Author Topic: Ramnit G / H  (Read 3718 times)

0 Members and 1 Guest are viewing this topic.

studiot

  • Guest
Ramnit G / H
« on: October 29, 2011, 08:50:25 PM »
Avast rescue disk reports over 4000 infected files on my other (XP) pc which suddenly froze solid.

Is this recoverable or do I have to reformat?

If I ask the rescue disk to delete all infected files how safe am I recovering remaining data files (jpg etc) before reformat?
« Last Edit: October 29, 2011, 08:53:58 PM by studiot »

Offline Pondus

  • Probably Bot
  • ****
  • Posts: 37529
  • Not a avast user
Re: Ramnit G / H
« Reply #1 on: October 29, 2011, 08:58:58 PM »
There is a virus and worms section here   ;)   http://forum.avast.com/index.php?board=4.0

follow the guide here and attach the logs   http://forum.avast.com/index.php?topic=53253.0



Quote
Summary
Win32/Ramnit is a family of multi-component malware that infects Windows executable files, Microsoft Office files and HTML files. Win32/Ramnit spreads to removable drives, steals sensitive information such as saved FTP credentials and browser cookies. The malware may also open a backdoor to await instructions from a remote attacker.
seems to be a fileinfector and that is usually very bad news
« Last Edit: October 29, 2011, 09:23:02 PM by Pondus »

Offline Pondus

  • Probably Bot
  • ****
  • Posts: 37529
  • Not a avast user

studiot

  • Guest
Re: Ramnit G / H
« Reply #3 on: October 29, 2011, 09:39:03 PM »
Thank you for the posts, Pondus.

I can't get the log file from the infected disk to post so that is not really an option.

The links you posted seem to concur with the web reports I found that no effective cure has yet been found.

I just wondered if Avast has anything to offer since they found it and named the variant G and H not A and B.

Offline Pondus

  • Probably Bot
  • ****
  • Posts: 37529
  • Not a avast user
Re: Ramnit G / H
« Reply #4 on: October 29, 2011, 09:42:17 PM »
Quote
I just wondered if Avast has anything to offer since they found it and named the variant G and H not A and B.
what do you mean?

Offline essexboy

  • Malware removal instructor
  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 40589
  • Dragons by Sasha
    • Malware fixes
Re: Ramnit G / H
« Reply #5 on: October 29, 2011, 11:18:03 PM »
Sometimes Dr Web from a live cd has a reasonable result, so if you do not yet want to reformat it may be worth a shot

Please download the following programmes to your desktop:

Dr Web Live CD

ImgBurn

Install IMGBurn
  • Double click Dr Web
  • IMGBurn will open
  • Burn the ISO to a cd
  • Reboot the infected computer with the CD in the drive
  • Ensure that the first boot device is CD - If you are not sure about that then see this page for instructions
  • As loading starts, a dialogue window will prompt you to choose between the standard and safe modes.


  • Use arrow keys to select  DrWeb-LiveCD (Default)
  • When the system is loaded, check the disks or folders you want to scan, and click on “Start”.


  • The programme will now scan for and cure/delete any malware that it finds.  Allow it to do so 
  • Once completed reboot to normal windows
  • No log is produced so once in normal windows run a fresh OTL scan and let me know if the problems persist

ady4um

  • Guest
Re: Ramnit G / H
« Reply #6 on: October 30, 2011, 05:18:25 AM »
I don't want to contradict any of the previous comments / suggestions. But I want to suggest a different approach.

It could be more effective (having so many files infected that could also prevent Windows from even boot again) to start the system with some Live system CD/UFD and try to backup any relevant user data, like emails, contacts, documents and so on. Alternatively, a full backup image could be useful too (and even recommended).

Only after having a backup, try to work on cleaning the system. Whatever happens with the attempt (to recover), you would still have the source to start over with a second attempt, or to try to use the backup data (not executables) on a new clean system.

Of course, if you use the backed up data in any way, you need to scan the specific files you would want to use, so to be sure you wouldn't be re-inserting the malware again in a clean system.

As mentioned, this doesn't contradict any previous suggestion.