From: David Kaye on
Sorry about the crosspost to ba.internet, but I know there are malware experts
out there.

Does anybody have EXPERIENCE with Win32/RAMNIT.A ? I'm having a devil of a
time removing it. The only tool the detects it consistently is MS Security
Essentials, and MSSE keeps counting it and "disinfecting" it.

I'm not sure if it's a virus or a worm. MSSE says it's a virus, but I can't
figure out what's launching it.

I have eliminated one rootkit and subsequent scans show no more rootkits.
This thing has dropped startup payloads into the StartUp folder, into the Run
keys, into Prefetch, and it masquerades as everything from random 4-letter
clusters to names like "Microsoft Suite", etc.

It also captures the date when Windows was first installed, so I can't
reliably search for the thing via date, either.

Whenever MSSE detects a new round of infections (15, 78, all kinds of counts)
the infections are in everything from drivers to executables in all kinds of
directories.

At the moment I'm running the computer in safe mode with no Internet and MSSE
is not detecting any more Ramnit. I've scanned it 3 times. But as soon as I
go back into regular mode and get an Internet connection back up it'll start
infecting again.

Oh, and I've reset the Winsock stack twice just in case there's a little
wedgie in there. Still comes back.

Any help would be most appreciated. You can reach me directly by email. The
address is valid.

Thanks.

From: Roy on

A friend of mine that does virus removal as part of his business swears
by MalwareBytes


http://www.malwarebytes.org/mbam.php
From: David Kaye on
Roy <aa4re(a)aa4re.ampr.org> wrote:

>A friend of mine that does virus removal as part of his business swears
>by MalwareBytes

I do this professionally as well. I asked *specifically* for comments from
people who have *experience* with this threat. I used MalwareBytes
Antimalware several times including the complete disk scan for 2 1/2 hours.
It did not detect anything.

Again, I'm interested in hearing only from people who have *experience* with
Win32.Ramnit.A

Thank you.

From: David H. Lipman on
From: "David Kaye" <sfdavidkaye2(a)yahoo.com>

| Sorry about the crosspost to ba.internet, but I know there are malware experts
| out there.

| Does anybody have EXPERIENCE with Win32/RAMNIT.A ? I'm having a devil of a
| time removing it. The only tool the detects it consistently is MS Security
| Essentials, and MSSE keeps counting it and "disinfecting" it.

| I'm not sure if it's a virus or a worm. MSSE says it's a virus, but I can't
| figure out what's launching it.

| I have eliminated one rootkit and subsequent scans show no more rootkits.
| This thing has dropped startup payloads into the StartUp folder, into the Run
| keys, into Prefetch, and it masquerades as everything from random 4-letter
| clusters to names like "Microsoft Suite", etc.

| It also captures the date when Windows was first installed, so I can't
| reliably search for the thing via date, either.

| Whenever MSSE detects a new round of infections (15, 78, all kinds of counts)
| the infections are in everything from drivers to executables in all kinds of
| directories.

| At the moment I'm running the computer in safe mode with no Internet and MSSE
| is not detecting any more Ramnit. I've scanned it 3 times. But as soon as I
| go back into regular mode and get an Internet connection back up it'll start
| infecting again.

| Oh, and I've reset the Winsock stack twice just in case there's a little
| wedgie in there. Still comes back.

| Any help would be most appreciated. You can reach me directly by email. The
| address is valid.

| Thanks.


What is the fully qualified name and path to the file deemed infected with RAMNIT.A and
did you capture a copy of this malware ?

--
Dave
http://www.claymania.com/removal-trojan-adware.html
Multi-AV - http://www.pctipp.ch/downloads/dl/35905.asp


From: Virus Guy on
David Kaye wrote:

> Does anybody have EXPERIENCE with Win32/RAMNIT.A ? I'm having a
> devil of a time removing it.

If at all physically possible, the standard proceedure for insuring that
any hard drive is free of malware (trojans, viruses, rootkits, spyware,
etc) is to remove the drive and connect it as a slave to a known/good
computer that has competent anti-malware software on it.

The suspect drive can then be scanned in a way that insures that any
malware on it is not operational and therefore not actively thwarting
the scanning and file-quarantine processes in any way.