
๐ฝ๐ด๐๐๐ด๐๐ด๐ฒ
@netresec
Experts in Network Forensics and Network Security Monitoring. Creators of #NetworkMiner, #CapLoader, #PacketCache, #PolarProxy and #RawCap.
ID: 416995874
https://www.netresec.com/ 20-11-2011 11:40:57
3,3K Tweet
8,8K Takipรงi
803 Takip Edilen


Take ๐ฝ๐ด๐๐๐ด๐๐ด๐ฒ course if you are interested in learning the dark magic of analyzing PCAPs and understanding malware protocols


Did you know that NetworkMiner parses the #njRAT protocol? The following artefacts are extracted from njRAT C2 traffic: ๐ฅ๏ธ Screenshots of victim computer ๐ Transferred files ๐พ C2 commands and replies ๐ Stolen credentials/passwords โจ๏ธ Keylog data netresec.com/?b=2541a39









๐ง Dropper connects to legitimate website ๐ Fake PDF is downloaded over HTTPS ๐พ Fake PDF is decrypted to a #PureLogs DLL โ๏ธ InstallUtil.exe or RegAsm.exe is started ๐ PureLogs DLL is injected into the running process ๐พ PureLogs connects to C2 server netresec.com/?b=257eead

IOCs in blog post: ๐ก 91.92.120.101:62520 ๐ก 91.92.120.101:65535 ๐พ 711d9cbf1b1c77de45c4f1b1a82347e6 ๐พ 6ff95e302e8374e4e1023fbec625f44b ๐พ e6d7bbc53b718217b2de1b43a9193786 ๐พ a9bc0fad0b1a1d6931321bb5286bf6b7 ๐พ 09bb5446ad9055b9a1cb449db99a7302 ๐พ 38d29f5ac47583f39a2ff5dc1c366f7d
