Watch how SentinelOne mitigates and rolls back Nemucod. The Nemucod family of trojans, which have existed for several years, typically serve as downloaders and/or droppers for additional malicious components. The JSCRIPT-based droppers are associated with a number of ransomware/malware families including TeslaCrypt, Kryptik, ElDorado, Emotet, Ryuk, and countless others. Distribution of these droppers, in the form of obfuscated JSCRIPT, is common, with the scripts themselves often being delivered via phishing/email. JS_Nemucod was utilized heavily as a dropper for Locky ransomware just a few years ago, and often appears in various “Top Malware” frequency lists. Over the years, various ‘mutations’ of Nemucod have appeared, including some which drop executable ransomware payloads directly from the body of the executable.
SentinelOne PartnerOne - America's 2025
⛳️ Last week in Pebble Beach the America's best cybersecurity partners came together for our annual PartnerOne summit. Check out…
Just a Sec: Cybersecurity Unfiltered—Fast, Frank, and From the Front Lines
Welcome to the first-ever Just A Sec, a no-holds-barred, quick-fire monthly livestream. It’s cybersecurity like you’ve never heard it before—unfiltered,…
See how our intelligent, autonomous cybersecurity platform harnesses the power of data and AI to protect your organization now and into the future.