Home / malwarePDF  

Trojan:WinNT/Ramnit.gen!A


First posted on 12 March 2013.
Source: Microsoft

Aliases :

Trojan:WinNT/Ramnit.gen!A is also known as Backdoor/Win32.Rootkit (AhnLab), W32/Ramnit.M (Command), Trojan.Rmnet.2 (Dr.Web), Win32/Ramnit.L (ESET), RootKit.Win32.Ramnit.a (Rising AV), Troj/Rootkit-JV (Sophos), RTKT_RAMNIT.KC (Trend Micro).

Explanation :



Installation

Trojan:WinNT/Ramnit.gen!A is dropped by other variants of the Ramnit family to the %TEMP% folder as a system file (.SYS) with a random name, for example "qxcouvmc.sys". In the wild, we have observed Trojan:Win32/Ramnit.A dropping this trojan.

Payload

Disables or prevents your antivirus and security products from working properly

Trojan:WinNT/Ramnit.gen!A hooks the following APIs to prevent security products from detecting other components of the Ramnit family:

  • ZwCreateKey
  • ZwCreateKeyTransacted
  • ZwOpenKey
  • ZwOpenKeyEx
  • ZwOpenKeyTransacted
  • ZwOpenKeyTransactedEx


Trojan:WinNT/Ramnit.gen!A also receives a list of security products from other components of the Ramnit family, for example, Trojan:Win32/Ramnit.A. Trojan:WinNT/Ramnit.gen!A then kills those products on the list.

Related encyclopedia entries

Win32/Ramnit

Trojan:Win32/Ramnit.A



Analysis by Tim Liu

Last update 12 March 2013

 

TOP