Home Malware Programs Trojans Virus.Ramnit.I

Virus.Ramnit.I

Posted: June 2, 2011

Virus.Ramnit.I is a backdoor Trojan that also has some of the proliferation characteristics of a worm. Networks and external storage devices like flash drives can spread Virus.Ramnit.I infections, which may download other malicious software or enable remote attackers to control your computer. Virus.Ramnit.I infections are extremely serious breaches of security and should be dealt with immediately by using industry-proven anti-virus techniques and software.

Recognizing Virus.Ramnit.I While It Makes Itself at Home

Virus.Ramnit.I attacks are designed to work on Windows 32-bit executable files. As such, Windows 32-bit OS variants are more susceptible to being attacked by Virus.Ramnit.I than 64-bit versions. However, 64-bit versions of Windows shouldn't be considered wholly immune to Virus.Ramnit.I attacks.

The worm-like functions in Virus.Ramnit.I allow Virus.Ramnit.I to create concealed copies of Virus.Ramnit.I's own files and place them in removable drive devices or network-accessible folders. Any computers that access these devices or folders may be attacked by Virus.Ramnit.I. However, it's possible to detect Virus.Ramnit.I files if you set your file-viewing preferences to make Hidden and System files visible by default.

Trojans like Virus.Ramnit.I will try to remain hidden, but you may be able to notice a Virus.Ramnit.I infection by seeing your system resources spike, by noticing unauthorized firewall or Windows Registry changes, or by noting the presence of unfamiliar files in your system folders.

Why You Shouldn't Let Virus.Ramnit.I Get Settled In

Virus.Ramnit.I will engage in standard backdoor Trojan attacks such as:

  • Allowing remote attackers to control your computer. Remote criminals may use Virus.Ramnit.I to install other programs, monitor private information or recruit your computer into an illegal DDoS network.
  • Downloading and installing malicious files without your permission, which is known as dropping a payload. Common Trojan payloads include rogue security software that fake anti-virus functions and keyloggers that steal passwords and other private data.
  • Making unauthorized contact with remote parties for the purpose of allowing the above attacks or simply transferring sensitive data into the hands of criminals.
  • Modifying critical system files without your consent. The Windows Registry, in particular, may be modified to let Virus.Ramnit.I launch whenever Windows starts.

Because of Virus.Ramnit.I's worm-like traits, Virus.Ramnit.I may also be detected under the name of Worm:Win32/Ramnit.A or similar worm categorization labels. Regardless of the exact type of Virus.Ramnit.I version on your PC, the solution is standard – use Safe Mode or another secure reboot that avoids Virus.Ramnit.I's startup Registry entries, and then delete Virus.Ramnit.I by scanning your PC with good anti-malware applications.

File System Modifications

  • The following files were created in the system:
    # File Name
    1 %PROGRAM_FILES%\ Backdoor.Beastdoor.DL\ Backdoor.Beastdoor.DL
    2 AEADISRV.EXE

Registry Modifications

  • The following newly produced Registry Values are:
    HKEY..\..\..\..{Subkeys}HKEY_LOCAL_MACHINE\Software\ Backdoor.Beastdoor.DL
Loading...