Black friday Up to 3 extra licenses FOR FREE + Special offer for TI LOOKUP Get it now
Webinar
February 26
Better SOC with Interactive Sandbox Practical Use Cases
Register now
5
Global rank
22 infographic chevron month
Month rank
16 infographic chevron week
Week rank
0
IOCs

njRAT is a remote access trojan. It is one of the most widely accessible RATs on the market that features an abundance of educational information. Interested attackers can even find tutorials on YouTube. This allows it to become one of the most popular RATs in the world.

Trojan
Type
Middle East
Origin
1 January, 2013
First seen
18 September, 2025
Last seen
Also known as
Bladabindi
Njw0rm

How to analyze njRAT with ANY.RUN

Type
Middle East
Origin
1 January, 2013
First seen
18 September, 2025
Last seen

IOCs

IP addresses
109.206.242.119
93.170.46.31
178.80.111.72
90.207.167.210
162.220.10.165
104.22.48.74
95.83.0.34
185.139.70.178
98.4.100.172
188.116.145.233
156.222.52.118
83.59.239.179
41.142.42.121
194.71.227.62
172.67.135.130
185.199.109.133
144.126.144.223
192.121.87.108
193.42.33.179
5.35.153.131
Hashes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http-server.sytes.net
supply-dressing.gl.at.ply.gg
mistersjsas1.duckdns.org
java-runtime.servehttp.com
download-video.online
robloxvithor.duckdns.org
transfer-hero.gl.at.ply.gg
hassanhtml.hopto.org
copy-marco.gl.at.ply.gg
dpwekwpd-58261.portmap.io
mortaza1-33942.portmap.host
229.ip.ply.gg
center-kate.gl.at.ply.gg
just-rss.gl.at.ply.gg
youri.mooo.com
liouas.ddns.net
adolf-1.ddns.net
microsoft-graphics.ddns.net
anonam39-21749.portmap.io
diazpool14.duckdns.org
URLs
tcp://0.tcp.eu.ngrok.io/
tcp://2.tcp.eu.ngrok.io/
tcp://4.tcp.ngrok.io/
tcp://4.tcp.eu.ngrok.io/
tcp://7.tcp.eu.ngrok.io/
https://pastebin.com/raw/rNnPbAU4
http://52.28.112.211:19354/
http://82.125.154.254:8080/
http://171.101.120.227:8080/
http://zzzpmax.ddns.net:9999/is-ready
http://troia23.duckdns.org:1177/
https://pastebin.com/raw/jxx7yjgK
tcp://4.tcp.ngrok.io:11565/
https://pastebin.com/raw/TBt9FMXT
https://raw.githubusercontent.com/Pjoao1578/Upcrypter/main/Host_1
https://pastebin.com/raw/C5HTLPh8
https://pastebin.com/raw/NtYZ47B0
https://pastebin.com/raw/HEFUfAcq
https://pastebin.com/raw/rZnx4eNw
https://pastebin.com/raw/hHysTRBC
Last Seen at
Last Seen at

Recent blog posts

post image
Efficient SOC: How to Detect and Solve Incide...
watchers 345
comments 0
post image
ANY.RUN & Palo Alto Networks Cortex XSOAR...
watchers 458
comments 0
post image
Lazarus Group Attacks in 2025: Here's Everyth...
watchers 3420
comments 0

What is njRAT Malware?

njRAT, also called Bladabindi and Njw0rm is a remote access trojan that is used to remotely control infected machines. Because of its availability, excess of online tutorials, plenty of information, and a robust core feature set along with several implemented evading techniques made njRAT one of the most widely used RATs in the world.

This malware was detected for the first time in 2013, however, some related RATs have been observed by researchers in 2012. The highest surge of njRAT trojan attacks was recorded in 2014 in the middle east, which is the most targeted region for this malware.

In Q2 2024, it became the third most widespread malware according to ANY.RUN's report.

General Information about njRAT

njRAT trojan is built on the .NET framework. This RAT gives hackers the ability to control the victim’s PC remotely. njRAT allows attackers to activate the webcam, log keystrokes, and steal passwords from web browsers as well as multiple desktop apps.

In addition, the malware gives hackers access to the command line on the infected machine. It allows to kill processes as well as remotely execute and manipulate files. On top of that, njRAT is capable of manipulating the system registry. When infected, Bladabindi trojan will collect several bits of information about the PC that it got into, including the name of the computer, operating system number, country of the computer, usernames, and OS version.

Also, this malware is able to target cryptocurrency wallet applications and steal cryptocurrency from PCs. For example, it is known to be able to grab bitcoins and even access credit card information which sometimes can be stored in crypto apps as a means to purchase cryptocurrency.

After infecting a computer the malware uses a variable name and copies into %TEMP%, %APPDATA%, %USERPROFILE%,%ALLUSERSPROFILE% or %windir% – a behavior not uncommon for this time of malware. It can also copy itself into <any string>.exe, to ensure that it will be activated every time the victim switches on their computer.

njRAT trojan has a few tricks up its sleeve to avoid detection by antivirus software. For example, it uses multiple .NET obfuscators to obstruct its code. Another technique that the malware uses is disguising itself into a critical process. This does not allow the user to shut it down. It also makes njRAT hard to remove from the infected PCs. Bladabindi RAT can also deactivate processes that belong to antivirus software, allowing it to stay hidden. njRAT also knows how to detect if it has been run on a virtual machine which helps the attackers to set up countermeasures against researchers.

Get started today for free

Analyze malware and phishing in a fully-interactive sandbox

Create free account

Authors of Bladabindi are leveraging Pastebin to avoid investigation by cybersecurity researchers. njRAT downloads additional components and executes secondary-stage payloads from Pastebin. So, the malware has no need to establish a traditional command-and-control (C2) server. The Pastebin creates a pathway between njRAT infections and new payloads. With the trojan acting as a downloader, it will grab encoded data dumped on Pastebin, decode, and deploy.

For spreading, njRAT can detect external hard drives connected via USB. Once such a device is detected, the RAT will copy itself onto the connected drive and create a shortcut.

Who created njRAT?

Creators of njRAT are members of an underground hacker community named Sparclyheason. Evidently, they have created a very popular and destructive malware. njRAT was classified as “severe” by Microsoft Malware Protection Center.

In fact, following a large malicious campaign in 2014, Microsoft shut down four million websites in an effort to filter traffic that was going through no-ip.com domains.

njRAT malware analysis

ANY.RUN allows researchers to watch the njRAT in action in an interactive sandbox simulation.

njRAT execution process graph

Figure 1: Displays the lifecycle of njRAT in a visual form as a process graph generated by ANY.RUN malware hunting service

text report of the njRAT malware analysis

Figure 2: A customizable text report generated by ANY.RUN allows to take an even deeper look at the malware and helps to share the research results

njRAT execution process

In our simulation, after njRAT got into the target device and began execution it instantly started its malicious activity. Usually, the initial file renames itself and creates a child process. Sometimes njRAT trojan injects its code into legitimate processes such as RegSvcs.exe and RegAsm.exe.

The malware also has the ability to run itself through Task Scheduler. This child process executes the main malicious activity. Such activity includes stealing information, connecting to C2 servers, and changing the autorun value in the registry to run itself when the operating system starts.

Use ANY.RUN free for 14 days

Try the full power of interactive analysis

Start your free trial

Distribution of njRAT

njRAT trojan uses quite a few attack vectors to infect its victims. For example, the malware is known to target Discord users as part of spam campaigns. In addition, leverage cracks and keygens in well-known software in order to trick users. It installs malicious packages to infect the machine.

Another known distribution method was through a compromised website that tricked users into downloading a fake Adobe product update which in turn installed njRAT malware to the PC. Bladabindi was also featured in phishing email campaigns. In this case, it was delivered to potential victims as a malicious attachment.

In October 2020 mailspam used the 'shipment tracking' theme, faking popular courier and postal services. Malicious packages contain attachments in Zip format with an encoded Visual Basic script (VBE) payload and components.

Moreover, crooks use cloud-based storage platforms more often. Attackers host malicious files there to deliver malicious software, and even use them as part of a command and control (C&C) architecture. That is why it's crucial to know general malware removal instructions and analyze viruses in a safe environment.

How to detect NJRAT using ANY.RUN?

To determine whether the sample under review is njRAT or not, you can take a look at the changes that it made in the registry. To do so, open the Advanced details of process section of the malicious process and look at the "Registry changes" tab in the "Events" section. If a process has created a key with the name [kl] into the path HKEY_CURRENT_USER\Software\32_characters_and_digits, you can be sure that the given sample is njRAT.

njrat registry changes Figure 3: Сhanges made by njRAT in registry

Conclusion

The relative ease of operation, multiple tutorials on how to set up this malware, and very extensive information stealing feature set have made this RAT one of the most popular remote access trojans in the world.

Even though the peak of its activity was recorded in 2014 and targeted mostly the middle east and India, the njRAT trojan remains to be extremely popular today. This malware is known to have targeted both private and corporate victims and poses a lot of danger to internet users, especially considering that it can be delivered by packages to potential victims in several ways, and preventing infection is much harder in some cases than in others.

Even though Bladabindi malware creators have taken several steps to hinder the analysis, malware hunting services like ANY.RUN allows professionals to easily study njRAT malware samples or other RATs like Orcus RAT or WSHRAT and share the research results with the world to improve global cybersecurity.

Create your free ANY.RUN account to analyze malware and phishing without limits!

HAVE A LOOK AT

Arechclient2 screenshot
Arechclient2
arechclient2
The Arechclient2 malware is a sophisticated .NET-based Remote Access Trojan (RAT) that collects sensitive information, such as browser credentials, from infected computers. It employs various stealth techniques, including Base64 encoding to obscure its code and the ability to pause activities to evade automated security tools. The malware also can adjust Windows Defender settings and uses code injection to manipulate legitimate processes.
Read More
DarkComet screenshot
DarkComet
darkcomet rat darkcomet rat
DarkComet RAT is a malicious program designed to remotely control or administer a victim's computer, steal private data and spy on the victim.
Read More
FatalRAT screenshot
FatalRAT
fatalrat
FatalRAT is a malware that gives hackers remote access and control of the system and lets them steal sensitive information like login credentials and financial data. FatalRAT has been associated with cyber espionage campaigns, particularly targeting organizations in the Asia-Pacific (APAC) region.
Read More
Salvador Stealer screenshot
Salvador Stealer
salvador
Salvador Stealer is a powerful, information-stealing Android malware designed to silently infiltrate systems, extract sensitive data, and exfiltrate it to cybercriminals. Often sold on underground forums, it is part of the growing ecosystem of “stealers-as-a-service” (SaaS) tools that target individuals and organizations alike.
Read More
Crypto malware screenshot
Crypto malware
miner xmrig jsminer
Crypto mining malware is a resource-intensive threat that infiltrates computers with the purpose of mining cryptocurrencies. This type of threat can be deployed either on an infected machine or a compromised website. In both cases the miner will utilize the computing power of the device and its network bandwidth.
Read More
Phorpiex screenshot
Phorpiex
phorpiex
Phorpiex is a malicious software that has been a significant threat in the cybersecurity landscape since 2016. It is a modular malware known for its ability to maintain an extensive botnet. Unlike other botnets, Phorpiex does not concentrate on DDoS attacks. Instead, it has been involved in numerous large-scale spam email campaigns and the distribution of other malicious payloads, such as LockBit.
Read More