Home Malware Programs Ransomware njRAT Lime Edition

njRAT Lime Edition

Posted: December 11, 2017

Threat Metric

Ranking: 1,495
Threat Level: 8/10
Infected PCs: 14,395
First Seen: August 12, 2016
Last Seen: October 17, 2023
OS(es) Affected: Windows

The njRAT Lime Edition is an update of the Backdoor.Ratenjay, AKA, njRAT. The original version of this backdoor Trojan includes comprehensive features for disabling your PC's security and giving a remote attacker control over it. The new version also has support for third-party ransoming attacks that may block your files or deliver extortionist messages. As a high-level threat, removing the njRAT Lime Edition always should be left to appropriate anti-malware software or experts, while remote backups can keep the Trojan from damaging any data beyond the possibility of restoring.

Middle Eastern Trojans, Now Available with an Encryption Flavoring

A threat actor is dabbling in a Ransomware-as-a-Service business that's bundling the full capabilities of a Remote Access Trojan with its file-locking features. Although it isn't detectable in the wild currently, malware experts note that the njRAT Lime Edition includes all of the past functions of the original njRAT or Backdoor.Ratenjay in accompaniment with new, extortionist ones. Besides letting cybercrooks control your computer, the njRAT Lime Edition also can block the contents of your hard drive for supporting its demands for payment.

The developer of the njRAT Lime Edition has made few changes to the core RAT program, which retains capabilities such as keylogging, screen-grabbing, botnet recruitment and a worm-like feature for copying itself to other devices. However, he also adds a separate module for delivering data-encrypting attacks and accompanying ransom messages traditionally, such as:

  • A desktop wallpaper-changing function may reset your background to an extortion-themed warning or image.
  • An encryption feature using an unknown cipher may convert your media to illegible formats automatically. Such attacks often block content like documents, spreadsheets, pictures, archives or movies.
  • The njRAT Lime Edition also may deliver pop-ups or ransom instructions for your files in MsgBox objects, Notepad text messages and HTML windows.
  • Automatic BitTorrent supports lets the njRAT Lime Edition hijack the network resources of the infected PC for downloading or uploading content, such as copies of itself.

Threat actors who purchase the njRAT Lime Edition's client can use an administrative panel for controlling some of these features or tracking specific infections and ransom transactions. Unlike most RaaS-based Trojans, the njRAT Lime Edition offers highly flexible configurations for its messages, although, by default, it asks for Bitcoin as the preferred payment method.

Washing out the Taste of Bad Limes

Many Trojans that focus on giving cybercrooks control over infected PCs try to obfuscate their presence in any number of ways, such as injecting their code into another program's memory process or hijacking root privileges. In light of this fact, malware experts are finding the njRAT Lime Edition's update a two-edged weapon, with symptoms that can help alert the users, even while they're causing additional problems. Users suspecting that the njRAT Lime Edition is infecting their PCs also should presume that the cybercrooks may be capable of controlling it remotely and take precautions like disabling their network connections temporarily.

File-encrypting Trojans often will make false claims about the strength of their data-locking techniques. Victims sometimes can use free recovery tools from various entities in the cyber-security sector for 'unlocking' any hostage content. Since malware analysts have no information on the strength or variability of the njRAT Lime Edition's encryption module, the most comprehensive protection they can recommend is making regular backups for restoration afterward. Automatic removal of the njRAT Lime Edition with a dedicated anti-malware program should be considered mandatory for your PC's safety.

One could argue that it's better to deal with an infection by a Trojan with tangible evidence instead of one that attempts total invisibility, as is the difference between the njRAT Lime Edition and Backdoor.Ratenjay. However, knowing a Trojan is on your PC may not help you save your files if you're remiss in securing them.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



%SYSTEMDRIVE%\Users\<username>\Desktop\Njrat\Plugin\pw.dll File name: pw.dll
Size: 39.93 KB (39936 bytes)
MD5: db87daf76c15f3808cec149f639aa64f
Detection count: 1,953
File type: Dynamic link library
Mime Type: unknown/dll
Path: %SYSTEMDRIVE%\Users\<username>\Desktop\Njrat\Plugin\pw.dll
Group: Malware file
Last Updated: October 11, 2023
%SYSTEMDRIVE%\Users\<username>\AppData\Roaming\Mono.Cecil.dll File name: Mono.Cecil.dll
Size: 312.32 KB (312320 bytes)
MD5: 851ec9d84343fbd089520d420348a902
Detection count: 230
File type: Dynamic link library
Mime Type: unknown/dll
Path: %SYSTEMDRIVE%\Users\<username>\AppData\Roaming\Mono.Cecil.dll
Group: Malware file
Last Updated: October 16, 2023
file.exe File name: file.exe
Size: 404.53 KB (404538 bytes)
MD5: 69453f86115bf0ad1c718e5ec9253a70
Detection count: 90
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
file.exe File name: file.exe
Size: 160.25 KB (160256 bytes)
MD5: a78b8d72a78767f92e9d93cdc995d9ae
Detection count: 75
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: August 12, 2016
file.exe File name: file.exe
Size: 1.62 MB (1629726 bytes)
MD5: 1e6e5b00496d3c6629568fef18ceb5a0
Detection count: 74
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: January 21, 2017
4bbc15dba26f9d7ae8c2e3ec8a63dd4d File name: 4bbc15dba26f9d7ae8c2e3ec8a63dd4d
Size: 50.68 KB (50688 bytes)
MD5: 4bbc15dba26f9d7ae8c2e3ec8a63dd4d
Detection count: 73
Group: Malware file
2a4b142a5249f32d552712bf01d18f23 File name: 2a4b142a5249f32d552712bf01d18f23
Size: 53.24 KB (53248 bytes)
MD5: 2a4b142a5249f32d552712bf01d18f23
Detection count: 70
Group: Malware file
file.exe File name: file.exe
Size: 94.72 KB (94720 bytes)
MD5: de08894d497e63ef412a144274166ea4
Detection count: 33
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: June 7, 2017
file.exe File name: file.exe
Size: 1.12 MB (1125784 bytes)
MD5: cd312c275495e39ca7d9b186e146dd62
Detection count: 14
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: October 6, 2016
file.exe File name: file.exe
Size: 609.28 KB (609280 bytes)
MD5: a9f81658b17624154c7936935b3bb6b1
Detection count: 14
File type: Executable File
Mime Type: unknown/exe
Group: Malware file

Registry Modifications

The following newly produced Registry Values are:

File name without pathnjw0rm.exeVIP Script.exeRegexp file mask%APPDATA%\server.exe%appdata%\SyCom.exe%TEMP%\Console Window Host.exe%WINDIR%\System32\Tasks\NYAN
Loading...