| Name | Description |
|---|---|
| Njw0rm |
Some sources have discussed Njw0rm as a later variant of njRAT, where Njw0rm adds the ability to spread via removable devices such as USB drives.[2] Other sources contain that functionality in their description of njRAT itself.[1][3] |
| LV | |
| Bladabindi |
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1555 | .003 | 从密码存储中获取凭证: Credentials from Web Browsers |
njRAT has a module that steals passwords saved in victim web browsers.[1][3][4] |
| Enterprise | T1005 | 从本地系统获取数据 | ||
| Enterprise | T1112 | 修改注册表 |
njRAT can create, delete, or modify a specified Registry key or value.[1][3] |
|
| Enterprise | T1568 | .001 | 动态解析: Fast Flux DNS | |
| Enterprise | T1547 | .001 | 启动或登录自动启动执行: Registry Run Keys / Startup Folder |
njRAT has added persistence via the Registry key |
| Enterprise | T1059 | .001 | 命令与脚本解释器: PowerShell |
njRAT has executed PowerShell commands via auto-run registry key persistence.[3] |
| .003 | 命令与脚本解释器: Windows Command Shell |
njRAT can launch a command shell interface for executing commands.[1] |
||
| Enterprise | T1120 | 外围设备发现 |
njRAT will attempt to detect if the victim system has a camera during the initial infection. njRAT can also detect any removable drives connected to the system.[1][3] |
|
| Enterprise | T1562 | .004 | 妨碍防御: Disable or Modify System Firewall |
njRAT has modified the Windows firewall to allow itself to communicate through the firewall.[1][3] |
| Enterprise | T1113 | 屏幕捕获 | ||
| Enterprise | T1071 | .001 | 应用层协议: Web Protocols | |
| Enterprise | T1010 | 应用窗口发现 |
njRAT gathers information about opened windows during the initial infection.[1] |
|
| Enterprise | T1132 | .001 | 数据编码: Standard Encoding | |
| Enterprise | T1083 | 文件和目录发现 |
njRAT can browse file systems using a file manager module.[1] |
|
| Enterprise | T1106 | 本机API |
njRAT has used the ShellExecute() function within a script.[3] |
|
| Enterprise | T1012 | 查询注册表 | ||
| Enterprise | T1027 | .004 | 混淆文件或信息: Compile After Delivery |
njRAT has used AutoIt to compile the payload and main script into a single executable after delivery.[3] |
| .013 | 混淆文件或信息: Encrypted/Encoded File | |||
| Enterprise | T1070 | .004 | 移除指标: File Deletion | |
| .009 | 移除指标: Clear Persistence |
njRAT is capable of manipulating and deleting registry keys, including those used for persistence.[3] |
||
| Enterprise | T1082 | 系统信息发现 |
njRAT enumerates the victim operating system and computer name during the initial infection.[1] |
|
| Enterprise | T1033 | 系统所有者/用户发现 |
njRAT enumerates the current user during the initial infection.[1] |
|
| Enterprise | T1125 | 视频捕获 | ||
| Enterprise | T1105 | 输入工具传输 | ||
| Enterprise | T1056 | .001 | 输入捕获: Keylogging | |
| Enterprise | T1057 | 进程发现 | ||
| Enterprise | T1021 | .001 | 远程服务: Remote Desktop Protocol | |
| Enterprise | T1018 | 远程系统发现 | ||
| Enterprise | T1041 | 通过C2信道渗出 |
njRAT has used HTTP to receive stolen information from the infected machine.[3] |
|
| Enterprise | T1091 | 通过可移动媒体复制 |
njRAT can be configured to spread via removable drives.[1][3] |
|
| Enterprise | T1571 | 非标准端口 | ||
| ID | Name | References |
|---|---|---|
| G0134 | Transparent Tribe | |
| G0043 | Group5 | |
| G0143 | Aquatic Panda | |
| G0096 | APT41 | |
| G0140 | LazyScripter | |
| G0078 | Gorgon Group | |
| G1018 | TA2541 |
| ID | Name | Description |
|---|---|---|
| C0005 | Operation Spalax |