njRAT

MITRE
Malware Type:
Other
First seen:
Unknown
Last seen:
Unknown
Details:

[njRAT](https://attack.mitre.org/software/S0385) is a remote access tool (RAT) that was first observed in 2012. It has been used by threat actors in the Middle East.(Citation: Fidelis njRAT June 2013)

Associated Techniques (31)
ID ATT&CK Tactics
T1005 Data from Local System -
T1010 Application Window Discovery -
T1012 Query Registry -
T1018 Remote System Discovery -
T1021.001 Remote Desktop Protocol -
T1027.004 Compile After Delivery -
T1027.013 Encrypted/Encoded File -
T1033 System Owner/User Discovery -
T1041 Exfiltration Over C2 Channel -
T1056.001 Keylogging -
T1057 Process Discovery -
T1059.001 PowerShell -
T1059.003 Windows Command Shell -
T1070.004 File Deletion -
T1070.009 Clear Persistence -
Aliases (315)
Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi Njw0rm LV Bladabindi
Metadata
ID: 593
Created: 13/01/2026 17:48
Updated: 06/03/2026 16:00