SonicALERT
Search

Sonicwall Signatures

 

Go to All Categories list.


  Ramnit.H_7
Ramnit.H_7 is a multicomponent malware that targets Microsoft Windows operating systems. It was first seen in January 2010. It steals sensitive information such as banking credentials and infects executables, HTML and Microsoft Office files. It opens a backdoor and communicates with the C&C server for updates. It propagates via removable drives.

File Related Changes
It drops the following file(s) on the system:
  • "c:\Program Files\Microsoft\WaterMark.exe"
  • "c:\Windows\Temp\4460703a114c373bf3369edcd88de991mgr.exe"

It modifies the following additional file(s) on the system:
  • "c:\Windows\System32\dmlconf.dat"

Process Related Changes
It creates the following mutex(es):
  • "{54521ED3-89E7-D5D6-94CC-53CFD3C9470A}"
  • "{54521ED3-89E7-D5D6-94CC-53CFD589470A}"
  • "{54521ED3-89E7-D5D6-94CC-53CFD241470A}"
  • "{54521ED3-89E7-D5D6-94CC-53CFD335470A}"
  • "{54521ED3-89E7-D5D6-94CC-53CFD025470A}"
  • "{54521ED3-89E7-D5D6-94CC-53CFCFFD470A}"
  • "{54521ED3-89E7-D5D6-94CC-53CFCF7D470A}"
  • "{545219A0-89E7-D5D6-94CC-53CFDB89470A}"
  • "{54521ED3-89E7-D5D6-94CC-53CFCFD1470A}"
  • "{54521ED3-89E7-D5D6-94CC-53CFD435470A}"
  • "{54521ED3-89E7-D5D6-94CC-53CFDBDD470A}"
  • "{545219A0-89E7-D5D6-94CC-53CFDC09470A}"
  • "{54521ED3-89E7-D5D6-94CC-53CFD0D5470A}"
  • "{54521389-89E7-D5D6-94CC-53CFCEA1470A}"
  • "{54521ED3-89E7-D5D6-94CC-53CFD759470A}"
  • "{54521ED3-89E7-D5D6-94CC-53CFD5A9470A}"
  • "{54521ED3-89E7-D5D6-94CC-53CFD149470A}"
  • "{54521ED3-89E7-D5D6-94CC-53CFD391470A}"
  • "{54521ED3-89E7-D5D6-94CC-53CFCEA5470A}"
  • "{54521ED3-89E7-D5D6-94CC-53CFD345470A}"
  • "{54521ED3-89E7-D5D6-94CC-53CFD119470A}"
  • "{54521ED3-89E7-D5D6-94CC-53CFD489470A}"
  • "{54521ED3-89E7-D5D6-94CC-53CFDB89470A}"
  • "{54521ED3-89E7-D5D6-94CC-53CFD67D470A}"
  • "{54521ED3-89E7-D5D6-94CC-53CFD50D470A}"
  • "{54521ED3-89E7-D5D6-94CC-53CFD1F5470A}"
  • "{54521ED3-89E7-D5D6-94CC-53CFD8CD470A}"
  • "{54521ED3-89E7-D5D6-94CC-53CFCF8D470A}"
  • "{54521ED3-89E7-D5D6-94CC-53CFD00D470A}"
  • "{54521ED3-89E7-D5D6-94CC-53CFD521470A}"
  • "{54521ED3-89E7-D5D6-94CC-53CFD065470A}"
  • "{54521ED3-89E7-D5D6-94CC-53CFCFED470A}"
  • "{54521ED3-89E7-D5D6-94CC-53CFD5F1470A}"
  • "{545219A0-89E7-D5D6-94CC-53CFDB99470A}"
  • "{54520D92-89E7-D5D6-94CC-53CFCEA1470A}"
  • "{54521ED3-89E7-D5D6-94CC-53CFD1A5470A}"
  • "{54521ED3-89E7-D5D6-94CC-53CFDB99470A}"
  • "{54521ED3-89E7-D5D6-94CC-53CFD8B9470A}"
  • "{54521ED3-89E7-D5D6-94CC-53CFD4E9470A}"
  • "{54521ED3-89E7-D5D6-94CC-53CFD859470A}"
  • "{54521ED3-89E7-D5D6-94CC-53CFD05D470A}"
  • "{54521ED3-89E7-D5D6-94CC-53CFD5CD470A}"
  • "{54521ED3-89E7-D5D6-94CC-53CFD6D1470A}"
  • "{54521ED3-89E7-D5D6-94CC-53CFDB19470A}"
  • "{54521ED3-89E7-D5D6-94CC-53CFCEA1470A}"
  • "{54521ED3-89E7-D5D6-94CC-53CFCFF5470A}"
  • "{54521ED3-89E7-D5D6-94CC-53CFD071470A}"
  • "{54521ED3-89E7-D5D6-94CC-53CFD569470A}"
  • "{54521ED3-89E7-D5D6-94CC-53CFD289470A}"

It creates the following process(es):
  • c:\Program Files\Microsoft\WaterMark.exe [ \c:\Program Files\Microsoft\WaterMark.exe ]
  • C:\Windows\system32\svchost.exe
  • C:\Windows\system32\cmd.exe

Network Activity
It attempts to connect to the following remote servers:
  • 91.220xxxxxx:443
  • google.com:80 (74.125.xxxxxx)
  • rterybrstutnrsbberve.com:443 (195.22.xxxxxx)

We observed the following DNS query/queries:
  • rterybrstutnrsbberve.com


Relevant Information