It has been reported that a trojan dubbed as "Ramnit", which can steal sensitive data like personal information, banking credentials, FTP passwords, and session cookies is spreading across the globe.
Infection Mechanism
In attacking campaign, a spear-phishing email is used to target the victim, containing a hyperlink leading to a compromised website. Upon clicking the hyperlink and accessing the site, the victim is prompted to download an additional payload, specifically a compressed ZIP file which contains both, a harmless .jpg file and a .lnk shortcut file. The .lnk file is cleverly disguised as a standard Windows folder, complete with an inconspicuous icon.

Upon clicking the .lnk shortcut file, a Command Prompt window is triggered, initiating the execution of obfuscated commands in a PowerShell process.
The .lnk file's PowerShell script is responsible for fetching the sLoad banking Trojan dropper, which possesses capabilities for reconnaissance, information gathering, screen capturing, and command and control functions.
SLoad, a tool that compiles data from the Win32_LogicalDisk data source, representing local storage devices on Windows computers, additionally captures details concerning network shares and physical devices via the NET VIEW command.
SLoad primarily gathers information by employing screen capture. Ramnit trojan fabricate a scheduled task to maintain its obfuscation. It also tries to bypass AMSI framework. The malware contains several module including one to communicate to C2.
Indicator of Compromise:
IP:
SHA1:
- B564ED3DE7A49673AC19B6231E439032AE6EAA68
- 7FDBCB40E0BE3563B7093F32F4B2967A0550437F
Domain:
- bureaucratica[dot]org
- packerd[dot]me
- image.orchas[dot]com
For more detailed list of IoC, kindly refer the below URL: