Over the Thanksgiving weekend, Sonatype discovered new malware within the npm registry. This time, the typosquatting packages identified by us are laced with a popular Remote Access Trojan (RAT).
The malicious packages are:
Both of these packages have been published by the same author.
On Friday, Sonatype’s Nexus Intelligence, which includes next generation machine learning algorithms that automatically detect potentially malicious open source components, flagged “jdb.js” for being suspicious.
This is the same state-of-the-art technology that has recently unveiled open source malware like CursedGrabber, fallguys’ successor discord.dll, typosquatting npm packages like electorn, twilio-npm, and many more.
Upon digging deeper, we discovered that the author behind “jdb.js” had also published another malicious npm package, “db-json.js.”
However, “jdb.js” is in fact a malicious package bundled with a Remote Access Trojan (RAT) called njRAT aka Bladabindi.
RATs are a type of malware that enable attackers to take over an infected system, execute arbitrary commands, run keyloggers, and discreetly conduct other surveillance activities.
njRAT is an info-stealing trojan that had been deployed in widespread attacks that led Microsoft to shut down 4 million sites in 2014.
In recent years, variants of njRAT/Bladabindi have been distributed via Bitcoin scams on YouTube and via Excel phishing emails. And, given njRAT’s customizability and easy availability on the darknet, the malware has also been shipped by threat actors as part of their ransomware exploit kits.
Dissecting npm malware “jdb.js”
- package.json, the manifest file
- module.js, an obfuscated script
- patch.exe, Windows executable containing the njRAT payload
The counterfeit component has scored just below a 100 downloads, thanks to Sonatype’s automated systems catching it shortly after release.
The package.json manifest file contained within the package launches module.js as soon as the package is installed.
module.js is a heavily obfuscated script containing multiple base64-encoded chunks that cannot be easily deciphered: decoding these strings renders gibberish values, implying these base64 chunks contain binary, or encrypted data.
Image: Obfuscated module.js file (code spread out by us for legibility)
The script conducts multiple sinister activities such as data gathering and reconnaissance, and ultimately launches patch.exe which is an njRAT dropper written in .NET.
Although patch.exe contains an older, known njRAT strand, at the time of our analysis, VirusTotal indicated this particular sample was first submitted to the engine last week by Sonatype, meaning it contained at least some new information.
Decompiling the executable reveals that crucial information.
One of the class constructors, called “OK”, has hardcoded strings revealing the location of the command and control (C2) server and port the malware would be communicating with, the local Windows folder where it would drop itself, etc.
Image: hardcoded strings within patch.exe sample, such as C2 server IP address, name of the dropped process, etc.
As soon as patch.exe runs, it copies itself into the local “TEMP” folder on the system and renames itself to “dchps.exe” (a value revealed within the screenshot). The C2 server and port it establishes a connection to is 18.104.22.168:5552.
However, prior to communicating with the C2 infrastructure, the malicious executable edits Windows firewall rules to ensure it would have no trouble communicating with the hardcoded IP. To do so, it issues the legitimate “netsh” command multiple times, starting with:
netsh firewall add allowedprogram "C:\Users\admin\AppData\Local\Temp\dchps.exe" "dchps.exe" ENABLE
The commands that can be remotely executed by the C2 server operator are quite extensive.
By infecting a host with this malware, a remote attacker gains the ability to log keystrokes, modify registry values, initiate system shutdown or restart at will, edit web browser (IE) start page, “speak” to the user via text-to-speech synthesis (via SAPI.Spvoice), kill or relaunch critical system processes like task manager, system restore, and PING, in addition to taking control of hardware devices like CD drives, monitors, mouse, keyboard, etc.
Image: Partial list of commands an njRAT C2 server can send to execute on the infected host for the trojan to execute
The malware also contains a hardcoded link, https://dl.dropbox[.]com/s/p84aaz28t0hepul/Pass.exe, now disabled by Dropbox, that has also frequently appeared in other njRAT samples.
It is worth noting the C2 server IP 22.214.171.124 that this sample communicates with is the same IOC observed in some CursedGrabber binaries indicating the threat actors behind CursedGrabber and the npm malware “jdb.js” could be linked.
Honest-looking “db-json.js” hides “jdb.js” within
Although “jdb.js” exhibits obvious malicious signs, it’s “db-json.js” that’s concerning for it might be harder for a human and a machine to spot immediately.
First of all, “db-json.js” has a proper README page on npm, at the time of analysis, touting it to be JsonDb, an “easy to use module that makes database based on json files.”
There are well-documented instructions provided for the developer on how to incorporate this library in their application.
Image: npm package “db-json.js” with a believable npm README page
The package “db-json.js” appears clean on a first glance as it contains functional code one would expect from a genuine JSON DB creation package. Yet, it is secretly pulling in the malicious “jdb.js” as a dependency, something Sonatype has repeatedly warned about.
Shown below is the manifest file in both versions 1.0.3 and 1.0.4 that contain “jdb.js” as a dependency.
Furthermore, in version 1.0.4, the quasi-innocuous “dbmanager.js” class goes a step further by appending multiple empty lines towards the end of its functional code, with the very last line being:
Image: db-json.js containing otherwise “clean” code secretly launches jdb.js
This means even if someone is able to dodge “jdb.js,” by using “db-json.js” in their application, not only would they be infecting their machine with njRAT malware, they also put other developers at risk: developers who would install or fork applications built with “db-json.js.”
In our recent state of the software supply chain report, we documented a 430% increase in malicious code injection within OSS projects - or next-gen software supply chain attacks, and this isn’t the first time we have seen attacks including counterfeit components.
Discovery of yet another family of counterfeit components, especially after “discord.dll” and other Sonatype-discovered malware had already made headlines, speaks to the damage that is possible to your software supply chain if adequate protections are not in place.
Sonatype’s timeline related to the malicious package’s discovery and reporting is as follows:
- November 27th, 2020: Suspicious package “jdb.js” is picked up by our automated malware detection system within a day of its publication to npm registry. While manually analyzing the package, another package “db-json.js” by the same author is discovered.
Although suspicious components can be automatically quarantined, our Security Research team immediately adds both packages to our data, assigning them identifier(s): sonatype-2020-1168.
- November 27th, 2020: npm security team is notified the same day of malicious packages. Note: the day of this report fell over the Thanksgiving holiday weekend.
- November 30th, 2020: npm security team removes “jdb.js” (advisory) and “db-json.js” (advisory).
- December 1st, 2020: Public disclosure via this blog post.
Based on the visibility we have, no Sonatype customers have downloaded either of these packages, and our customers remain protected against such counterfeit components.
Sonatype’s world-class open source intelligence, which includes our automated malware detection technology, safeguards your developers, customers, and software supply chains from infections like these.
If you're not a Sonatype customer and want to find out if your code is vulnerable, you can use Sonatype's free Nexus Vulnerability Scanner to find out quickly.
Visit the Nexus Intelligence Insights page for a deep dive into other vulnerabilities like this one or subscribe to automatically receive Nexus Intelligence Insights hot off the press.
Indicators of Compromise (IOCs):
This is not an exhaustive list of IOCs. Other njRAT samples exist in the wild.
URLs and IPs: