Threat Database Ransomware Nemesis Ransomware

Nemesis Ransomware

By GoldSparrow in Ransomware
Translate To:

Threat Scorecard

Threat Level: 80 % (High)
Infected Computers: 12
First Seen: January 10, 2017
Last Seen: November 6, 2025
OS(es) Affected: Windows

The Nemesis Ransomware is an encryption ransomware Trojan that uses a strong encryption method to prevent computer users from accessing their files. The Nemesis Ransomware is just one of the countless ransomware Trojans that use email addresses in the @india.com domain. Like other ransomware Trojans, the Nemesis Ransomware is designed to encrypt the victim's files and then demand the payment of a ransom in exchange for the decryption key that is necessary to recover the affected files. Countless variants of the Nemesis Ransomware were released in the last year.

The Nemesis Ransomware is the Nemesis of Your Files

One of the reasons why threats like the Nemesis Ransomware are so successful in their attacks is the use of a combination of AES and RSA encryption to make the victim's files completely inaccessible. Even if the Nemesis Ransomware is removed from the infected computer, the damage is done, and the victim's files will remain encrypted. The files affected by the Nemesis Ransomware can be identified easily because the Nemesis Ransomware will add the extension '.v8dp' to the end of the files' names. Victims of the Nemesis Ransomware attack are asked to pay an extremely high ransom of 10 BitCoins, more than $10,000 USD at the current exchange rate! PC security analysts strongly advise computer users to avoid paying this amount. Fortunately, it is very easy to have measures in place to prevent these types of attacks, and it may be nearly free and only a tiny fraction of the cost of dealing with one of these attacks.

The Nemesis Ransomware Attack and Ransom Demands

It is currently unknown where the Nemesis Ransomware and its variants originate. It is, in fact, possible that the Nemesis Ransomware was created from other ransomware in these threat families independently. It is not uncommon for con artists to recycle code from one threat to another, making many of these threats very similar to one another. The Nemesis Ransomware will begin encrypting the victims' data as soon as it enters a computer, typically searching for files matching certain file types, such as audio, image and video files. The Nemesis Ransomware can be at its most damaging if it manages to infiltrate a Web server or a server for a small business. Many companies are willing to pay the high ransom amount that the Nemesis Ransomware asks for, especially if multiple computers have been infected and it has a significant effect on the business' day-to-day activities. After the Nemesis Ransomware encrypts the victim's files, it delivers its ransom note. The following is the full text of the Nemesis Ransomware ransom note:

'ALL YOUR IMPORTANT FILES ARE ENCRYPTED
Your documents, photos, databases and other important fíles have been encrypted! To decrypt your files you need to buy the special software – «the Nemesis decrypt»
To obtain decryptor, please, contact me by email: the Nemesis-decryptor@india.com
********************OR******************
Write me in online Service: https://bitmsg.me
Address: BM-2cVcW2PHuo8HsWtmoY3oFPcU76bqJ*****
Your personál identification ID: id-8932*****'

Each infected computer will have a different ID number, which is assigned to the victim at the moment of infection.

Dealing with and Preventing a Nemesis Ransomware Infection

The first attacks involving the Nemesis Ransomware were first observed on January 8, 2017. It is likely that the Nemesis Ransomware is being distributed using corrupted email attachments contained in spam email messages. Because of this, the first way to prevent the Nemesis Ransomware attacks is to avoid opening unsolicited email attachments and handle emails with caution. It is especially necessary to have a reliable anti-spam filter. A reliable security program that is fully up-to-date can prevent the Nemesis Ransomware from being installed and detect the infection before it causes too much damage. However, the best way to protect your data from the Nemesis Ransomware and similar threats is to have backups of all files. Having backup copies of the files encrypted by the Nemesis Ransomware allows computer users to recover from an attack quickly without having to consider paying the ransom.

Analysis Report

General information

Family Name: Trojan.Cridex.A
Signature status: No Signature

Known Samples

MD5: f426f66f0c246a2bcc0a75560ca3627c
SHA1: eca36576863df6797915ba22a506fe57de6c3f0a
SHA256: 9B39050AAE0F45A03FFB5203D6410B4275B03997A0DF8ED875817C9647B3142D
File Size: 754.18 KB, 754176 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have security information
  • File has exports table
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

Windows PE Version Information

Name Value
Comments Give which
Company Name CornerNine GPS Insight Skill
File Description NightRich Crop Second
File Version 4.1.3484.4699
Internal Name visit2.dll
Original Filename visit2.dll
Product Name NightRich Crop Second
Product Version 4.1.3484.4699

File Traits

  • dll
  • HighEntropy
  • x86

Block Information

Total Blocks: 570
Potentially Malicious Blocks: 23
Whitelisted Blocks: 547
Unknown Blocks: 0

Visual Map

0 0 0 0 0 0 0 0 0 0 0 0 x x 0 x 0 0 0 x 0 0 0 0 0 x x 0 0 0 0 x 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 x 0 0 0 0 x 0 0 x 0 x 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 x x 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 1 0 0 2 0 0 0 0 0 0 0 0 0 1 1 1 1 2 0 0 1 0 0 0 0 0 0 1 0 0 0 1 1 0 0 1 0 0 2 2 1 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 1 1 0 0 0 0 0 0 1 1 0 0 0 1 0 0 0 0 0 0 0 0 0 1 1 1 3 1 0 0 0 0 1 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 1 0 1 0 0 0 1 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 2 3 0 0 1 0 0 0 0 1 0 0 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 1 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 2 2 0 0 0 0 0 0 0 1 1 0 0 1 0 0 0 0 1 0 0 0 0 0 0 0 2 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 x 0 x x x x x x x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Windows API Usage

Category API
Syscall Use
  • ntdll.dll!NtAlpcSendWaitReceivePort
  • ntdll.dll!NtClose
  • ntdll.dll!NtCreateFile
  • ntdll.dll!NtCreateSection
  • ntdll.dll!NtFreeVirtualMemory
  • ntdll.dll!NtMapViewOfSection
  • ntdll.dll!NtOpenFile
  • ntdll.dll!NtOpenKey
  • ntdll.dll!NtOpenProcessToken
  • ntdll.dll!NtQueryAttributesFile
Show More
  • ntdll.dll!NtQueryDebugFilterState
  • ntdll.dll!NtQueryInformationProcess
  • ntdll.dll!NtQueryInformationToken
  • ntdll.dll!NtQuerySystemInformationEx
  • ntdll.dll!NtQueryValueKey
  • ntdll.dll!NtQueryVirtualMemory
  • ntdll.dll!NtQueryVolumeInformationFile
  • ntdll.dll!NtReadFile
  • ntdll.dll!NtSetEvent
  • ntdll.dll!NtSetInformationFile
  • ntdll.dll!NtSetInformationProcess
  • ntdll.dll!NtSetInformationVirtualMemory
  • ntdll.dll!NtSetInformationWorkerFactory
  • ntdll.dll!NtTestAlert
  • ntdll.dll!NtTraceControl
  • ntdll.dll!NtUnmapViewOfSection
  • ntdll.dll!NtWriteFile
Process Shell Execute
  • CreateProcess
Anti Debug
  • NtQuerySystemInformation

Shell Command Execution

C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\eca36576863df6797915ba22a506fe57de6c3f0a_0000754176.,LiQMAxHB

Trending

Most Viewed

Loading...