Home Malware Programs Trojans NJRat

NJRat

Posted: August 12, 2016

Threat Metric

Ranking: 1,495
Threat Level: 8/10
Infected PCs: 14,395
First Seen: August 12, 2016
Last Seen: October 17, 2023
OS(es) Affected: Windows


NJRat is a Remote Access Trojan (RAT) whose primary purpose is to provide its operator with unsupervised access to the victim's computer. The threat is meant to run on the compromised host silently, and give the remote attacker the ability to spy on their victims, manage their files, and perform a long list of harmful and operations. The malware was first seen in 2013, and it was used in the Middle Eastern region predominantly – however, through the years it was adopted by hundreds of threat actors and used all around the world. One of the biggest surges of NJRat attacks occurred in 2014 when thousands of computers in India were infected by this threatening application.

The NJRat also has served as a foundation for the development of other malware families and various cyber threats:

  • Lime Ransomware – a file-locker that also installed the NJRat on the victim's computer.
  • Njw0rm – an extended NJRat variant that packed additional features, and has the ability to copy its files to USB drives and removable storage connected to the infected host.

Since the server builder and client components of the NJRat have become public, and threat actor can make use of them and opt to reach their targets by using various propagation channels and social engineering tricks. Copies of the NJRat may often be hosted on torrent trackers, posing as software keygens, game cracks or other pirated content. More sophisticated threat actors have been seen spreading copies of the NJRat via corrupted links posted on Discord servers, fake social media profiles/conversations, and bogus email attachments.

Some of the NJRat's core features are:

  • Establish a remote desktop connection to the infected host.
  • Silently browse the victim's files and directories.
  • Access the victim's Web camera or microphone and use them for recordings.
  • Modify the Windows Registry, Task Manager and Windows Services.
  • Launch a keylogger.
  • Collect saved passwords (browser, FTP, messaging applications, etc.).
  • Access websites or download files from the Web.

Protecting your computer from the NJRat and the threat actors who use it can be achieved by following the best safe browsing practices. Never download pirated movies or media, avoid torrent trackers, and do not mess around with software or game cracks. Naturally, only trust files coming from reputable sources and websites, and make sure to double-check the source's credibility – cybercriminals can spoof email addresses or use bogus domains to trick you into trusting the wrong source. Last but not least, make sure to have your system protected by a regularly updated anti-virus software suite.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



%SYSTEMDRIVE%\Users\<username>\Desktop\Njrat\Plugin\pw.dll File name: pw.dll
Size: 39.93 KB (39936 bytes)
MD5: db87daf76c15f3808cec149f639aa64f
Detection count: 1,953
File type: Dynamic link library
Mime Type: unknown/dll
Path: %SYSTEMDRIVE%\Users\<username>\Desktop\Njrat\Plugin\pw.dll
Group: Malware file
Last Updated: October 11, 2023
%SYSTEMDRIVE%\Users\<username>\AppData\Roaming\Mono.Cecil.dll File name: Mono.Cecil.dll
Size: 312.32 KB (312320 bytes)
MD5: 851ec9d84343fbd089520d420348a902
Detection count: 230
File type: Dynamic link library
Mime Type: unknown/dll
Path: %SYSTEMDRIVE%\Users\<username>\AppData\Roaming\Mono.Cecil.dll
Group: Malware file
Last Updated: October 16, 2023
file.exe File name: file.exe
Size: 404.53 KB (404538 bytes)
MD5: 69453f86115bf0ad1c718e5ec9253a70
Detection count: 90
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
file.exe File name: file.exe
Size: 160.25 KB (160256 bytes)
MD5: a78b8d72a78767f92e9d93cdc995d9ae
Detection count: 75
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: August 12, 2016
file.exe File name: file.exe
Size: 1.62 MB (1629726 bytes)
MD5: 1e6e5b00496d3c6629568fef18ceb5a0
Detection count: 74
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: January 21, 2017
4bbc15dba26f9d7ae8c2e3ec8a63dd4d File name: 4bbc15dba26f9d7ae8c2e3ec8a63dd4d
Size: 50.68 KB (50688 bytes)
MD5: 4bbc15dba26f9d7ae8c2e3ec8a63dd4d
Detection count: 73
Group: Malware file
2a4b142a5249f32d552712bf01d18f23 File name: 2a4b142a5249f32d552712bf01d18f23
Size: 53.24 KB (53248 bytes)
MD5: 2a4b142a5249f32d552712bf01d18f23
Detection count: 70
Group: Malware file
file.exe File name: file.exe
Size: 94.72 KB (94720 bytes)
MD5: de08894d497e63ef412a144274166ea4
Detection count: 33
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: June 7, 2017
file.exe File name: file.exe
Size: 1.12 MB (1125784 bytes)
MD5: cd312c275495e39ca7d9b186e146dd62
Detection count: 14
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: October 6, 2016
file.exe File name: file.exe
Size: 609.28 KB (609280 bytes)
MD5: a9f81658b17624154c7936935b3bb6b1
Detection count: 14
File type: Executable File
Mime Type: unknown/exe
Group: Malware file

Registry Modifications

The following newly produced Registry Values are:

File name without pathnjw0rm.exeVIP Script.exeRegexp file mask%APPDATA%\server.exe%appdata%\SyCom.exe%TEMP%\Console Window Host.exe%WINDIR%\System32\Tasks\NYAN

Related Posts

Loading...