During the last several weeks of 2017 and now well into early 2018, RSA FirstWatch has observed a malspam campaign delivering njRAT, a robust and publicly available remote administration tool (RAT) with capabilities for remote desktop, file manager, remote camera, remote keylogger, DOS attack, and run file (from link, disk, or script).

  

One such event occurred on January 10, 2018, with likely targeted malspam delivery of a malicious MS Word document, 'Pro Forma Invoice.doc'.

 

Screen Shot 2018-01-12 at 3.18.08 PM.png

 

As we can see by RSA's pre-release Whatsthisfile.net capability, some highly suspicious VBA code is embedded in the delivery document.

Screen Shot 2018-01-12 at 2.48.47 PM.png

Screen Shot 2018-01-12 at 2.49.50 PM.png

This VBA code effectively calls powershell to retrieve a njRAT payload from an open directory on eagleepcisocks[.]com, hosted on 162.144.63[.]238.

Screen Shot 2018-01-12 at 4.14.43 PM.png

Screen Shot 2018-01-12 at 4.17.45 PM.png

Screen Shot 2018-01-12 at 4.16.02 PM.png

It's worth noting that a very similar powershell drop method has been recently been observed for Agent Tesla deliveries as reported by malwarebreakdown.com.

Network activity for the njRAT payload delivery is below.

 Screen Shot 2018-01-12 at 2.40.03 PM.png

 Screen Shot 2018-01-12 at 4.04.06 PM.png

You can also see the whole thing happen live on app.any.run here.  

Post-infection, we immediately begin to see indications of active Command and Control (C2) out to 212.83.167[.]116, which appears to be a somewhat unsavory machine.

Screen Shot 2018-01-12 at 4.30.08 PM.png

 

This activity is detected by NetWitness Packets and flagged with the following meta data.

Screen Shot 2018-01-12 at 4.06.36 PM.png

Thanks to Ahmed Sonbol‌, @Zerophage1337@James_inthe_box for their assistance with this research.

FirstWatch_banner.png

Topic: