Back to Resources

SentinelOne Vs. Nemucod – Prevent (On-Execution)

The Nemucod family of trojans, which have existed for several years, typically serve as downloaders and/or droppers for additional malicious components. The JSCRIPT-based droppers are associated with a number of ransomware/malware families including TeslaCrypt, Kryptik, ElDorado, Emotet, Ryuk, and countless others. Distribution of these droppers, in the form of obfuscated JSCRIPT, is common, with the scripts themselves often being delivered via phishing/email. JS_Nemucod was utilized heavily as a dropper for Locky ransomware just a few years ago, and often appears in various “Top Malware” frequency lists. Over the years, various ‘mutations’ of Nemucod have appeared, including some which drop executable ransomware payloads directly from the body of the executable.

Watch Now

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform harnesses the power of data and AI to protect your organization now and into the future.