Njrat: Platinum Edition |link|
This post dives deep into the architecture, obfuscation methods, and persistent threat of NjRAT Platinum. If you are a blue teamer, this is your field manual. NjRAT Platinum is a modified, feature-rich fork of the original open-source NjRAT codebase. While the original author (known as "Njq8") allegedly retired, the source code leaked and was subsequently weaponized by threat actors who added commercial-grade plugins.
Published: October 26, 2023 | Category: Malware Analysis | Threat Level: Severe Introduction: The RAT that Refuses to Die In the shadowy bazaars of cybercrime, most malware families have a shelf life of months. Patches get released, signatures get written, and botnets crumble. njrat platinum edition
Result: The victim sends crypto to the attacker, sees a valid address in the "Paste" field, and only realizes the fraud days later. Standard NjRAT struggles with modern webcams. Platinum uses ICaptureGraphBuilder2 (DirectShow) to grab frames even when the "Webcam in use" LED is on for some older models. Module 5: Firewall Exfiltration (Windows Defender Exclusion) Upon execution, Platinum runs: powershell Add-MpPreference -ExclusionPath C:\Users\Public\ This post dives deep into the architecture, obfuscation
In Q3 2023, security researchers observed Platinum variants incorporating —meaning attackers use NjRAT as a first-stage dropper for ransomware payloads. While the original author (known as "Njq8") allegedly
While not encrypted, Platinum uses to hide the command response. This "rolling cipher" bypasses many signature-based IDS rules that look for plaintext "NjRAT" strings. The "Platinum" Arsenal: Capabilities That Terrify Defenders The author of Platinum added five proprietary modules that elevate this RAT beyond spyware. Module 1: Hidden VNC (Reverse Proxy) Unlike standard Remote Desktop, Platinum uses a reverse proxy over port 443 (SSL tunneled). This allows the attacker to browse the victim's files and desktop through a web-based viewer, bypassing corporate firewalls that block outbound 3389. Module 2: USB Spread (Silent Worm) If the attacker checks a box, NjRAT Platinum writes autorun.inf and a copy of itself to every USB drive. When the victim takes that drive to an air-gapped machine, the infection jumps the gap. Module 3: Clipper (Cryptocurrency Swapper) This is the money maker. Platinum monitors the clipboard for Bitcoin, Ethereum, or Monero addresses. When the victim copies a wallet address, the malware replaces it with the attacker’s address.
GET /index.php?act=785634127890&id=PC-NAME&user=USERNAME&os=WIN10&ver=Platinum_2.1
It is ugly. It is old. And it is winning.