RavMonE.exe

RavMonE.exe

Computer virus
Fullname = RavMonE.Exe
Common name = RavMonE
Technical name = Win32.RJump.A
Family = RJump
Aliases = Rajump, Jisx, Siweol, Bdoor-DIJ
Classification = Virus
Type = Trojan
Subtype = Worm
IsolationDate = June 2006
Isolation = Unknown
Origin = Unknown
Author = Unknown

RavMonE, known more correctly as RJump, is a Trojan that opens a backdoor on computers running Microsoft Windows. Once a computer is infected, the virus allows unauthorized users to gain access to the computer's contents. This poses a security risk for the infected machine's user, as the attacker can steal personal information, and use the computer as an access point into an internal network.

RavMonE was made famous in September 2006 when a number of iPod videos were shipped with the virus already installed. [http://www.betanews.com/article/Apple_Ships_iPods_with_Windows_Virus/1161112089] Because the virus only infects Windows computers, it can be inferred that Apple's contracted manufacturer was not using Macintosh computers. Apple came under some public criticism for releasing the virus with their product.

Description

RavMonE is a worm written in the Python scripting language and was converted into a Windows executable file using the Py2Exe tool. [http://vil.nai.com/vil/content/v_139985.htm] It attempts to spread by copying itself to mapped and removable storage drives. It can be transmitted by opening infected email attachments and downloading infected files from the Internet. It can also be spread through removable media, such as CD-ROMs, flash memory, digital cameras and multimedia players.

Action

Once the virus is executed, it performs the following tasks.
#It copies itself to %WINDIR% as RavMonE.exe.
#It adds the value "RavAV" = "%WINDIR%RavMonE.exe" to the registry key HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionRun.
#It opens a random port and accepts remote commands.
#It creates a log file RavMonLog to store the port number.
#It posts a HTTP request to advise the attacker of the infected computer's IP address and the number of the port opened.When a removable storage device is connected to the infected computer it copies the following files to that device:
*autorun.inf - a script to execute the worm the next time the device is connected to a computer
*msvcr71.dll - a Microsoft C Runtime Library module containing standard functions such as to copy memory and print to the console [http://www.processlibrary.com/directory/files/msvcr71/]
*ravmon.exe - a copy of the worm

Aliases

*Backdoor.Rajump (Symantec)
*W32/Jisx.A.worm (Panda)
*W32/RJump-C (Sophos)
*W32/RJump.A!worm (Fortinet)
*Win32/RJump.A (ESET)
*Win32/RJump.A!Worm (CA)
*Worm.RJump.A (BitDefender)
*Worm.Win32.RJump.a (Kaspersky)
*Worm/Rjump.E (Avira)
*WORM_SIWEOL.B (TrendMicro)
*Worm/Generic.AMR (AVG)

ee also

*List of computer viruses (L-R)

External links

* [http://www.sophos.com/security/analyses/trojbdoordij.html Sophos]
* [http://www.symantec.com/security_response/writeup.jsp?docid=2006-062310-0921-99&tabid=3 Symantec]
* [http://vil.nai.com/vil/content/v_139985.htm McAfee]
* [http://original.avira.com/en/threats/vdf_history.html?id_vdf=2857 Avira]
* [http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_SIWEOL.C TrendMicro]


Wikimedia Foundation. 2010.

Игры ⚽ Поможем сделать НИР

Look at other dictionaries:

  • List of computer viruses (L–R) — This list is incomplete; you can help by expanding it. Name Alias(es) Type Subtype Isolation Date Isolation Origin Author Notes L1 …   Wikipedia

  • Fragments — Album par Kaly Live Dub Sortie le 7 avril 2008 Enregistrement au Supadope Factory à Lyon Durée 61 min et 06 s Genre …   Wikipédia en Français

  • Octubre de 2006 — Saltar a navegación, búsqueda Octubre de 2006 …   Wikipedia Español

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”