njRAT runs MassLogger
嗯,用户让我帮忙总结一下这篇文章的内容,控制在一百个字以内,而且不需要以“文章内容总结”或“这篇文章”这样的开头,直接写描述即可。首先,我需要仔细阅读文章内容,抓住主要信息。 文章主要讲的是njRAT这个远程访问木马,已经存在超过十年,仍然很受欢迎。作者用NetworkMiner Professional来解码njRAT的C2流量,提取了截图、命令和传输的文件。PCAP文件显示攻击者下载了受害者的全分辨率截图。此外,还提到了njRAT的命令如CAP、inv和rn,以及传输的DLL和EXE文件是gzip压缩的。MassLogger被用来窃取凭证,并通过特定邮箱和SMTP服务器发送数据。最后列出了相关的IOC列表。 现在需要把这些信息浓缩到100字以内。要涵盖njRAT的功能、NetworkMiner的作用、提取的内容、MassLogger的作用以及IOC列表。可能需要简化一些技术细节,但要保留关键点。 比如:“njRAT是一种远程访问木马,可窃取截图、执行命令并传输文件。NetworkMiner Professional可用于解码其C2流量并提取相关数据。MassLogger被用于窃取凭证并通过特定邮箱发送。”这样大概在100字左右。 再检查一下是否遗漏了关键点:njRAT的历史、NetworkMiner的作用、提取的内容类型、MassLogger的功能以及IOC列表。可能需要稍微调整句子结构以确保信息完整且简洁。 </think> njRAT是一种远程访问木马,可窃取截图、执行命令并传输文件。NetworkMiner Professional可用于解码其C2流量并提取相关数据。MassLogger被用于窃取凭证并通过特定邮箱发送。 2026-2-2 19:39:0 Author: www.netresec.com(查看原文) 阅读量:6 收藏

Monday, 02 February 2026 19:39:00 (UTC/GMT)


njRAT runs MassLogger

njRAT

njRAT is a remote access trojan that has been around for more than 10 years and still remains one of the most popular RATs among criminal threat actors. This blog post demonstrates how NetworkMiner Professional can be used to decode the njRAT C2 traffic to extract artifacts like screenshots, commands and transferred files.

A PCAP file with njRAT traffic was published on malware-traffic-analysis.net last week. After loading this PCAP file, NetworkMiner Professional reveals that the attacker downloaded full resolution screenshots of the victim’s screen.

Overview of screenshots sent to C2 server

Image: Overview of screenshots sent to C2 server

Screenshot extracted from njRAT traffic by NetworkMiner

Image: Screenshot extracted from njRAT traffic by NetworkMiner

The file “New Purchase Order and Specifications.exe” in this screenshot is the njRAT binary that was used to infect the PC.

A list of njRAT commands sent from the C2 server to the victim can be viewed on NetworkMiner’s Parameters tab by filtering for ”njRAT server command”.

njRAT commands

The following njRAT commands are present here:

  • CAP = take screenshot
  • inv = invoke (run) a plugin (dll)
  • rn = run a tool (executable)

Additional njRAT commands can be found in our writeup for the Decoding njRAT traffic with NetworkMiner video, which we published last year.

njRAT File Transfers

The “inv” and “rn” commands both transfer and execute additional code on the victim machine. The “inv” command typically transfers a DLL file that is used as a plugin, while the “rn” commands sends an executable file. These DLL and EXE files are transferred in gzip compressed format, which is why NetworkMiner extracts them as .gz files.

njRAT files extracted from PCAP

Image: Gzip compressed files extracted from njRAT traffic

This oneliner command lists the internal/original file names and corresponding MD5 hashes of the gzip compressed executables sent to the victim PC:

  • for f in njRAT-rn*.gz; do echo $f; gunzip -c $f | exiftool - | grep Original; gunzip -c $f | md5sum; done
  • njRAT-rn-260129030403.gz
  • Original File Name : Stub.exe
  • ca819e936f6b913e2b80e9e4766b8e79 -
  • njRAT-rn-260129030433.gz
  • Original File Name : Stub.exe
  • e422a4ce321be1ed989008d74ddb6351 -
  • njRAT-rn-260129030451.gz
  • Original File Name : CloudServices.exe
  • fcbb7c0c68afa04139caa55efe580ff5 -
  • njRAT-rn-260129031041.gz
  • Original File Name : Stub.exe
  • 0ae3798c16075a9042c5dbb18bd10a5c -

The MD5 hashes of the files inside the gzip compressed streams can also be seen on the Parameters tab in NetworkMiner.

njRAT file MD5 hashes

MassLogger

The “CloudServices.exe” executable is a known credential stealer called MassLogger. This particular MassLogger sample is hard coded to exfiltrate data in an email to kingsnakeresult@mcnzxz[.]com. The email is sent through the SMTP server cphost14.qhoster[.]net. See the execution of this sample on Triage for additional details regarding the MassLogger payload in CloudServices.exe.

IOC List

njRAT

  • 58f1a46dba84d31257f1e0f8c92c59ec = njRAT sample
  • 104.248.130.195:7492 = njRAT C2 server
  • 801a5d1e272399ca14ff7d6da60315ef = sc2.dll
  • ca819e936f6b913e2b80e9e4766b8e79 = Stub.exe
  • e422a4ce321be1ed989008d74ddb6351 = Stub.exe
  • fcbb7c0c68afa04139caa55efe580ff5 = CloudServices.exe
  • 0ae3798c16075a9042c5dbb18bd10a5c = Stub.exe

MassLogger

  • fcbb7c0c68afa04139caa55efe580ff5
  • kingsnakeresult@mcnzxz[.]com
  • cphost14.qhoster.net:587
  • 78.110.166.82:587

Posted by Erik Hjelmvik on Monday, 02 February 2026 19:39:00 (UTC/GMT)

Tags: #njRAT #NetworkMiner Professional #malware-traffic-analysis.net

Short URL: https://netresec.com/?b=262adb9


文章来源: https://www.netresec.com/?page=Blog&month=2026-02&post=njRAT-runs-MassLogger
如有侵权请联系:admin#unsafe.sh