Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Software
  3. njRAT

njRAT

njRAT is a remote access tool (RAT) that was first observed in 2012. It has been used by threat actors in the Middle East.[1]

ID: S0385
Associated Software: Njw0rm, LV, Bladabindi
Type: MALWARE
Platforms: Windows
Version: 1.6
Created: 04 June 2019
Last Modified: 17 November 2024

Associated Software Descriptions

NameDescription
Njw0rm

Some sources have discussed Njw0rm as a later variant ofnjRAT, where Njw0rm adds the ability to spread via removable devices such as USB drives.[2] Other sources contain that functionality in their description ofnjRAT itself.[1][3]

LV

[1]

Bladabindi

[1][3]

Enterprise Layer
downloadview

Techniques Used

DomainIDNameUse
EnterpriseT1071.001Application Layer Protocol:Web Protocols

njRAT has used HTTP for C2 communications.[3]

EnterpriseT1010Application Window Discovery

njRAT gathers information about opened windows during the initial infection.[1]

EnterpriseT1547.001Boot or Logon Autostart Execution:Registry Run Keys / Startup Folder

njRAT has added persistence via the Registry keyHKCU\Software\Microsoft\CurrentVersion\Run\ and dropped a shortcut in%STARTUP%.[1][3]

EnterpriseT1059.001Command and Scripting Interpreter:PowerShell

njRAT has executed PowerShell commands via auto-run registry key persistence.[3]

.003Command and Scripting Interpreter:Windows Command Shell

njRAT can launch a command shell interface for executing commands.[1]

EnterpriseT1555.003Credentials from Password Stores:Credentials from Web Browsers

njRAT has a module that steals passwords saved in victim web browsers.[1][3][4]

EnterpriseT1132.001Data Encoding:Standard Encoding

njRAT uses Base64 encoding for C2 traffic.[1]

EnterpriseT1005Data from Local System

njRAT can collect data from a local system.[1]

EnterpriseT1568.001Dynamic Resolution:Fast Flux DNS

njRAT has used a fast flux DNS for C2 IP resolution.[3]

EnterpriseT1041Exfiltration Over C2 Channel

njRAT has used HTTP to receive stolen information from the infected machine.[3]

EnterpriseT1083File and Directory Discovery

njRAT can browse file systems using a file manager module.[1]

EnterpriseT1562.004Impair Defenses:Disable or Modify System Firewall

njRAT has modified the Windows firewall to allow itself to communicate through the firewall.[1][3]

EnterpriseT1070.004Indicator Removal:File Deletion

njRAT is capable of deleting files.[1][3]

.009Indicator Removal:Clear Persistence

njRAT is capable of manipulating and deleting registry keys, including those used for persistence.[3]

EnterpriseT1105Ingress Tool Transfer

njRAT can download files to the victim’s machine.[1][3]

EnterpriseT1056.001Input Capture:Keylogging

njRAT is capable of logging keystrokes.[1][3][4]

EnterpriseT1112Modify Registry

njRAT can create, delete, or modify a specified Registry key or value.[1][3]

EnterpriseT1106Native API

njRAT has used the ShellExecute() function within a script.[3]

EnterpriseT1571Non-Standard Port

njRAT has used port 1177 for HTTP C2 communications.[3]

EnterpriseT1027.004Obfuscated Files or Information:Compile After Delivery

njRAT has used AutoIt to compile the payload and main script into a single executable after delivery.[3]

.013Obfuscated Files or Information:Encrypted/Encoded File

njRAT has included a base64 encoded executable.[3]

EnterpriseT1120Peripheral Device Discovery

njRAT will attempt to detect if the victim system has a camera during the initial infection.njRAT can also detect any removable drives connected to the system.[1][3]

EnterpriseT1057Process Discovery

njRAT can search a list of running processes for Tr.exe.[3]

EnterpriseT1012Query Registry

njRAT can read specific registry values.[3]

EnterpriseT1021.001Remote Services:Remote Desktop Protocol

njRAT has a module for performing remote desktop access.[1]

EnterpriseT1018Remote System Discovery

njRAT can identify remote hosts on connected networks.[1]

EnterpriseT1091Replication Through Removable Media

njRAT can be configured to spread via removable drives.[1][3]

EnterpriseT1113Screen Capture

njRAT can capture screenshots of the victim’s machines.[3]

EnterpriseT1082System Information Discovery

njRAT enumerates the victim operating system and computer name during the initial infection.[1]

EnterpriseT1033System Owner/User Discovery

njRAT enumerates the current user during the initial infection.[1]

EnterpriseT1125Video Capture

njRAT can access the victim's webcam.[1][4]

Groups That Use This Software

Campaigns

IDNameDescription
C0005Operation Spalax

[12]

References

×

[8]ページ先頭

©2009-2026 Movatter.jp