Fact-checked by Grok 2 weeks ago

njRAT

njRAT, also known as Bladabindi, is a remote access () written in .NET that targets Windows , enabling attackers to gain unauthorized over infected machines for purposes such as , , and manipulation. First identified in the wild in 2012 with samples dating back to late that year, it was developed and maintained by Arabic-speaking cybercriminals active in underground forums, facilitating its proliferation through shared and builder tools. The malware's core functionality includes a client-server where the server component runs silently on the victim’s device, establishing persistence via registry modifications or scheduled tasks, while the client provides the attacker with a graphical for issuing commands. Key capabilities encompass keylogging, file management (upload/download/deletion), registry editing, webcam and microphone access for live feeds, remote desktop viewing, and password credential harvesting from browsers and applications. Advanced variants have incorporated destructive features like (MBR) wiping to render systems unbootable, escalating its potential for ransomware-like or targeted disruption. Despite its origins in cybercrime forums, njRAT has been leveraged in state-sponsored operations and widespread campaigns, including attacks on Middle Eastern government entities and more recent incidents targeting organizations. Its accessibility—often distributed via emails, malicious downloads from torrents or webhards, and social engineering—has made it a staple for both amateur hackers and advanced persistent threats, contributing to its enduring prevalence over a decade. The tool's , including 64-bit support and evasion techniques against antivirus detection, underscores its adaptability, though firms continue to track and mitigate its variants through behavioral analysis and signatures.

Origins and Development

Initial Discovery and Release

njRAT, also known as Bladabindi, is a remote access (RAT) that was first observed in in 2012. The earliest known samples of the date back to November 2012, indicating its initial circulation among cybercriminals during that period. Public identification by security researchers occurred in June 2013, marking the point when it gained broader awareness in threat intelligence reports. The was developed as a customizable toolkit for remote system control, initially distributed through underground forums frequented by Arabic-speaking actors. These forums provided ongoing support, including leaks and builder tools, facilitating its rapid adoption and evolution from version 0.6d onward. Unlike commercial RATs, njRAT's release emphasized simplicity and affordability, appealing to novice operators in regions with limited cybersecurity infrastructure. Early variants focused on basic remote access features, such as keylogging and file manipulation, without the advanced evasion techniques seen in later iterations. Its open availability on these platforms contributed to widespread use in targeted attacks, particularly against Middle Eastern entities, though global distribution followed shortly after discovery. Security analyses from that era highlighted its origins, underscoring a straightforward implementation that prioritized functionality over stealth.

Developers and Regional Associations

njRAT was initially developed in 2012 by the hacking group known as "M38dHhM," which has been linked to its creation and early distribution through Arabic-language hacking forums. The malware's and builder tools were shared on these forums, enabling rapid customization and proliferation among users fluent in but not necessarily in English-dominated ecosystems. Development support has continued via community contributions on such platforms, where Arabic-exclusive discussions facilitate entry for regional actors lacking advanced technical resources. The tool's origins trace to Arabic-speaking developers, with attributions to pseudonyms like "Hacker Joker 1337" in reports, underscoring its grassroots emergence from Middle Eastern cyber forums rather than state-sponsored entities. Unlike more sophisticated APT tools, njRAT's open-source nature and GUI-based builder democratized its use, attracting script kiddies and small-scale operators over elite groups. No verified individual identities beyond forum handles have been publicly confirmed by cybersecurity firms, reflecting the pseudonymous culture of these communities. Regionally, njRAT is predominantly associated with cybercriminals operating in the , where it has fueled attacks on government agencies, organizations, and infrastructure in Arabic-speaking nations such as those in the and Gulf regions. Its prevalence stems from cultural and linguistic alignment, with campaigns often leveraging geopolitical lures tailored to regional conflicts, as seen in distributions targeting and interests since at least 2012. While not exclusively tied to any single country, usage patterns indicate heavy adoption by actors in , , and surrounding areas, including hack-for-hire services popular in the Arab cybercrime underground. This regional dominance contrasts with global RATs like , as njRAT's Arabic interface and forum support limit broader appeal outside Middle Eastern networks.

Technical Architecture

Core Framework and Components

njRAT is constructed as a .NET Framework assembly, primarily coded in C#, which leverages the for execution on Windows hosts, enabling features like and managed code execution. The core architecture follows a client-server paradigm, with the server component (deployed on the infected system) functioning as a persistent listener that connects outbound via to the attacker's client , typically on a configurable such as 18801 or custom values set during compilation. This setup facilitates remote command issuance without requiring inbound exceptions on the victim side, as the connection is initiated by the . Central to the framework is a mutex mechanism, implemented via classes like OK.RC, to enforce single-instance execution and prevent resource conflicts from multiple infections; the mutex name is often a unique hash or identifier, such as "49e91d08e684b1770e0cefa60401157a". Persistence is achieved through multifaceted methods, including registry modifications under HKCU\Software\Microsoft\Windows\CurrentVersion\Run keys tied to the mutex name, file copies to directories like %TEMP%\svchost.exe, %AppData%\services64.exe, C:\Windows\Microsoft system.exe, or startup folders, and USB propagation via autorun.inf files. Additional evasion includes netsh commands to exclude C2 traffic from firewall rules and static variables for encoded strings like base64 "HacKed" for versioning. The command processing core revolves around a dedicated thread spawned post-connection, which parses delimited instructions (e.g., separated by "|’|’|") from the C2 server, including system reconnaissance ("inf" for OS/user details), process management ("proc"), and plugin execution ("inv"/"ret"). Keylogger functionality employs Windows API calls like GetAsyncKeyState from User32.dll at 1ms intervals, storing logs in temporary files or registry keys under the mutex namespace before exfiltration via "kl" commands. Modular extensibility supports dynamic payload downloads ("rn"/"up") and injections, with self-protection features monitoring and terminating analysis tools (e.g., taskmgr.exe, processhacker.exe) while disabling user interfaces for process termination.

Communication and Control Mechanisms

njRAT establishes command-and-control () communications via socket connections to a server address and embedded in its , such as ports 2222, 5552, or 14817. The malware initiates contact using .NET's TcpClient class, sending initial system details like the Base64-encoded volume and computer name to identify the infected host. The custom protocol operates over these TCP streams without encryption, relying on Base64 encoding for obfuscation and a specific delimiter string "|'|'|" to separate commands, parameters, and responses within data buffers. Commands received from the C2 server trigger actions such as process execution (proc), keylogging (kl), screen capture (CAP), plugin invocation (inv), file management (Ex fm), or password retrieval (ret), with results transmitted back in encoded format. Exfiltrated data, including screenshots, keylogs, and credentials, is often sent byte-by-byte or as compressed ZIP streams to minimize detection. Variants adapt this mechanism for evasion; for instance, some samples query via HTTP for second-stage payloads or configurations, decoding them through methods like standard , reversed Base64, conversion, or decompression after URL fetches from shortened links. A variant reported in March 2025 instead routes traffic through Dev Tunnels, exploiting the service's legitimate secure proxying of local ports to the internet for bidirectional command exchange and data theft. Additional features include WebClient usage for supplementary downloads, such as updates prefixed with "MSG" in responses, and plugin delivery (PLG) or execution (Ex) to extend capabilities dynamically. This flexible, socket-driven architecture enables persistent remote control, with C2 endpoints often hosted on services like DuckDNS or ngrok for resilience against takedowns.

Capabilities and Features

Remote Access Functions

njRAT enables attackers to remotely control infected Windows machines through a on the control server, facilitating real-time interaction with the victim's system. Core remote access features include desktop viewing, which streams the victim's screen to the attacker for monitoring activities, and screenshot capture, allowing periodic or on-demand grabs of the display contents. Attackers can execute commands remotely, running arbitrary instructions to manipulate the , such as launching applications or altering configurations. management capabilities permit starting, stopping, or terminating processes, enabling or disruption of software. Registry editing allows modifications to keys, potentially for evasion or setup. File operations support uploading, downloading, and deleting files, providing a remote for data theft or deployment. Keylogging records all keystrokes, capturing credentials and sensitive inputs transmitted back to the attacker. access includes and control, enabling video/audio without user detection. These functions operate over command-and-control channels, often using connections to a specified and , with configurable via startup registry entries or scheduled tasks.

Data Collection and Manipulation Tools

njRAT employs keylogging mechanisms to capture all keystrokes on infected systems, allowing attackers to obtain passwords, usernames, and other sensitive inputs entered by victims. It also supports remote capture, providing visual snapshots of the and applications in use for purposes. access enables unauthorized video surveillance, while theft targets data stored in browsers such as details and . System information, including OS version, username, and hardware details, is collected during initial infection for reconnaissance and command-and-control () registration. In terms of manipulation, njRAT facilitates file operations such as uploading, downloading, and deleting files, which support or the deployment of secondary payloads. Registry edits establish by adding entries under keys like HKEY_CURRENT_USER\Software\[Microsoft](/page/Microsoft)\Windows\CurrentVersion\Run and enable evasion by disabling monitoring tools. Process manipulation includes terminating security-related executables (e.g., antivirus processes) and self-protection mechanisms that induce system crashes if termination is attempted. Remote shell execution permits arbitrary command issuance, further extending control over the host environment. These tools operate via communication, often over , with exfiltrated data packaged for transmission to attacker servers.

Deployment Methods

Common Infection Vectors

njRAT primarily infects systems through campaigns involving malicious email attachments, such as documents that leverage embedded scripts or macros to download and execute the . These attachments often masquerade as legitimate invoices or updates to entice users into enabling content execution. Drive-by downloads from compromised or malicious websites represent another frequent , where visiting infected pages triggers the automatic retrieval of njRAT executables without interaction beyond initial . The also propagates via trojanized applications, particularly pirated or unofficial software installers distributed through torrents, file-sharing platforms like webhards, and gaming-related downloads. For instance, fake variants, such as "Eaglercraft 1.12 Offline," bundle njRAT with seemingly functional game launchers that establish persistence through registry modifications while distracting victims with gameplay. In targeted environments, infected USB drives facilitate offline spread, allowing the trojan to execute upon insertion and connection to a host machine. These methods exploit user trust in familiar file types and sources, with operators often customizing payloads for specific regional or linguistic audiences.

Distribution Channels

njRAT has been distributed via peer-to-peer file-sharing networks, particularly torrents, where it is embedded in pirated game installers such as Survival: Z-Unleashed and Hundred Days – Winemaking Simulator, often as a malicious DLL file like vxrlib86.dll hidden in game data folders. Webhard services, popular cloud storage platforms in regions like South Korea, have hosted compressed archives (e.g., LostRuins.zip) containing njRAT loaders disguised as executable game files, such as Lostruins.exe, targeting users seeking free software downloads. Exploit kits represent another vector, with njRAT serving as an initial in campaigns like the Lord Exploit Kit, which exploited vulnerabilities (e.g., CVE-2018-15982) delivered through on networks such as PopCash and compromised websites. These kits redirect users via obfuscated URIs (e.g., ngrok-hosted endpoints) to exploit-laden landing pages, facilitating drive-by infections without user interaction beyond visiting the site. Social engineering lures, including fraudulent websites mimicking online meeting platforms like , , and , have propagated njRAT by prompting downloads of seemingly legitimate installers that execute the upon execution. Additionally, njRAT appears in malicious software bundles, such as downloaders disguised as proxy scrapers hosted on Pastebin-linked URLs, which fetch and install the alongside tools like Simple+Scraper.zip. In targeted campaigns, njRAT has been spread through industry-specific documents, such as aviation-themed lures delivering the via email attachments. It is also bundled with other threats, including miners, in fake circumvention tools like VPNs distributed to evade regional restrictions. These methods leverage the RAT's availability on underground forums, where builders are customized and shared for broad deployment.

Notable Attacks and Usage

Early Campaigns (2012–2015)

njRAT, a remote access developed by Arabic-speaking actors, first emerged in late 2012, with malware samples traced to November of that year and initial public detection occurring in June 2013. Early versions were distributed through forums and exploited basic vectors such as malicious attachments and drive-by downloads, primarily targeting Windows systems in the . The tool's Arabic-language interface and customizable features facilitated its adoption among regional cybercriminals and hacktivists for , keylogging, and . In 2013, njRAT featured prominently in campaigns against Middle Eastern energy and government sectors, where attackers used it to compromise victim machines, propagate laterally within networks, and maintain persistent access for or disruption. These operations often involved spear-phishing with region-specific lures, reflecting the malware's grassroots development and focus on local threats rather than sophisticated state-sponsored tactics. By mid-2014, njRAT campaigns had proliferated, heavily relying on services like for command-and-control (C2) infrastructure to evade detection and enable rapid reconfiguration. Microsoft's June 2014 court-ordered seizure of 22 domains significantly disrupted these activities, as the service hosted servers for numerous njRAT instances, affecting thousands of infected systems and forcing operators to migrate to alternative hosts. Despite the setback, evidence of resumed operations by late 2014 indicated the malware's resilience, with attackers adapting through new setups and continued forum-based sharing, underscoring its role as a persistent tool in low-barrier cyber operations during this period.

Recent Incidents (2023–2025)

In early 2023, the Earth Bogle campaign distributed NjRAT via emails and lures themed around Middle Eastern geopolitics, targeting entities in the . Attackers used malicious Microsoft Cabinet (CAB) files disguised as audio recordings of sensitive discussions, hosted on public cloud services like files.fm and failiem.lv, as well as compromised web servers. Execution involved a dropper that retrieved a loader to inject NjRAT into memory, enabling remote access and . By October 2023, NjRAT detections surged globally, ranking second on Research's monthly most wanted list, with increased propagation through malicious attachments and file-sharing services. This rise highlighted NjRAT's ongoing adaptability in operations despite its age. In February 2025, cybersecurity researchers identified a NjRAT variant abusing Dev Tunnels—a legitimate tool for secure local service exposure—for command-and-control () communications via ephemeral URLs like nbw49tk2-25505.euw.devtunnels.ms. Samples such as dsadasfjamsdf. (SHA256: 0b0c8fb59db1c32ed9d435abb0f7e2e8c3365325d59b1f3feeba62b7dc0143ee) featured USB autorun propagation, registry-based persistence, and bypass capabilities, affecting general Windows users without sector-specific targeting. On August 18, 2025, reported a distribution campaign masquerading NjRAT as a browser-based game, exploiting user interest tied to an upcoming . Infected executables granted attackers full , including , and hijacking, file theft, and anti-analysis measures like crashing sandboxes upon detection of security tools.

Detection and Mitigation

Indicators of Compromise

Indicators of compromise (IoCs) for njRAT include hashes, mechanisms, artifacts, and behavioral signatures that tools can monitor to detect infections. These vary across versions and campaigns, as attackers frequently obfuscate samples, but common patterns emerge from analyzed specimens. For instance, hashes such as SHA256 79870d97f8b51763d001c7935c895589c6f29573b45a0c98da4c430c7f676937 have been tied to njRAT payloads. Similarly, a99198757eb9c7f3d031a1224cbc9255 and f08373c82fb240e8ffc00d60f759f8731809c970 correspond to confirmed samples. Persistence often involves registry modifications, such as entries under HKLM\SOFTWARE\WOW6432Node\[Microsoft](/page/Microsoft)\Windows\CurrentVersion\Run or HKU\S-1-5-21-...\SOFTWARE\[Microsoft](/page/Microsoft)\Windows\CurrentVersion\Run with randomized values like 84936d0927c52cbf1a9c1029911fc028. Executables may drop to paths including C:\Users\*\AppData\Local\Temp\system.exe or startup folders like C:\Users\Administrator\AppData\Roaming\[Microsoft](/page/Microsoft)\Windows\[Start Menu](/page/Start_menu)\Programs\Startup\. Behavioral indicators encompass firewall rule additions via commands like netsh firewall add allowedprogram "C:\Users\admin\AppData\Local\Temp\system.exe" "system.exe" ENABLE to enable outbound connections. Network IoCs feature command-and-control (C2) communications to domains such as capeturk.com, bank.capeturk.com, or sequential subdomains like 1111.elitfilmizle.com through 9999.elitfilmizle.com. Additional hashes linked to these infrastructures include SHA256 values like f96417ac25a982029d005a9b78810d8094957d899f022d4094428cb531427b86 and ea7031e622e25a3c124536c6891a2837. Detection can leverage rules targeting strings such as "get_Registry" or hex patterns like {24 65 66 65 39 65 61 64 63 2D 64 34 61 65 2D 34 62 39 65 2D 62 38 61 62 2D 37 65 34 37 66 38 64 62 36 61 63 39}, requiring multiple matches for specificity; specialized memory-detection rules from sources like JPCERT/CC also exist. Comprehensive feeds, such as those aggregating over 12,000 IoCs up to October 2025, emphasize monitoring for dynamic artifacts beyond static hashes due to njRAT's evolution.

Security Tools and Responses

Microsoft Defender Antivirus employs behavioral heuristics to detect njRAT variants, classifying them under designations such as , which targets .NET-based remote access activities. Malwarebytes similarly identifies infections as Backdoor.NJRat, focusing on background processes that facilitate and . Endpoint detection and response (EDR) solutions counter njRAT by monitoring for anomalous behaviors, including unauthorized access attempts, file modifications in temporary directories (e.g., C:\Users*\AppData\Local\Temp), and registry alterations for persistence such as entries under HKLM\SOFTWARE\WOW6432Node\Run. Open-source tools like Wazuh, paired with Sysmon for event logging and for , provide rule-based detection of njRAT indicators; examples include alerts for netsh commands enabling exceptions ("netsh firewall add allowedprogram") and outbound network connections to command-and-control servers. Wazuh rules (e.g., IDs 100201–100208) trigger on file drops, process executions, and persistence attempts, with scans targeting strings like those in njRAT binaries for proactive file analysis in folders such as Downloads. Upon detection, immediate isolation of compromised systems prevents further command execution or data theft, followed by comprehensive scans using multiple antivirus engines to excise the . Manual remediation involves deleting dropped files (e.g., via hashes like SHA256: 79870d97f8b51763d001c7935c895589c6f29573b45a0c98da4c430c7f676937), removing registry keys and startup entries, and verifying no secondary payloads like have been deployed. Automated active responses in platforms like Wazuh can invoke scripts to and delete YARA-matched files in real-time, while network firewalls should enforce rules blocking outbound traffic on configurable njRAT ports, often leveraging non-standard protocols to evade standard filtering. Broader emphasizes layered controls: enforcing software patches to close vectors, conducting user awareness training against vectors, and maintaining offline backups to counter data manipulation or wiper capabilities in advanced variants.

Variants and Evolutions

Version History

njRAT was first observed in November 2012, with public reports emerging by June 2013. Early iterations functioned as a .NET-based remote access , offering core capabilities such as keystroke capture, access, file theft, and command execution over customizable ports. These initial releases, developed by Arabic-speaking authors and distributed via underground forums, emphasized simplicity and a for operators. Subsequent versions introduced incremental enhancements for persistence, evasion, and payload delivery. For instance, version 0.6.4, documented in sample analyses, supported USB and basic anti-analysis techniques. By the late , version 0.7d became prevalent, featuring improved stability, support for extended modules, and "editions" like Green Edition tailored for specific campaigns, as observed in 2020 reports. This version maintained while adding features such as for command-and-control (C2) resilience. Later variants, including those labeled 0.11g and 0.12g in sample collections, incorporated backdoored stubs connecting to external servers for unauthorized control, reflecting community modifications and risks in shared builds. njRAT has undergone multiple revisions to counter detection, with 2023 samples demonstrating master boot record (MBR) wiping for destructive effects beyond typical RAT functions. As of March 2025, a variant exploited Microsoft Dev Tunnels for C2 communications, evading traditional network monitoring by leveraging cloud services. Despite its age, the malware's open-source nature and forum sales sustain its evolution through user-contributed adaptations rather than formal release cycles.

Modern Adaptations and Sharing

In recent years, njRAT variants have incorporated advanced command-and-control () infrastructures to evade detection, including the use of Dev Tunnels for communications, which allows attackers to tunnel traffic through legitimate services and bypass traditional rules. This adaptation, observed in samples reported as of March 2025, demonstrates njRAT's evolution from basic TCP-based to exploiting tools for persistence and stealth. njRAT's source code and builders for versions up to 0.7d remain widely shared on public repositories such as , where users can access full editions alongside utilities for , , antivirus bypass, and custom generation. These repositories enable rapid customization, contributing to the malware's adaptability and proliferation among novice and sophisticated threat actors alike, as the open availability lowers barriers to modification and deployment. Sites hosting njRAT editions, such as those distributing tools, further facilitate sharing by providing pre-configured packages that integrate modern evasion techniques like string and dynamic resolution. This free dissemination model, rooted in njRAT's origins as a community-developed tool, sustains its relevance despite its age, with variants continuing to appear in campaigns leveraging updated infection vectors.

Impact and Attribution

njRAT, also known as Bladabindi, has been extensively utilized in operations due to its availability as leaked on forums since around , enabling attackers to customize it for , keylogging, credential theft, and . Cybercriminals have distributed trojanized versions of popular tools—such as crackers and exploit —via forums, infecting other malicious actors who deploy them, with identifying nearly 1,000 njRAT samples compiled daily in one such campaign active as of early 2020. These operations often involve command-and-control () servers hosted on compromised sites or actor-controlled infrastructure, facilitating DDoS attacks, precursors, and financial . The 's commodity status complicates attribution, as its Arabic-language origins and open-source nature have led to adoption by diverse threat beyond pure , including those with motives. For instance, the Pakistan-linked Gorgon Group has employed njRAT in hybrid campaigns blending (e.g., credential harvesting for resale) with targeted against entities, as observed in operations reported in 2018. Similarly, UAC-0057, a pro-Russian cluster, integrated njRAT as a second-stage payload following PicassoLoader in attacks against Ukrainian targets via malicious XLS files, with activity detected in July 2023. State-aligned groups have also leveraged njRAT for persistent access in geopolitical contexts. APT-C-36 (tracked as Blind Eagle), attributed through shared tactics, techniques, and procedures (TTPs) like multi-stage droppers and Colombian ISP-linked domains, deployed njRAT in spear-phishing campaigns impersonating judicial entities to target Colombian organizations from December 2022 to February 2023. These attributions rely on forensic indicators such as file hashes (e.g., : 4a69b0a3796dd688d57e11658ac1058c) and infection chains involving objects leading to njRAT execution, though the malware's widespread use underscores the limitations of tool-based linking alone. Overall, njRAT's persistence stems from its low barrier to entry, bridging opportunistic crime with targeted intrusions across regions like the , , , and .

Broader Geopolitical Context

njRAT's deployment has been intertwined with geopolitical tensions in , particularly the longstanding rivalry between and , where it serves as a tool in asymmetric operations targeting , diplomatic, and sectors. Pakistani-affiliated (APT) groups, such as Transparent Tribe (also known as APT36), have frequently employed njRAT variants in campaigns exploiting events like the and terror incidents to phish Indian targets, including government officials and defense personnel, as evidenced by lures mimicking or emotional appeals to regional disputes. These activities align with a pattern of tit-for-tat intrusions between the two nations since the early , where njRAT's accessibility enables non-state or actors to conduct without advanced resources, blurring lines between and state-aligned aggression. In the , njRAT has facilitated amid sectarian and interstate conflicts, with campaigns targeting government and energy entities in countries like those in the Gulf region, often leveraging the malware's capabilities for and . Its prevalence in this area stems from its open-source nature and tutorials available online, making it a preferred for regional actors conducting operations that coincide with geopolitical flashpoints, such as proxy conflicts or territorial disputes. While direct attribution to state intelligence services remains challenging due to the malware's widespread commercial availability, technical indicators like command-and-control infrastructure and operational timing link many instances to actors aligned with national interests in unstable regions. Overall, njRAT exemplifies how commodity democratizes cyber threats, allowing mid-tier actors in geopolitically volatile areas to pursue goals that mirror conventional , though cybersecurity analyses from firms like CYFIRMA and emphasize that such tools often evade strict state control, complicating international accountability under frameworks like those in the UN's articles. This dynamic underscores a shift toward , where non-attributable intrusions amplify tensions without escalating to kinetic conflict, as seen in synchronized campaigns during diplomatic standoffs.

References

  1. [1]
    What is NJRat Malware? - Check Point Software Technologies
    also known as Bladabindi — is a remote access trojan (RAT) that was first discovered in the wild in 2012 ...Missing: history | Show results with:history
  2. [2]
    Trojan:MSIL/NjRat.A threat description - Microsoft Security Intelligence
    Jan 7, 2020 · Trojan:MSIL/NjRat.A is a detection variant for the infamous NjRAT family remote access trojan (RAT) that is attributed to Windows but can ...
  3. [3]
    NJRat - NJCCIC
    NJRat is a remote access trojan (RAT), first spotted in June 2013 with samples dating back to November 2012. It was developed and is supported by Arabic ...Missing: history capabilities
  4. [4]
    More Than Just a RAT: Unveiling NjRAT's MBR Wiping Capabilities
    Oct 31, 2023 · The Splunk Threat Research Team (STRT) provides a deep-dive analysis of NjRAT (or Bladabindi), a Remote Access Trojan (RAT) discovered in ...Missing: history | Show results with:history
  5. [5]
    njRAT Malware Analysis, Overview by ANY.RUN
    njRAT, also called Bladabindi and Njw0rm is a remote access trojan that is used to remotely control infected machines. Follow live malicious statistics of ...Missing: history | Show results with:history
  6. [6]
    PicassoLoader and njRAT Detection: UAC-0057 Hackers Perform a ...
    Jul 7, 2023 · Researchers issue a heads-up covering a new targeted cyber attack by the UAC-0057 group against Ukrainian public officials leveraging XLS files that contain a ...Missing: credible | Show results with:credible
  7. [7]
    njRAT Being Distributed through Webhards and Torrents - ASEC
    Jun 7, 2021 · njRAT is a RAT malware that can perform various malicious activities after receiving commands from the attacker. Because it provides various ...Missing: capabilities | Show results with:capabilities
  8. [8]
    January 2023's Most Wanted Malware: Infostealer Vidar Makes a ...
    Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a leading provider of cybersecurity solutions globally, has published its Global Threat Index for.
  9. [9]
    Trojan:Win64/NjRat.NEBG!MTB threat description - Microsoft
    Jan 10, 2023 · Trojan:Win64/NjRat.NEBG!MTB is an advanced 64-bit variant of the NjRAT remote access trojan, which is a threat that was first reported in ...
  10. [10]
    njRAT, Software S0385 - MITRE ATT&CK®
    Jun 4, 2019 · njRAT. njRAT is a remote access tool (RAT) that was first observed in 2012. It has been used by threat actors in the ...Missing: date | Show results with:date
  11. [11]
    BlackBerry Prevents: njRAT Malware
    May 8, 2021 · njRAT, also known as Bladabindi, is a remote access Trojan (RAT) which was first discovered in 2012. This tool was developed by a threat actor group.
  12. [12]
    BlackBerry Blog Threat Thursday: Don't Let njRAT Take Your Cheddar
    Aug 5, 2021 · njRAT, also known as Bladabindi, is a remote access Trojan (RAT) used in attacks targeting organizations in Middle Eastern countries.Missing: discovery | Show results with:discovery
  13. [13]
    [PDF] Cyber Threat Intelligence Advisory - KPMG International
    NJRAT (aka Bladabindi or Lime-Worm) is a sophisticated Remote. Access Trojan (RAT) created in 2012 by the hacking group. "M38dHhM." The latest variants, NJRAT ...Missing: associations | Show results with:associations
  14. [14]
    Life after the apocalypse for the Middle Eastern NJRat campaign
    Aug 14, 2015 · Nearly a year after the Microsoft takedown of Vitalwerks' dynamic DNS service No-IP, the NJRat malware campaign has re-spawned and has ...
  15. [15]
    NjRat (Virus Removal Guide) - Free Instructions - 2-Spyware.com
    May 4, 2020 · njRat is a multi-functional Remote Access Trojan that can log keystrokes and disable anti-malware software on the host machine.
  16. [16]
    Unmasking NJRat: A Deep Dive into a Notorious Remote Access ...
    Nov 20, 2023 · NjRAT is a type of malware that allows a remote actor to gain control of an infected computer system.
  17. [17]
    njRAT — Malware Analysis - Hido Cohen - Medium
    Malware Analysis njRAT (a.k.a Bladabindi) is a .NET Framework assembly used as Remote Access Tool which allows remote attacker to ...
  18. [18]
    Just another analysis of the njRAT malware – A step-by-step approach
    Nov 30, 2021 · njRAT (Bladabindi) is a .NET RAT (Remote Access Trojan) that allows attackers to take control of an infected machine.Missing: components | Show results with:components
  19. [19]
    The Rat Is Back — Our Latest njRat sample analysis - LMNTRIX Blog
    Aug 30, 2024 · njRAT (also known as Bladabindi) is a sophisticated Remote Access Trojan (RAT) that is primarily coded in Visual C# or .NET.Missing: framework | Show results with:framework
  20. [20]
    Decoding njRAT traffic with NetworkMiner - Netresec
    Apr 28, 2025 · I investigate network traffic from a Triage sandbox execution of njRAT in this video. The analysis is performed using NetworkMiner in Linux ...
  21. [21]
    njRAT Spreading Through Active Pastebin Command and Control ...
    Dec 9, 2020 · Malware authors have been leveraging njRAT (AKA Bladabindi), a Remote Access trojan, to download and deliver second-stage payloads from ...Missing: architecture core
  22. [22]
    Latest Njrat variant uses Microsoft Dev Tunnels for C2 communications
    Mar 6, 2025 · A new variant of the NjRAT malware has been reported in the wild. NjRAT (also known as Bladabindi or Ratenjay) is an older but still widely used Remote Access ...Missing: M38dHhM | Show results with:M38dHhM
  23. [23]
    njRAT Malware: Remote Access Trojan Overview - Hunt.io
    njRAT (also Bladabindi) is a remote access trojan (RAT) that allows attackers to control infected Windows machines.Missing: discovery date
  24. [24]
    Trojan:Win32/NjRat threat description - Microsoft Security Intelligence
    Apr 19, 2019 · This trojan is a generic detection for the remote access trojan (RAT), njRAT. NjRat has basic backdoor features along with information-stealing capabilities.
  25. [25]
    nJRAT Report: Bladabindi - All-in-One Cybersecurity Platform - Cynet
    njRAT is a variant of jRAT, which is also called Bladabindi; it is a remote access trojan used to control infected machines remotely.Missing: date | Show results with:date
  26. [26]
    njRAT Malware Analysis. Introduction | by Aaron Stratton
    Oct 7, 2022 · njRAT (AKA Bladabindi) is described as a remote access trojan (RAT) has capabilities to log keystrokes, access the victim's camera, steal credentials stored in ...
  27. [27]
    Leveraging Microsoft Office Documents to Deliver Agent Tesla and ...
    Oct 3, 2022 · FortiGuard Labs discovered malicious Microsoft Office documents attempting to leverage legitimate websites to execute a shell script and ...
  28. [28]
    Fake Minecraft Game Spreads NjRat Malware - Point Wild
    Aug 11, 2025 · What are the Common Attack Vectors? NjRat is usually delivered via: Attack Vector, Description. Phishing Emails, Malicious attachments or links ...
  29. [29]
    Say hello to Lord Exploit Kit | Malwarebytes Labs
    Aug 2, 2019 · The initial payload was njRAT, however the threat actors switched it ... Thousands of online stores at risk as SessionReaper attacks spread.
  30. [30]
    RATs Distributed Through Skype, Zoom, & Google Meet Lures
    Mar 5, 2024 · Zscaler's ThreatLabz discovered a threat actor creating fraudulent Skype, Google Meet, and Zoom websites to spread malware.Missing: cybersecurity | Show results with:cybersecurity
  31. [31]
    APT attacks on industrial companies in H2 2021
    Feb 28, 2022 · This summary provides an overview of APT attacks on industrial enterprises disclosed in H2 2021 and related activity of groups that have been observed ...
  32. [32]
    Cybercriminals are distributing a miner disguised as a ... - Kaspersky
    Mar 5, 2025 · An unprotected device is vulnerable to malware families like NJRat, XWorm, Phemedrone, and DCRat, which have been commonly spread alongside such ...
  33. [33]
    Exploring the Cybercrime Underground: Part 3 – Into the RAT Nest
    Jan 26, 2017 · The malware we observed on this infrastructure was almost uniquely commodity RATs including DarkComet, DarkTrack, LuminosityLink, NJRAT ... spread ...
  34. [34]
    Remote access trojan targets Middle East-based energy ... - SC Media
    Jul 2, 2013 · Attackers are using malware, called "njRAT," to hijack victims' computers and spread to others in the organization.Missing: 2012-2015 | Show results with:2012-2015
  35. [35]
    Trailing the Trojan njRAT | McAfee Blog
    One Trojan that just won't go away is the remote access tool njRAT. Microsoft recently took down a leading domain associated with the malware, but that.
  36. [36]
    Gone fubar: Microsoft nukes No-IP, gets fallout | Kaspersky official blog
    Jul 2, 2014 · ... NJrat) and Jenxcus (aka NJw0rm), Microsoft enforced a federal court ... July 2, 2014. Tips. Tips · Messaging app privacy: 2025 rankings.
  37. [37]
    Earth Bogle Campaign Unleashes NjRAT Trojan on Middle East and ...
    Earth Bogle Campaign Unleashes NjRAT Trojan on Middle East and North Africa. Jan 18, 2023 Ravie LakshmananCyber Threat / Malware. NjRAT Trojan.
  38. [38]
    October 2023's Most Wanted Malware - Check Point Blog
    Nov 8, 2023 · October 2023's Most Wanted Malware: NJRat Jumps to Second Place while AgentTesla Spreads through new File Sharing Mal-Spam Campaign.Missing: early | Show results with:early
  39. [39]
    Njrat Campaign Using Microsoft Dev Tunnels - SANS ISC
    Feb 27, 2025 · This is a service that allows developers to expose local services to the Internet securely for testing, debugging, and collaboration.
  40. [40]
    Njrat Exploits Microsoft Dev Tunnels for C2 Communication
    Mar 3, 2025 · A new campaign involving the notorious remote access trojan (RAT) Njrat has been uncovered, leveraging Microsoft's Dev Tunnels service.
  41. [41]
    njRAT masquerades as browser-based Minecraft Game
    njRAT masquerades as browser-based Minecraft Game ... This campaign highlights how popular cultural events are leveraged to increase malware distribution ...
  42. [42]
    Detecting njRAT malware with Wazuh
    Aug 17, 2023 · njRAT is a remote access trojan (RAT) designed to allow an attacker remotely control an infected Windows endpoints.
  43. [43]
    None
    ### njRAT Indicators of Compromise Summary
  44. [44]
    MalwareBazaar | Njrat (YARA rule) - Abuse.ch
    This page shows some basic information the YARA rule Njrat including corresponding malware samples.
  45. [45]
    ThreatFox | NjRAT - Abuse.ch
    Indicators Of Compromise. The table below shows all indicators of compromise (IOCs) that are associated with this particulare malware family (max 1000).
  46. [46]
    Trojan:MSIL/njRAT!rfn threat description - Microsoft Security Intelligence
    ### Summary of Microsoft Detection and Prevention of njRAT Variants
  47. [47]
    Backdoor.NJRat
    Backdoor.NJRat is a Remote Access Trojan (RAT) application that may run in the background and silently collect information about the system, connected users, ...Missing: developer M38dHhM
  48. [48]
    What is NJRat Malware? A Step-by-Step Guide to Protecting Your ...
    Oct 15, 2024 · With the increasing advancement of technology, cyber attacks have become a growing concern for individuals and organizations alike.Missing: architecture | Show results with:architecture
  49. [49]
    Non-Standard Port, Technique T1571 - Enterprise | MITRE ATT&CK®
    Mar 14, 2020 · Adversaries may make changes to the standard port used by a protocol to bypass filtering or muddle analysis/parsing of network data. Adversaries ...<|control11|><|separator|>
  50. [50]
    NjRat 2.3D Pro Edition Shared on GitHub: A Growing Cybersecurity ...
    Dec 27, 2024 · Mitigation Strategies · Endpoint Security Solutions: Deploy advanced endpoint protection tools capable of detecting and neutralizing RATs.
  51. [51]
    njRAT Rising – The Increase in Activity of the Remote Access Trojan
    Oct 27, 2020 · 'njRAT', also known as 'Bladabindi' or 'Njw0rm', is a prevalent remote access trojan (RAT) threat, used to target victims in the Middle ...
  52. [52]
    Bladabindi Remains A Constant Threat By Using Dynamic DNS ...
    Nov 30, 2016 · The Fortinet research team has been developing a industrial-grade analysis system that allows us to concentrate information from samples ...
  53. [53]
    lexisxs/njRAT-All-Versions - GitHub
    NjRAT is a Remote Administration Tool. This repository contains a Njrat Editions. - lexisxs/njRAT-All-Versions.
  54. [54]
    njRAT Remote Access Trojan - NHS England Digital
    Aug 7, 2018 · njRAT (also known as Bladabindi) is a .NET-based remote access trojan that has undergone multiple revisions to improve its capability.
  55. [55]
    YUNIWORLS/NJRAT-All-Versions - GitHub
    Here you will find all versions of NJRAT along with various tools related to anti-virus bypass, encryption, decryption, obfuscation, and more.<|control11|><|separator|>
  56. [56]
    njrat official website
    NjRAT is a Remote Administration Tool. This repository contains a Njrat Editions.Missing: history adaptations
  57. [57]
    njRAT Malware Analysis. 1. Overview | by Wahba Kamaluddin
    Feb 1, 2025 · njRAT is a remote access tool (RAT) with a graphical user interface (gui) that allows the operator to hijack victim's machine for keylogging, screenshot ...<|separator|>
  58. [58]
    Who's Hacking the Hackers: No Honor Among Thieves - Cybereason
    Feb 3, 2020 · Cybereason Nocturnus is investigating a campaign where attackers are trojanizing multiple hacking tools with njRat, a well known RAT.<|control11|><|separator|>
  59. [59]
    Pakistan-linked Gorgon Group found engaging in both cybercrime ...
    Aug 3, 2018 · Phishing Attack - The worst hacker group "Gorgon" based in Pakistan practice both general cyber-criminal activity and nation-state espionage ...
  60. [60]
    APT-C-36: from NjRAT to LimeRAT
    Mar 15, 2023 · This article describes one of the campaigns that has been linked to APT-C-36, where the artefacts used are noticeable Hagga artefacts.
  61. [61]
    Open-Source RATs Leveraged By APT Groups - SOCRadar
    Jun 13, 2023 · The complexity and continuous evolution of cyber threats make the attack techniques developed by attackers with objectives such as ...
  62. [62]
    APT PROFILE : Transparent Tribe aka APT36 - CYFIRMA
    May 15, 2025 · APT36 consistently exploits current events (e.g., terror attacks, geopolitical tensions) and emotional themes (like the Kashmir conflict) to ...
  63. [63]
    Targeted APT36 Campaign Exploiting Pahalgam Terror Incident for ...
    May 9, 2025 · Transparent Tribe, also known as APT36, is a Pakistan-based advanced persistent threat (APT) group that primarily targets Indian diplomatic, ...<|separator|>
  64. [64]
    [PDF] Regional rivalry between India- Pakistan: tit-for-tat in cyberspace
    The regional rivalry1 between India and Pakistan has existed since the two nations achieved independence in the Partition of India. Their.
  65. [65]
    NjRAT & H-Worm Variant Infections Continue To Rise | Zscaler
    Mar 20, 2015 · njRAT Trojan also known as Bladabindi, is a Remote Access Tool (RAT) that was first seen in 2013 and has been extremely prevalent in the Middle Eastern region.Missing: history origin