NotPetya

Description

(US-CERT) On June 27, 2017, NCCIC was notified of Petya malware events occurring in multiple countries and affecting multiple sectors. This variant of the Petya malware—referred to as NotPetya—encrypts files with extensions from a hard-coded list. Additionally, if the malware gains administrator rights, it encrypts the master boot record (MBR), making the infected Windows computers unusable. NotPetya differs from previous Petya malware primarily in its propagation methods.

NotPetya leverages multiple propagation methods to spread within an infected network. According to malware analysis, NotPetya attempts the lateral movement techniques below:

PsExec - a legitimate Windows administration tool • WMI - Windows Management Instrumentation, a legitimate Windows component • EternalBlue - the same Windows SMBv1 exploit used by WannaCryEternalRomance - another Windows SMBv1 exploit

Names

Name
NotPetya
EternalPetya
ExPetr
Pnyetya
Petna
Nyetya
NonPetya
nPetya
Petrwrap
Diskcoder.C
GoldenEye

Category

Malware

Type

  • Ransomware
  • Wiper
  • Worm
  • Remote command

Information

Mitre Attack

Malpedia

Alienvault Otx

Other Information

Uuid

f1c756d0-c922-45d9-94d5-fb355f523add

Last Card Change

2020-05-21