We're gradually updating threat actor names in our reports to align with the new weather-themed taxonomy. Learn about Microsoft threat actor names
Trojan:MSIL/Njrat.NB!MTB
Aliases: No associated aliases
Summary
Trojan:MSIL/Njrat.NB!MTB is an NjRAT remote access trojan (RAT) variant that was first revealed in 2012 and associated with threat actor activities in the Middle East. NjRAT is written in .NET Microsoft Intermediate Language (MSIL), it is cross-platform compatible, via the .NET runtime, which helps with its wide propagation. It runs on devices that have a working installation of Microsoft .NET runtime library.
NjRAT is considered a commodity RAT because its source code was leaked online, allowing many threat actors to customize it. NjRAT has a laundry list of functionalities including keystroke logging, obtaining access to the microphone and webcam, credential theft, file management, and cryptocurrency theft. njRAT has a base payload and modular capability with the ability to download other malicious components, which makes it a significant and ongoing threat. It can spread through phishing emails, drive-by downloads, and USB auto-run exploits. Recent campaigns have used steganography by placing the malicious payloads in the bitmap resources in a decoy .NET app, bypassing detection of security software.
This variant is an excellent representation of blending in with legitimate processes while allowing for remote command and control (C2), exfiltration of data, and delivery of a secondary payload. The !MTB suffix indicates behavioral detection by Microsoft Defender, which indicates a heuristic identification process such as an unexpected registry edit or other network traffic rather than a matching signature.
- Disconnect from networks/internet.
- Check scheduled tasks (schtasks /query) and remove malicious entries
- End task all instances of svchos.exe in Task Manager and use File Explorer to delete it from Windows. Boot to Safe Mode as needed and perform that action.
- Restore the Windows Hosts file (C:\Windows\System32\drivers\etc\hosts) from backups
- Reset all passwords stored in browsers or cached applications.
Microsoft Defender Antivirus automatically removes threats as they are detected. However, many infections can leave remnant files and system changes. Updating your antimalware definitions and running a full scan might help address these remnant artifacts.
You can also visit our advanced troubleshooting page or search the Microsoft virus and malware community for more help.