A new infection chain and obfuscation techniques used by njRAT in recent campaigns. The first method discussed is packaging the payload inside installers for legitimate software. Although the legitimate software is installed on the system, to avoid raising the suspicions of the victim, an infection chain is also kicked off. First a VBS file is dropped that maintains persistence via the Startup folder. This script is responsible for the execution of a series of PowerShell scripts that ultimately download and run the njRAT payload from a legitimate cloud hosting service, such as OneDrive. In another case, PowerShell scripts, masquerading as image files, are downloaded with the final payload being loaded via process injection. These newer samples of njRAT include additional obfuscation, such as the use of ConfuserEx, and anti-analysis techniques, such as detecting VM and debugging software. Once installed on the system, njRAT provides the attacker with the ability to obtain system information and process commands received from its C2 server.
Block all threat indicators at your respective controls.