| Name | Description |
|---|---|
| Njw0rm | Some sources have discussed Njw0rm as a later variant ofnjRAT, where Njw0rm adds the ability to spread via removable devices such as USB drives.[2] Other sources contain that functionality in their description ofnjRAT itself.[1][3] |
| LV | |
| Bladabindi |
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1071 | .001 | Application Layer Protocol:Web Protocols | |
| Enterprise | T1010 | Application Window Discovery | njRAT gathers information about opened windows during the initial infection.[1] | |
| Enterprise | T1547 | .001 | Boot or Logon Autostart Execution:Registry Run Keys / Startup Folder | njRAT has added persistence via the Registry key |
| Enterprise | T1059 | .001 | Command and Scripting Interpreter:PowerShell | njRAT has executed PowerShell commands via auto-run registry key persistence.[3] |
| .003 | Command and Scripting Interpreter:Windows Command Shell | njRAT can launch a command shell interface for executing commands.[1] | ||
| Enterprise | T1555 | .003 | Credentials from Password Stores:Credentials from Web Browsers | njRAT has a module that steals passwords saved in victim web browsers.[1][3][4] |
| Enterprise | T1132 | .001 | Data Encoding:Standard Encoding | |
| Enterprise | T1005 | Data from Local System | ||
| Enterprise | T1568 | .001 | Dynamic Resolution:Fast Flux DNS | |
| Enterprise | T1041 | Exfiltration Over C2 Channel | njRAT has used HTTP to receive stolen information from the infected machine.[3] | |
| Enterprise | T1083 | File and Directory Discovery | njRAT can browse file systems using a file manager module.[1] | |
| Enterprise | T1562 | .004 | Impair Defenses:Disable or Modify System Firewall | njRAT has modified the Windows firewall to allow itself to communicate through the firewall.[1][3] |
| Enterprise | T1070 | .004 | Indicator Removal:File Deletion | |
| .009 | Indicator Removal:Clear Persistence | njRAT is capable of manipulating and deleting registry keys, including those used for persistence.[3] | ||
| Enterprise | T1105 | Ingress Tool Transfer | ||
| Enterprise | T1056 | .001 | Input Capture:Keylogging | |
| Enterprise | T1112 | Modify Registry | njRAT can create, delete, or modify a specified Registry key or value.[1][3] | |
| Enterprise | T1106 | Native API | njRAT has used the ShellExecute() function within a script.[3] | |
| Enterprise | T1571 | Non-Standard Port | ||
| Enterprise | T1027 | .004 | Obfuscated Files or Information:Compile After Delivery | njRAT has used AutoIt to compile the payload and main script into a single executable after delivery.[3] |
| .013 | Obfuscated Files or Information:Encrypted/Encoded File | |||
| Enterprise | T1120 | Peripheral Device Discovery | njRAT will attempt to detect if the victim system has a camera during the initial infection.njRAT can also detect any removable drives connected to the system.[1][3] | |
| Enterprise | T1057 | Process Discovery | ||
| Enterprise | T1012 | Query Registry | ||
| Enterprise | T1021 | .001 | Remote Services:Remote Desktop Protocol | |
| Enterprise | T1018 | Remote System Discovery | ||
| Enterprise | T1091 | Replication Through Removable Media | njRAT can be configured to spread via removable drives.[1][3] | |
| Enterprise | T1113 | Screen Capture | ||
| Enterprise | T1082 | System Information Discovery | njRAT enumerates the victim operating system and computer name during the initial infection.[1] | |
| Enterprise | T1033 | System Owner/User Discovery | njRAT enumerates the current user during the initial infection.[1] | |
| Enterprise | T1125 | Video Capture | ||
| ID | Name | References |
|---|---|---|
| G0134 | Transparent Tribe | |
| G0043 | Group5 | |
| G0143 | Aquatic Panda | |
| G0096 | APT41 | |
| G0140 | LazyScripter | |
| G0078 | Gorgon Group | |
| G1018 | TA2541 |
| ID | Name | Description |
|---|---|---|
| C0005 | Operation Spalax |