Ninerat

Malware updated 25 days ago (2024-08-14T10:17:47.213Z)
Download STIX
Preview STIX
NineRAT is a malicious software, or malware, that was first built in May 2022 and initially used in the Operation Blacksmith campaign against a South American agricultural organization in March. It is one of two Remote Access Trojans (RATs) utilized by Lazarus, a notorious Advanced Persistent Threat (APT) group, with the other being DLRAT. NineRAT, in particular, uses Telegram bots and channels for its command-and-control (C2) system, featuring DLang-based libraries that test authentication and enable document upload and download functionalities. Once activated, it becomes the primary interaction method with the infected host, even as older backdoor mechanisms like HazyLoad persist to provide Lazarus redundant access points. The researchers have found that the data collected by Lazarus via NineRAT may be shared with other APT groups. This information essentially resides in a different repository from the fingerprint data collected initially by Lazarus during their initial access and implant deployment phase. Once active, NineRAT receives preliminary commands from the C2 to again fingerprint the infected systems, indicating a re-fingerprinting process. The researchers have dubbed the Telegram-based RAT "NineRAT" and the non-Telegram variant "DLRAT," while a third component, a DLang-based downloader called "BottomLoader," is designed to retrieve additional payloads in subsequent stages of the operation. In the latest Andariel campaign, both NineRAT and DLRAT are being used as RATs. NineRAT uses Telegram as its command-and-control channel for commands, communication, and file transfers. Interestingly, Andariel exploits Log4Shell to attack publicly-accessible VMware Horizon servers to deliver NineRAT. This sophisticated malware strategy highlights the increasing complexity of cyber threats and underscores the need for robust cybersecurity measures.
Description last updated: 2024-08-14T09:37:00.651Z
What's your take? (Question 1 of 5)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Possible Aliases / Cluster overlaps
It's hard to track cluster overlaps and naming conventions between vendors, so here are some possible overlapping names / profiles you also may want to look at.
IDVotesProfile Description
Dlrat
3
DLRAT is a potent malware, classified as a Remote Access Trojan (RAT), developed and deployed by the Lazarus group. It functions both as a trojan and a downloader, capable of introducing additional payloads into an infected system. The malware infiltrates systems through suspicious downloads, emails
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Rat
Implant
Apt
Malware
Operation Bl...
Telegram
Backdoor
Dropper
Downloader
Cisco
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Associated Threat Actors
To see the evidence that has resulted in these threatActor associations, create a free account
IDTypeVotesProfile Description
AndarielUnspecified
2
Andariel, a state-backed threat group linked to North Korea's Reconnaissance General Bureau, has been identified as a significant cyber threat. The group has demonstrated its capabilities by compromising critical national infrastructure organizations, accessing classified technical information and i
Source Document References
Information about the Ninerat Malware was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
PreviewSource LinkCreatedAtTitle
CISA
a month ago
North Korea Cyber Group Conducts Global Espionage Campaign to Advance Regime’s Military and Nuclear Programs | CISA
BankInfoSecurity
9 months ago
Lazarus Exploits Log4Shell to Deploy Telegram-Based Malware
CERT-EU
9 months ago
Lazarus Group Exploits Log4j Flaw in New Malware Campaign
CERT-EU
9 months ago
Lazarus Group continues to exploit Log4j flaw in latest campaign
Securityaffairs
9 months ago
Operation Blacksmith: Lazarus exploits Log4j flaws to deploy DLang malware
DARKReading
9 months ago
Lazarus Group Is Still Juicing Log4Shell, Using RATs Written in 'D'
CERT-EU
9 months ago
Lazarus Group bang on trend with memory-safe Dlang malware
CERT-EU
9 months ago
Lazarus Group Using Log4j Exploits to Deploy Remote Access Trojans
CERT-EU
8 months ago
Breaking Cyber News From Cyberint - Cyberint
CERT-EU
9 months ago
Lazarus hackers drop new RAT malware using 2-year-old Log4j bug
InfoSecurity-magazine
9 months ago
Lazarus Group Targets Log4Shell Flaw Via Telegram Bots