Trojan.Ramnit
Posted: November 12, 2010
Threat Metric
The Threat Meter is a malware assessment that SpywareRemove.com's research team is able to
give every identifiable malware threat. Our Threat Meter includes several criteria based off of
specific malware threats to value their severity, reach and volume. The Threat Meter is able to give
you a numerical breakdown of each threat's initial Threat Level, Detection Count, Volume Count,
Trend Path and Percentage Impact. The overall ranking of each threat in the Threat Meter is a basic
breakdown of how all threats are ranked within our own extensive malware database. The scoring for
each specific malware threat can be easily compared to other emerging threats to draw a contrast in
its particular severity. The Threat Meter is a useful tool in the endeavor of seeking a solution to
remove a threat or pursue additional analytical research for all types of computer users.
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Ranking: | 2,598 |
---|---|
Threat Level: | 8/10 |
Infected PCs: | 30,302 |
First Seen: | November 12, 2010 |
---|---|
Last Seen: | October 16, 2023 |
OS(es) Affected: | Windows |
Aliases
Trj/Dtcontx.D [Panda]Generic32.BZEV [AVG]Win32:Spyware-gen [GData]TR/Agent.221184.60 [AntiVir]Mal/Generic-S [Sophos]Trojan.Win32.Lebag.ufg [Kaspersky]Win32:Spyware-gen [Spy] [Avast]Artemis!6713B75CC69D [McAfee]SHeur4.AFHG [AVG]W32/Agent.WIS!tr [Fortinet]Troj/Agent-WIS [Sophos]Win32:Crypt-MXK [Trj] [Avast]W32/Lebag.DTR!tr [Fortinet]Troj/Ramnit-AE [Sophos]TrojWare.Win32.Kryptik.YPL [Comodo]
More aliases (909)
More aliases (909)
Technical Details
File System Modifications
Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.
The following files were created in the system:a558a37aff66ceb500fddaa17a0fd88a102c81d83ff6b4b393d94ece0a2faad5.exe
File name: a558a37aff66ceb500fddaa17a0fd88a102c81d83ff6b4b393d94ece0a2faad5.exeSize: 3.58 KB (3584 bytes)
MD5: fc6e3e6b76bbaec5482b27a97acc9c57
Detection count: 96
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: October 9, 2016
8e883dcc809ae83dd05f7d9ffd286aa2f40e7fb8386217e0babb5ac28a786122.exe
File name: 8e883dcc809ae83dd05f7d9ffd286aa2f40e7fb8386217e0babb5ac28a786122.exeSize: 3.58 KB (3584 bytes)
MD5: 6ae8f8123a211126158d445ee37b1e48
Detection count: 95
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: October 9, 2016
8c0e5add037030d44888f6594ed06c7bada87894d111cb55ee78a689c69a38ec.exe
File name: 8c0e5add037030d44888f6594ed06c7bada87894d111cb55ee78a689c69a38ec.exeSize: 3.58 KB (3584 bytes)
MD5: 6322d700dccd864c3af23b3d8c39e45c
Detection count: 94
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: October 9, 2016
81aa06813afb23dac105e625f0dd42527b6ae5629667130937d6d50b740e5a19.exe
File name: 81aa06813afb23dac105e625f0dd42527b6ae5629667130937d6d50b740e5a19.exeSize: 3.58 KB (3584 bytes)
MD5: 4485ecc9d99723629ef837afa5b94222
Detection count: 93
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: October 9, 2016
7148886b675752262237923401211cdfccb2f4c7e13894183eae09d0b9300c5f.exe
File name: 7148886b675752262237923401211cdfccb2f4c7e13894183eae09d0b9300c5f.exeSize: 3.58 KB (3584 bytes)
MD5: cb269f49e52fdecf69ce95697d679f82
Detection count: 92
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: October 9, 2016
drucddem.txt
File name: drucddem.txtSize: 1.17 MB (1179542 bytes)
MD5: 6ffc87c92fe13b4aeb2a5d0c32676541
Detection count: 92
Mime Type: unknown/txt
Group: Malware file
kxcrbxse.ps1
File name: kxcrbxse.ps1Size: 433B (433 bytes)
MD5: df804622eedcc2e097bc3ad44063e409
Detection count: 92
Mime Type: unknown/ps1
Group: Malware file
69c09ca777372fe1cbe72d914572b4db95264bb9662328e0a9ddfc558828de4a.exe
File name: 69c09ca777372fe1cbe72d914572b4db95264bb9662328e0a9ddfc558828de4a.exeSize: 3.58 KB (3584 bytes)
MD5: 890b35b0166489b53bb67e1fdc26a2b2
Detection count: 91
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: October 9, 2016
65e21b6a832d7961165f75890643a5f47fcb6821917f1f2b94f3fe5d4516e0fe.exe
File name: 65e21b6a832d7961165f75890643a5f47fcb6821917f1f2b94f3fe5d4516e0fe.exeSize: 3.58 KB (3584 bytes)
MD5: 14ee5398a54056f95ca14a2592232fc0
Detection count: 90
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: October 9, 2016
4540908ea33ba59b0eb8b9fa2a9f0b19596df4328350c49f6e90c65f3926e4a3.exe
File name: 4540908ea33ba59b0eb8b9fa2a9f0b19596df4328350c49f6e90c65f3926e4a3.exeSize: 3.58 KB (3584 bytes)
MD5: e6cece907fe75fdea24096982fc39c76
Detection count: 86
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: October 9, 2016
4326c9648c62f2e60b6c7f0ef0420ce390fa1ecc3f1fe0b64f8bac685df8783f.exe
File name: 4326c9648c62f2e60b6c7f0ef0420ce390fa1ecc3f1fe0b64f8bac685df8783f.exeSize: 3.58 KB (3584 bytes)
MD5: 6e7f6227aac27b7142d4c6cee3abea9c
Detection count: 85
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: October 9, 2016
3b732f7d9ca2d77a2c000ca1322ea354b81f966ce1db85bc068063f75d71a091.exe
File name: 3b732f7d9ca2d77a2c000ca1322ea354b81f966ce1db85bc068063f75d71a091.exeSize: 3.58 KB (3584 bytes)
MD5: 28c1861e414967c08d5548f9cad8d728
Detection count: 84
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: October 9, 2016
1e67c4ca0359f2e2c1a8f5e6c759526501c04d3ea02ee401aa7303674a3a40f9.exe
File name: 1e67c4ca0359f2e2c1a8f5e6c759526501c04d3ea02ee401aa7303674a3a40f9.exeSize: 3.58 KB (3584 bytes)
MD5: 7174c8852a5f6807b8272d6222ca8c2c
Detection count: 81
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: October 9, 2016
1004bfa1aad9bdb35a85075443d1992c4b2f01c101f3e6376627a05e9d7c04e0.exe
File name: 1004bfa1aad9bdb35a85075443d1992c4b2f01c101f3e6376627a05e9d7c04e0.exeSize: 3.58 KB (3584 bytes)
MD5: 63064e064bdb65996ed2f6d34a0093d2
Detection count: 80
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: October 9, 2016
file.exe
File name: file.exeSize: 96.76 KB (96768 bytes)
MD5: 8b5f2036288762602f2916929b1ab9d8
Detection count: 55
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: September 19, 2017
%SYSTEMDRIVE%\Users\<username>\AppData\Roaming\vufakhrd\hvcejsjc.vbs
File name: hvcejsjc.vbsSize: 525B (525 bytes)
MD5: d2fd10743dc99207409ff04b5ff7b9b5
Detection count: 21
Mime Type: unknown/vbs
Path: %SYSTEMDRIVE%\Users\<username>\AppData\Roaming\vufakhrd\hvcejsjc.vbs
Group: Malware file
Last Updated: June 26, 2020
file.exe
File name: file.exeSize: 318.46 KB (318464 bytes)
MD5: 19b4810710a2337c6a5910fbf015cb7a
Detection count: 6
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: September 4, 2017
f9c3276605795d89d8496ef8068d9c68e566619806e974a90526c524fd35dbdf.exe
File name: f9c3276605795d89d8496ef8068d9c68e566619806e974a90526c524fd35dbdf.exeSize: 3.58 KB (3584 bytes)
MD5: 15f88d07082036c488fbc3b701c5cc46
Detection count: 2
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: October 9, 2016
f8cfbc3c779ab4ce4591ca95ddde0bf7fed9a4b9967992872807a0aa85b3ef50.exe
File name: f8cfbc3c779ab4ce4591ca95ddde0bf7fed9a4b9967992872807a0aa85b3ef50.exeSize: 3.58 KB (3584 bytes)
MD5: cd6d52fb66b81158766c20c5b3a8abae
Detection count: 1
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: October 9, 2016
e927dec9e54237a26f8581308cbcc64544e4f047ddccb2a4e4fa6ccedcda350b.exe
File name: e927dec9e54237a26f8581308cbcc64544e4f047ddccb2a4e4fa6ccedcda350b.exeSize: 3.58 KB (3584 bytes)
MD5: 97be9ccf5e381dc2f7ccf1dcac57dbfb
Detection count: 0
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: October 9, 2016
More files
Registry Modifications
The following newly produced Registry Values are:
Regexp file mask%PUBLIC%\system.exe
Regexp file mask%PUBLIC%\system.exe
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.