After extracting the zip file, OLEtools was used to handle an Office file, specifically a PowerPoint file.
OLEtools and olevba were used to analyze Macros within the PowerPoint file.
Suspicious URLs were found in the Macros, linked to Pastebin and configured under the ‘AutoOpen’ feature.
Curl was used to download content from the URL, leading to another URL with additional payloads.
Decoding and reversing Base64-encoded strings were done using CyberChef.
Obfuscated strings in the URLs were decoded to reveal two files, a DLL and an executable, both written in .NET.
PEstudio was used to analyze functions related to a Keylogger and network communication in the malware.
Network-related IOCs and URLs related to the malware were extracted for further investigation.
The analysis revealed njRAT, a sophisticated malware strain for remote access and data theft, emphasizing the importance of caution with email attachments and unknown files.
njRAT is a remote access Trojan (RAT) that allows attackers to gain unauthorized access to a victim’s computer. It is capable of keylogging, taking screenshots, and controlling the victim’s webcam and microphone. It can also download and execute additional malicious payloads.

After downloading and extracting the zip file, I used OLEtools because I knew I was going to deal with an Office file — specifically, a PowerPoint file.

After noticing the presence of Macros within the file, the tool olevba was used to gain more insight into what those Macros are.


It was observed that this macro contains a suspicious URL linking to Pastebin. It’s also noteworthy that this macro is configured under the ‘AutoOpen’ feature, which automatically executes macros or actions when a presentation is opened.
It was decided to use curl to download the content from this URL and delve deeper into the analysis. This initial URL redirected to another URL, which contained another payload.


The output of stage 3 contained a simple VBS obfuscated code with recognizable words such as ‘replace,’ ‘base64,’ ‘WScript,’ and ‘PowerShell,’ as marked in Figure 5.


This variable contained a Base64-encoded string that needed to be decoded and reversed. I decided to use CyberChef, as shown in Figures 7 and 8.


Those two URLs contained two different obfuscated strings, as shown in Figure 9. The obfuscation appears to be related to the characters: ‘↓:↓↓’.

In the decoded output from CyberChef (Figure 8), the presence of the Replace function led me to believe that it was related to the next stage I extracted.

I decided to use this replacement technique to make sense of these long strings. My initial suspicion was that these two strings were intended to construct a new executable file.


My suspicion was correct; the first file is a DLL, and the second one is an executable, both written in .NET.

This is the final stage of the malware, as it contains the actual malicious payload.
Within the debugger, many functions related to a Keylogger and the transmission of information over a socket were observed.

We can also observe many of these functions, and more, using the tool PEstudio.


At this point, I decided to run the malware to extract network-related IOCs.


IOCs:
- cefa4ebf82b3d077a68ce1933be3dc6e9cadce8bc27671a5fcd76ee2f4d04977.ppam — 6175e14e465756c626ccc0f398fcdcb0
- stage3.vbs — edf8f50f318c20bccb889743172d9fd2
- out1.dll — 4b7d118b20d8854372129f53365d529f
- out2.exe — d189af41737b287469ca5f5589dcbdf1
- hxxps://pt[.]textbin[.]net/download/itm1dkgz7c
- hxxps://paste[.]ee/d/ESa4q/0
- hxxps://pt[.]textbin[.]net/download/tmo7gc3cgs
- hxxps://pt[.]textbin[.]net/download/igvxdijw4q
- hxxps://paste[.]ee/d/jtSmT/0
- hxxps://paste[.]ee/d/ea2Mw/0
- hxxps://pt[.]textbin[.]net/download/insdj4bhn2
In conclusion, the analysis of njRAT revealed a sophisticated malware strain designed for remote access and data theft. Its initial infection vector through a malicious PowerPoint file underscores the need for caution with email attachments and files from unknown sources.
The malware’s keylogger and socket communication capabilities indicate its potential for capturing sensitive information and enabling remote control of infected systems. Its use of obfuscation and encoding techniques highlights the complexity of modern malware.
This analysis underscores the ongoing threat of remote access Trojans and the importance of proactive security measures, including software updates, endpoint protection, and user education, to mitigate such risks.
https://medium.com/@b.magnezi/malware-analysis-njrat-5633847bd6f1
MITRE TTP :
- Initial Access [TA0001]:
- Technique: Phishing [T1566]:
- Procedure: Malware is delivered via a PowerPoint file attached to a phishing email. The file contains macros that automatically execute upon opening.
- Technique: Phishing [T1566]:
- Execution [TA0002]:
- Technique: User Execution [T1204]:
- Procedure: The user unwittingly executes the malicious macro by opening the PowerPoint file.
- Technique: Scripting [T1064]:
- Procedure: The macro contains a script that downloads additional payloads from Pastebin URLs.
- Technique: User Execution [T1204]:
- Defense Evasion [TA0005]:
- Technique: Obfuscated Files or Information [T1027]:
- Procedure: The downloaded VBS script is obfuscated to evade detection.
- Technique: Deobfuscate/Decode Files or Information [T1140]:
- Procedure: The obfuscated VBS script is decoded to reveal the final payload URLs.
- Technique: Obfuscated Files or Information [T1027]:
- Command and Control [TA0011]:
- Technique: Application Layer Protocol [T1071]:
- Procedure: The malware communicates with the attacker’s C2 server over HTTP to download the final payloads and send stolen data.
- Technique: Application Layer Protocol [T1071]:
- Collection [TA0009]:
- Technique: Input Capture [T1056]:
- Procedure: The final payload includes a keylogger function to capture keystrokes.
- Technique: Screen Capture [T1113]:
- Procedure: The malware has the capability to take screenshots of the victim’s desktop.
- Technique: Input Capture [T1056]:
- Exfiltration [TA0010]:
- Technique: Exfiltration Over C2 Channel [T1041]:
- Procedure: Captured data, such as keystrokes and screenshots, is exfiltrated to the attacker’s C2 server over the established communication channel.
- Technique: Exfiltration Over C2 Channel [T1041]:
- Persistence [TA0003]:
- Technique: Create or Modify System Process [T1543]:
- Procedure: The malware may create a new process or service to ensure persistence on the victim’s system.
- Technique: Create or Modify System Process [T1543]: