

Rewterz Threat Advisory – Linux Kernel Privilege Escalation
December 2, 2020
Rewterz Threat Alert – Multi-Vector Miner and Tsunami Botnet with SSH Lateral Movement
December 2, 2020
Rewterz Threat Advisory – Linux Kernel Privilege Escalation
December 2, 2020
Rewterz Threat Alert – Multi-Vector Miner and Tsunami Botnet with SSH Lateral Movement
December 2, 2020Severity
High
Analysis Summary
New malicious NPM packages have been discovered that install the njRAT remote access trojan that allows hackers to gain control over a computer. NPM is a JavaScript package manager that allows developers and users to download packages and integrate them into their projects. As NPM is an open ecosystem, anyone can upload a new package without being reviewed or scanned for malware. This makes it easier for threat actors to upload malicious packages. The recently discovered malicious NPM packages were masquerading as a legitimate tool to make databases out of JSON files. They look like harmless packages that could be used to add new functionality to a project. When installed, njRAT gives the threat actor full remote access to a victim’s computer, where they can perform the following malicious behavior:
- Modify the Windows Registry
- Create and delete files
- Upload files
- Execute commands
- Get information about the computer
- Take control over the computer
- Log keystrokes
- Steal passwords
- Kill processes
- Take screenshots
Impact
- Unauthorized Remote Access
- System Takeover
- Unauthorized Command Execution
- Credential Theft
- Data Manipulation
- Information Disclosure
Indicators of Compromise
IP
- 46[.]185[.]116[.]2
MD5
- 7e952af5e150618e282f8586bc6a7d21
- b131dc177af1c2bb38ffc9da6c5b3989
SHA-256
- d6c04cc24598c63e1d561768663808ff43a73d3876aee17d90e2ea01ee9540ff
- 86c11e56a1a3fed321e9ddc191601a318148b4d3e40c96f1764bfa05c5dbf212
- 89fef995339abb188a5a84ba8078c0f9e9927d14fb99c1bb93493442365055cf
SHA1
- c4906e174ae7673a50a9dc52960505647ff6f723
- fab5d5403369f6f9c41495d7492eb8ab596d11d7
Remediation
- Block the threat indicators at their respective controls.
- As malicious NPM projects utilize names similar to legitimate projects, pay close attention to the packages before integrating them into your projects.