Live Training | What's New in Lumu Defender

Already have an account? Sign in

Sign in

Malware

S0385

njRAT

Type

Remote Access Trojan (RAT)

Associated threat actors

Various

Key Capabilities

Provides control over compromised systems, enabling remote command execution, data collection, and webcam and microphone control.

OS Targeted

Windows

IoCs on Maltiverse

Maltiverse provides updated IoCs for easy SIEM/SOAR/Firewall/EDR integration.

What is njRAT?

njRAT (S0385), also known as Bladabindi, is a Remote Access Trojan (RAT). It is popular among cybercriminals for its flexibility and ease of use.

This RAT provides attackers with complete control over an infected computer, enabling data theft and surveillance. Its capabilities include a keylogger for capturing credentials, webcam control, remote command execution, and using the infected machine to launch Distributed Denial-of-Service (DDoS) attacks.

How to Defend Against njRAT?

Defending against njRAT requires preventing the initial infection and detecting its command-and-control (C2) activity.

  • Be cautious with email attachments and downloads, which are the primary delivery vectors for this RAT.
  • Keep all operating systems and applications patched to limit the vulnerabilities that can be exploited for initial access.
  • Deploy endpoint detection and antivirus protection to identify and block the execution of known RATs and their associated behaviors.
  • Use network detection (NDR) with integrated threat intelligence to spot and block njRAT’s C2 communications.

Join our pre-day 
workshop waitlist

By clicking “Submit Request” you agree to the Lumu Terms of Service and Privacy Policy.