|
||
|
||
Ramnit stands out as a malware as it continues to evolve and requires cybersecurity experts and law enforcement agents to stay alert. Variants have been recently detected, so that security companies such as Prevailion advise organizations to keep Ramnit on their radar. And so we did by expanding known Ramnit indicators of compromise (IoCs) with the help of domain and IP intelligence sources.
Like other malware families, Ramnit has several reported IoCs, some of which may have already been taken down or no longer exist. However, there could be other domains and IP addresses associated with these IoCs that can be obtained from historical WHOIS and DNS records. These are artifacts that may be worth looking into as well.
The first step is to collect domains and IP addresses tagged as Ramnit IoCs. We found six file hashes on VirusTotal:
d3aee3c8a586fc7ad2ea4240f43101fc787b37cb9f5afda41998abf28a06d8b6ed9efbb541832ea30e50e1bf61d74159bfeb63a5772a6cae3c6cced8dbb412370d3c4faa62d52cf7b4176f8f9861edf7f4e854b0be75757427022b29c0ad097adb45b173fd7c248a53be7b8555e1e1033a8cc5cfb4755c12cfd65e60314aabc5463099cb3ca9fdd9c82a60747bff4438c6943546f3542cfb7bca6e1c5123caef1a18a25b3990a0cd00321d9526a4f588259712ee5cdc71f32b15a6610a672d1bThese Ramnit files contacted 58 domains and 16 IP addresses. Out of these IoCs, we picked 13 domains dubbed malicious or suspicious on more than one engine on VirusTotal. Furthermore, 11 of the IP addresses have been reported malicious, so we expanded on those as well.
To find artifacts, we used the following domain and IP intelligence tools:
Even though only eight domains contain publicly visible contact email addresses, more than 35,000 associated with these addresses were uncovered, as seen in Table 1 below. Moreover, two malicious domains (rikbrsqoyjjpb[.]com and sxavjnfrwwrq[.]com) share the same email address which is historically connected to 175 domains. The rest of the domains sharing the email address warrant further investigation.
| Domain Name | Publicly Visible Details Obtained from WHOIS History Records | Number of Connected Domains |
|---|---|---|
| fget-career[.]com | jg*****@gmail[.]com | 10,000+ historically |
| ilo[.]brenz[.]pl | Masked/Undisclosed | / |
| chceoqemftwldiucf[.]com | Masked/Undisclosed | / |
| ghnsonrgujyymhvvg[.]com | bo*****@gmail[.]com | 10,000+ historically |
| ejnpulri[.]com | contact@gi***[.]org | 5,477 |
| swwqmpjpvdbxsjos[.]com | Masked/Undisclosed | / |
| usrfyjueaneumqx[.]com | Masked/Undisclosed | / |
| ahghbjoutgpituoybn[.]com | ni*****@sa***[.]ad[.]jp | 10,000+ historically |
| eakrbfndtxvub[.]com | lo*****@aol[.]com | 49 |
| rikbrsqoyjjpb[.]com | ya*****@ch*****.com | 175 |
| sxavjnfrwwrq[.]com | ya*****@ch*****.com | 175 |
| qdxbgtalumvj[.]com | Masked/Undisclosed | / |
| hshshshsussiiwuwyw[.]com | Masked/Undisclosed | / |
Table 1: Artifacts from domains tagged as Ramnit IoCs reported malicious or suspicious on VirusTotal
A majority of the artifacts comprise random alphanumeric characters, a common feature of machine-generated domains. The image below shows the domains that share the same email address with eakrbfndtxvub[.]com. In addition, most of the malicious IP addresses in the study are tagged as generated by domain generation algorithms (DGA) in the reports.

Some subdomains also appear to be pertaining to nameservers and mail exchange (MX) servers.

The IP addresses Ramnit contacted, on the other hand, could be associated with 673 domain names. Note also that two of the malicious IP addresses (216.58.213[.]142 and 216.58.205[.]46) belong to the same parent IP block, 216.58.192[.]0 - 216.58.223[.]255. Other IP addresses belonging to the IP range or block could be worth looking into.
| IP address | # of connected domains (Reverse IP Lookup) | IP Range(IP Netblocks API) |
|---|---|---|
| 208.100.26.251 | 1 | 208.100.0[.]0 - 208.100.63[.]255 |
| 148.81.111.121 | 0 | 148.81.0[.]0 - 148.81.255[.]255 |
| 72.26.218[.]70 | 139 | 72.26.216[.]0 - 72.26.219[.]255 |
| 87.106.190[.]153 | 48 | 87.106.176[.]0 - 87.106.191[.]255 |
| 194.87.92[.]204 | 0 | 194.87.92[.]0 - 194.87.95[.]255 |
| 35.225.160[.]245 | 471 | 35.224.0[.]0 - 35.227.255[.]255 |
| 89.185.44[.]100 | 0 | 89.185.44[.]0 - 89.185.47[.]255 |
| 216.58.213[.]142 | 5 | 216.58.213[.]0 - 216.58.213[.]255 |
| 172.217.5[.]238 | 4 | 172.217.5[.]0 - 172.217.5[.]255 |
| 104.18.25[.]243 | 0 | 104.18.16[.]0 - 104.18.31[.]255 |
| 216.58.205[.]46 | 5 | 216.58.204[.]0 - 216.58.205[.]255 |
Here too, most of the domains appear to be machine-generated. The image below shows some examples.

We may not get rid of Ramnit anytime soon. But tracking and expanding linked IoCs can help identify artifacts of interest. Doing so can pave the way to a better understanding of the malware and how it spreads.
Are you a security researcher or investigator interested in the Ramnit-associated domains and IP addresses mentioned in this post? Contact us to learn more about how you can expand malware IoC lists with our data.
Sponsored byIPv4.Global
Sponsored byRadix
Sponsored byWhoisXML API
Sponsored byDNIB.com
Sponsored byVerisign
Sponsored byCSC
Sponsored byVerisign