1830\" style=\"width: 700px;\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/N20.webp\" alt=\"\"><br><br>&nbsp;Two .bat files are also dropped in the %TEMP% location and are used to delete the volume shadow copies, some registry keys and change file attributes on the target system.<br><br>&nbsp;<img loading=\"lazy\" decoding=\"async\" width=\"700\" height=\"348\" class=\"wp-image-1829\" style=\"width: 700px;\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/N21.webp\" alt=\"\"><br><br><img loading=\"lazy\" decoding=\"async\" width=\"700\" height=\"172\" class=\"wp-image-1828\" style=\"width: 700px;\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/N22.webp\" alt=\"\"><br><br>&nbsp;<img loading=\"lazy\" decoding=\"async\" width=\"700\" height=\"153\" class=\"wp-image-1827\" style=\"width: 700px;\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/N23.webp\" alt=\"\"><br><br><strong>INDICATOR OF COMPROMISE (IOC)<\/strong><br><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>&nbsp;<strong>File Name<\/strong><\/td><td><strong>&nbsp;Md5 hashes<\/strong><\/td><\/tr><tr><td>&nbsp;__t1065.tmp.bat<\/td><td>&nbsp;32d8f7a3d0c796cee45f64b63c1cca38<\/td><\/tr><tr><td>&nbsp;__t1969.tmp.bat&nbsp;<\/td><td>&nbsp;32d8f7a3d0c796cee45f64b63c1cca38<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>&nbsp;File Name<\/strong><\/td><td><strong>&nbsp;Md5 hashes<\/strong><\/td><\/tr><tr><td>&nbsp;BIT594E.tmp&nbsp;<\/td><td>&nbsp;d41d8cd98f00b204e9800998ecf8427e<\/td><\/tr><tr><td>&nbsp;sYDqyCiKm1.exe&nbsp;<\/td><td>&nbsp;ece16814e892478cfb747662a49e6d9e<\/td><\/tr><tr><td>&nbsp;__tD2A9.tmp&nbsp;&nbsp;<\/td><td>&nbsp;d41d8cd98f00b204e9800998ecf8427e<\/td><\/tr><tr><td>&nbsp;__tD2A9.tmp.bat&nbsp;<\/td><td>&nbsp;32d8f7a3d0c796cee45f64b63c1cca38<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><strong>CONCLUSION<\/strong><br><br>The nexus between these two ransomware campaigns can be seen in the similar extensions added to the victim\u2019s encrypted files. Together with the sharing of common infrastructure, we can safely assume the same threat actors are behind both campaigns. We hope this analysis serves as starting point for the wider researcher community to dive deeper into the attacks in order make the attacker\u2019s fingerprint exposed when they inevitably resurface with another similar attack. &nbsp;<br><br>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the few weeks, the Nemucod and Globeimposter ransomware strains have been dusted off and launched against organizations across the globe. In analyzing the samples, LMNTRIX Cyber Defence Centre analysts discovered that the strains share a number of common of features, suggesting the two campaigns may have been coordinated to dovetail into each other.&nbsp; In [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1875,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21],"tags":[],"class_list":["post-1824","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-labs"],"_links":{"self":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/1824","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/comments?post=1824"}],"version-history":[{"count":2,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/1824\/revisions"}],"predecessor-version":[{"id":4167,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/1824\/revisions\/4167"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media\/1875"}],"wp:attachment":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media?parent=1824"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/categories?post=1824"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/tags?post=1824"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}