#njRAT
Long-running .NET commodity Remote Access Trojan, especially active in MENA-region campaigns
#njRAT
Long-running .NET commodity RAT (especially MENA)
IOCs by window
0
IOCs tagged #njRAT
0
IOCs tagged #njRAT
2
IOCs tagged #njRAT
769
IOCs tagged #njRAT
Counts as of 2026-04-29. Regenerated daily.
About #njRAT
- Type: long-running .NET commodity Remote Access Trojan, also tracked as Bladabindi. Original builder leaked publicly years ago, which spawned dozens of forks and operator-tweaked variants. MITRE ATT&CK S0385.
- Abuse pattern: especially active in MENA-region campaigns (Arabic-language phishing, fake game-cheat lures, Discord-distributed loaders). Capabilities include keylogging, screen capture, file management, USB-spread persistence and remote shell.
- Detection signals: .NET assembly with distinctive
Stub+OKpackets, TCP C2 on port 5552 (default) or operator-customised, registry persistence underHKCU\Software\Microsoft\Windows\CurrentVersion\Run, mutex strings starting withStub. - References: MITRE ATT&CK S0385 · Malpedia.
Recent IOCs tagged #njRAT
Latest 2 IOCs from the past 30 days. Live JSON: api.tweetfeed.live/v1/month/njrat.
| Date | Type | Value | Source |
|---|---|---|---|
| url | |||
| ip |
Past-month volume is low; the year aggregate (769) reflects historical activity. For a longer window, query api.tweetfeed.live/v1/year/njrat.
Related tags
Frequently asked questions
What is njRAT?
njRAT (also tracked as Bladabindi) is a long-running .NET commodity Remote Access Trojan. The original builder leaked publicly years ago, which spawned dozens of forks and operator-tweaked variants in the wild. It supports keylogging, screen capture, file management, USB-spread persistence and remote shell. MITRE ATT&CK tracks it as S0385.
Where does njRAT activity concentrate?
njRAT is especially active in MENA-region campaigns - Arabic-language phishing emails, fake game-cheat lures targeting young users, and Discord-distributed loaders are the most common vectors. The malware is also seen in opportunistic global campaigns where the operator wants a low-effort RAT with a wide feature set, but per-region telemetry usually weights heavily toward Middle East and North Africa.
How is this list updated?
Every 15 minutes. The TweetFeed pipeline scrapes RSS feeds from public Twitter/X security researcher accounts and lists, extracts IOCs, tags them with the relevant malware family or threat actor, and republishes the result in CSV, JSON and RSS. njRAT-tagged IOCs are surfaced on this page within the next 15-minute tick. The page itself is regenerated daily by a GitHub Action.
What is the license? Can I use this commercially?
All TweetFeed IOC data, including this njRAT subset, is released under CC0 1.0 Universal (Public Domain Dedication). No attribution required, no warranty. Commercial use is allowed. The TweetFeed website code and branding are not covered by CC0.
License
njRAT IOC data: CC0 1.0 Public Domain. No attribution required, no warranty. Source code for the pipeline: github.com/0xDanielLopez/TweetFeed (MIT).