yara/rules/Windows_Trojan_Njrat.yar (43 lines of code) (raw):

rule Windows_Trojan_Njrat_30f3c220 { meta: author = "Elastic Security" id = "30f3c220-b8dc-45a1-bcf0-027c2f76fa63" fingerprint = "d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4" creation_date = "2021-06-13" last_modified = "2021-10-04" threat_name = "Windows.Trojan.Njrat" reference_sample = "741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b" severity = 100 arch_context = "x86" scan_context = "file, memory" license = "Elastic License v2" os = "windows" strings: $a1 = "get_Registry" ascii fullword $a2 = "SEE_MASK_NOZONECHECKS" wide fullword $a3 = "Download ERROR" wide fullword $a4 = "cmd.exe /c ping 0 -n 2 & del \"" wide fullword $a5 = "netsh firewall delete allowedprogram \"" wide fullword $a6 = "[+] System : " wide fullword condition: 3 of them } rule Windows_Trojan_Njrat_eb2698d2 { meta: author = "Elastic Security" id = "eb2698d2-c9fa-4b0b-900f-1c4c149cca4b" fingerprint = "8eedcdabf459de87e895b142cd1a1b8c0e403ad8ec6466bc6ca493dd5daa823b" creation_date = "2023-05-04" last_modified = "2023-06-13" threat_name = "Windows.Trojan.Njrat" reference_sample = "d537397bc41f0a1cb964fa7be6658add5fe58d929ac91500fc7770c116d49608" severity = 100 arch_context = "x86" scan_context = "file, memory" license = "Elastic License v2" os = "windows" strings: $a1 = { 24 65 66 65 39 65 61 64 63 2D 64 34 61 65 2D 34 62 39 65 2D 62 38 61 62 2D 37 65 34 37 66 38 64 62 36 61 63 39 } condition: all of them }