Ramnit Malware

Roi Lavie
Malware Analysis
Published in
3 min readDec 14, 2018

I started to investigate this malware with html file.

This File was downloaded from VirusShare.com.

Delivery stage

As we can see bellow, we browse to page that have content with VBScript. So we can understand that the target is only Internet Explorer victims. In the screen bellow we can understand that the VBScript generate a file “svchost.exe” and run it.

For the next step i want to run the VBScript in single file so i copied the specific of code of the VBScript and create single file and run it (without line 46),because i want the vbs script generate the exe without run it.

With the Process monitor i can understand the the wscript.exe create a file in in temp folder with name svchost.exe

We can understand that svchost.exe is the payload malware,Let’s start to explore it.

For start from static analysis with pestudio we can see that file has a lot of malicious topics:

The compile time stamp is 2065
In the screenshot we can understand that this exe is packed by upx.
Decompress the file
After decompress i changed the name of the file to virus.exe

Form now i want to know deeper what the purpose of the malware and what he did.

Let’s start with Dynamic analysis, Now we can run the sysinternal tool “process monitor”, and export it to csv file,After we can use with procdot tool to import the csv file and we got this.

Process monitor visualization with procdot

We can in the above screenshot “virus.exe” create two process of “iexplore.exe” and did process injection . The malware did a requests to a malicious ip’s and add exe file to get persistence in operation system.

In the bellow image we can see that iexplore.exe listening to ftp port

iexplore.exe listening on port 21 port

After i did an nmap scan to myself and find that the ftp service it of a Ramnit malware.

We can understand that 21 ftpd known as a malware Ramnit
Ramnit Malware Creates FTP Network From Victim’s Computers

For conclusion, i think that we can see what the malware did and learn it for the next malware!

Hope to see you in the next analysis!!

--

--