Network-Servers-Penetration-Guides-and-Tools

njRAT - Remote Access Trojan

njRAT is a RAT with powerful data-stealing capabilities. In addition to loggin keystrokes, it is capable of accessing a victim’s camera, stealing credentials stored in browsers, uploading and downloading files, performing the process and file manipulations, and viewing the victim’s desktop.

RATs help an attacker to remotely access complete GUI, control victim’s computer without his or her awareness and are capable of performing screening and camera capture, code execution, keylogging, file access, password sniffing, registry management, and so on. It infects victims via phishing attacks and drive by downloads and propagates through infected USB keys or networked drives. It can download and execute additional malware, execute shell commands, read and write registry keys, capture screenshots, log keystrokes, and spy on webcams.

njrat-banner

The njRAT Trojan can be used to control Botnets (network of computers), allowing the attacker to update, uninstall, disconnect, restart, close the RAT, and rename its compaign ID. The attacker can further create and configure the malware to spread through USB drives with the help of the Command and Control server software.

https://mrpirate.net/njrat/

Objectives

Requisites


Create an Executable Server with njRAT

  1. Log in to the Windows 10 and install the njRAT.

  2. Launch the njRAT, the GUI appears along with a pop-up, where you need to specify the port you want to use to interact with the target machine. Use the default port number 5552, and click Start.

    njRAT-1

  3. Click on Builder at lower-left corner.

    njrat-2

  4. On the Builder dialog-box, enter the IP address of the Attacker machine - Windows 10, check the option Copy to StartUp and Registry StarUp, then click Build as shown below:

    njrat-3

  5. Save the file on the Desktop and name as Example.exe.

  6. Now, we need to use any technique to send this server to the intended target through mail or any other way.
    To make this easier in this lab, I copied the Example.exe file in the shared network location.

Execute the Server on the Target Machine

In this Lab I’m using Windows 7 SP1 virtual machine.
Note: Make sure to enable the Firewall on the target machine.

  1. Drag the Example.exe file to your Desktop and double-click it.

    njrat-file

    As you can see below, the connection was successfully established. netstat

  2. Switch back to the Windows 10 (Attacker). When the target double-clicks the server, the executable starts running and the njRAT GUI running on the Windows 10 establishes a persistent connection with the Target machine as show below:

    njrat-5
    The GUI displays the machine’s basic details such as the IP address, OS, user name and so on.

Note: Unless the attacker disconnects the server on his own, the victim machine remains under his control.

Manipulate Files on Target machine

Manage the Processes

Manage the Connections

Manage the Registries

Launch a Remote Shell

Run File

Launch a Remote Desktop Connection

Perform Key Logging


In case the victim/target, attempts to break the connection by restarting the machine, however, as soon the victim logs again, the njRAT client will automatically establishes a connection with the victim.