- Distribution Method : Unknown
 
 - MD5 : 2b6c6d8424c1b149c7f81e2565aaa7e6
 
 - Encrypted File Pattern : .NEMTY_<7-Digit Random>
 
 - Malicious File Creation Location :
 - C:\Users\%UserName%\AppData\Local\Temp\<Number>.exe
 - C:\Users\%UserName%\NEMTY_<7-Digit Random>-DECRYPT.txt 
 - Payment Instruction File : NEMTY_<7-Digit Random>-DECRYPT.txt
 
 - Major Characteristics :
 - Offline Encryption
 - Checking IP address (api.db-ip.com)
 - Block processes execution (excel.*, oracle.*, outlook.*, sql.*, thunderbird.*, winword.* etc.)
 - Stop multi services (AcronisAgent, AcrSch2Svc, Apache2.4, DbxSvc, OracleXETNSListener, OracleServiceXE etc.)
 - Disable system restore (vssadmin resize shadowstorage /for=<Drive Letter>: /on=<Drive Letter>: /maxsize=401MB, vssadmin resize shadowstorage /for=<Drive Letter>: /on=<Drive Letter>: /maxsize=unbounded, bcdedit /set {default} bootstatuspolicy ignoreallfailures, bcdedit /set {default} recoveryenabled no, wbadmin delete catalog -quiet, wmic shadowcopy delete, G e t - W m i O b j e c t   W i n 3 2 _ S h a d o w c o p y   |   F o r E a c h - O b j e c t   { $ _ . D e l e t e ( ) ; }) 
 
					List