BLACK FRIDAY: 2-for-1 offer NOVEMBER 20 - 26 See details
2
Global rank
12 infographic chevron month
Month rank
14 infographic chevron week
Week rank
22385
IOCs

njRAT is a remote access trojan. It is one of the most widely accessible RATs on the market that features an abundance of educational information. Interested attackers can even find tutorials on YouTube. This allows it to become one of the most popular RATs in the world.

Trojan
Type
Middle East
Origin
1 January, 2013
First seen
26 July, 2024
Last seen
Also known as
Bladabindi
Njw0rm

How to analyze njRAT with ANY.RUN

Type
Middle East
Origin
1 January, 2013
First seen
26 July, 2024
Last seen

IOCs

IP addresses
109.206.242.119
93.170.46.31
178.80.111.72
162.220.10.165
90.207.167.210
104.22.48.74
95.83.0.34
185.139.70.178
98.4.100.172
188.116.145.233
156.222.52.118
83.59.239.179
41.142.42.121
194.71.227.62
172.67.135.130
185.199.109.133
144.126.144.223
192.121.87.108
193.42.33.179
5.35.153.131
Hashes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new-knee.at.ply.gg
troia23.duckdns.org
mrxud.ddns.net
tyfdfdfs.ddns.net
vxnon.duckdns.org
domne.ddns.net
pet.donalbidden.ga
dcsacrevc-46676.portmap.host
components-resort.gl.at.ply.gg
xiezi.i234.me
desquare27.duckdns.org
howtolive913-31335.portmap.host
advanced-cognitive.gl.at.ply.gg
answers-crisis.gl.at.ply.gg
testscamahasikan.ddns.net
kkk.no-ip.biz
paradox.uno
insurance-helmet.gl.at.ply.gg
linternadc24.duckdns.org
blog.biliianstore.com
URLs
http://troia23.duckdns.org:1177/
https://pastebin.com/raw/Xde8ekvN
https://pt.textbin.net/download/insdj4bhn2
https://pastes.io/download/g4enqwgps4
https://pastebin.com/raw/Hu1K7Y4W
https://pastebin.com/raw/VGGi28kN
https://pastebin.com/raw/jxx7yjgK
https://6ded-177-50-200-148.ngrok-free.app/
https://pastebin.com/raw/vZM3LPTw
https://pt.textbin.net/download/rcd5ihynxw
https://pastebin.com/raw/UgsiXFgH
https://pastebin.com/raw/YKgY3s0H
https://pastebin.com/raw/rdmzbeYW
https://pastebin.com/raw/fnugwhmF
https://pastebin.com/raw/CmJ80yPc
https://pastebin.com/raw/MiKBEm2x
https://pastebin.com/raw/LPn410Wj
https://pastebin.com/raw/GUZjvbiL
https://pastebin.com/raw/q6JvsRJz
https://pastebin.com/raw/S1HhZSCU
Last Seen at

Recent blog posts

post image
See Malicious Process Relationships on a Vis...
watchers 178
comments 0
post image
Brute Ratel C4 Badger Used to Load Latrodectu...
watchers 1013
comments 0
post image
Find Threats Exploiting CrowdStrike Outage w...
watchers 3000
comments 0

What is njRAT Malware?

njRAT, also called Bladabindi and Njw0rm is a remote access trojan that is used to remotely control infected machines. Because of its availability, excess of online tutorials, plenty of information, and a robust core feature set along with several implemented evading techniques made njRAT one of the most widely used RATs in the world.

This malware was detected for the first time in 2013, however, some related RATs have been observed by researchers in 2012. The highest surge of njRAT trojan attacks was recorded in 2014 in the middle east, which is the most targeted region for this malware.

In Q2 2024, it became the third most widespread malware according to ANY.RUN's report.

General Information about njRAT

njRAT trojan is built on the .NET framework. This RAT gives hackers the ability to control the victim’s PC remotely. njRAT allows attackers to activate the webcam, log keystrokes, and steal passwords from web browsers as well as multiple desktop apps.

In addition, the malware gives hackers access to the command line on the infected machine. It allows to kill processes as well as remotely execute and manipulate files. On top of that, njRAT is capable of manipulating the system registry. When infected, Bladabindi trojan will collect several bits of information about the PC that it got into, including the name of the computer, operating system number, country of the computer, usernames, and OS version.

Also, this malware is able to target cryptocurrency wallet applications and steal cryptocurrency from PCs. For example, it is known to be able to grab bitcoins and even access credit card information which sometimes can be stored in crypto apps as a means to purchase cryptocurrency.

After infecting a computer the malware uses a variable name and copies into %TEMP%, %APPDATA%, %USERPROFILE%,%ALLUSERSPROFILE% or %windir% – a behavior not uncommon for this time of malware. It can also copy itself into <any string>.exe, to ensure that it will be activated every time the victim switches on their computer.

njRAT trojan has a few tricks up its sleeve to avoid detection by antivirus software. For example, it uses multiple .NET obfuscators to obstruct its code. Another technique that the malware uses is disguising itself into a critical process. This does not allow the user to shut it down. It also makes njRAT hard to remove from the infected PCs. Bladabindi RAT can also deactivate processes that belong to antivirus software, allowing it to stay hidden. njRAT also knows how to detect if it has been run on a virtual machine which helps the attackers to set up countermeasures against researchers.

Get started today for free

Easily analyze emerging malware with ANY.RUN interactive online sandbox

Register for free

Authors of Bladabindi are leveraging Pastebin to avoid investigation by cybersecurity researchers. njRAT downloads additional components and executes secondary-stage payloads from Pastebin. So, the malware has no need to establish a traditional command-and-control (C2) server. The Pastebin creates a pathway between njRAT infections and new payloads. With the trojan acting as a downloader, it will grab encoded data dumped on Pastebin, decode, and deploy.

For spreading, njRAT can detect external hard drives connected via USB. Once such a device is detected, the RAT will copy itself onto the connected drive and create a shortcut.

Who created njRAT?

Creators of njRAT are members of an underground hacker community named Sparclyheason. Evidently, they have created a very popular and destructive malware. njRAT was classified as “severe” by Microsoft Malware Protection Center.

In fact, following a large malicious campaign in 2014, Microsoft shut down four million websites in an effort to filter traffic that was going through no-ip.com domains.

njRAT malware analysis

ANY.RUN allows researchers to watch the njRAT in action in an interactive sandbox simulation.

njRAT execution process graph

Figure 1: Displays the lifecycle of njRAT in a visual form as a process graph generated by ANY.RUN malware hunting service

text report of the njRAT malware analysis

Figure 2: A customizable text report generated by ANY.RUN allows to take an even deeper look at the malware and helps to share the research results

njRAT execution process

In our simulation, after njRAT got into the target device and began execution it instantly started its malicious activity. Usually, the initial file renames itself and creates a child process. Sometimes njRAT trojan injects its code into legitimate processes such as RegSvcs.exe and RegAsm.exe.

The malware also has the ability to run itself through Task Scheduler. This child process executes the main malicious activity. Such activity includes stealing information, connecting to C2 servers, and changing the autorun value in the registry to run itself when the operating system starts.

Use ANY.RUN free for 14 days

Try the full power of interactive analysis

Start your free trial

Distribution of njRAT

njRAT trojan uses quite a few attack vectors to infect its victims. For example, the malware is known to target Discord users as part of spam campaigns. In addition, leverage cracks and keygens in well-known software in order to trick users. It installs malicious packages to infect the machine.

Another known distribution method was through a compromised website that tricked users into downloading a fake Adobe product update which in turn installed njRAT malware to the PC. Bladabindi was also featured in phishing email campaigns. In this case, it was delivered to potential victims as a malicious attachment.

In October 2020 mailspam used the 'shipment tracking' theme, faking popular courier and postal services. Malicious packages contain attachments in Zip format with an encoded Visual Basic script (VBE) payload and components.

Moreover, crooks use cloud-based storage platforms more often. Attackers host malicious files there to deliver malicious software, and even use them as part of a command and control (C&C) architecture. That is why it's crucial to know general malware removal instructions and analyze viruses in a safe environment.

How to detect NJRAT using ANY.RUN?

To determine whether the sample under review is njRAT or not, you can take a look at the changes that it made in the registry. To do so, open the Advanced details of process section of the malicious process and look at the "Registry changes" tab in the "Events" section. If a process has created a key with the name [kl] into the path HKEY_CURRENT_USER\Software\32_characters_and_digits, you can be sure that the given sample is njRAT.

njrat registry changes Figure 3: Сhanges made by njRAT in registry

Conclusion

The relative ease of operation, multiple tutorials on how to set up this malware, and very extensive information stealing feature set have made this RAT one of the most popular remote access trojans in the world.

Even though the peak of its activity was recorded in 2014 and targeted mostly the middle east and India, the njRAT trojan remains to be extremely popular today. This malware is known to have targeted both private and corporate victims and poses a lot of danger to internet users, especially considering that it can be delivered by packages to potential victims in several ways, and preventing infection is much harder in some cases than in others.

Even though Bladabindi malware creators have taken several steps to hinder the analysis, malware hunting services like ANY.RUN allows professionals to easily study njRAT malware samples or other RATs like Orcus RAT or WSHRAT and share the research results with the world to improve global cybersecurity.

Create your free ANY.RUN account to analyze malware and phishing without limits!

HAVE A LOOK AT

Adwind screenshot
Adwind
adwind trojan
Adwind RAT, sometimes also called Unrecom, Sockrat, Frutas, jRat, and JSocket, is a Malware As A Service Remote Access Trojan that attackers can use to collect information from infected machines. It was one of the most popular RATs in the market in 2015.
Read More
Agent Tesla screenshot
Agent Tesla
agenttesla trojan rat stealer
Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold.
Read More
Amadey screenshot
Amadey
amadey
Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks.
Read More
Arkei screenshot
Arkei
arkei stealer
Arkei is a stealer type malware capable of collecting passwords, autosaved forms, cryptocurrency wallet credentials, and files.
Read More
AsyncRAT screenshot
AsyncRAT
asyncrat
AsyncRAT is a RAT that can monitor and remotely control infected systems. This malware was introduced on Github as a legitimate open-source remote administration software, but hackers use it for its many powerful malicious functions.
Read More
WarZone screenshot
WarZone
warzone avemaria stealer trojan rat
WarZone RAT is a remote access trojan, which is written in C++ and offered as a malware-as-a-service. It packs a wide range of capabilities, from stealing victims’ files and passwords to capturing desktop activities. WarZone RAT is primarily distributed via phishing emails and receives regular updates from its C2.
Read More