The njRAT Family
Introduction
This page is part of my series: Inside Different Generations of RATs, and serves as a reference hub for navigating njRAT-related analysis articles.
It provides an overview of the njRAT family, including its major versions and known variants.
If you are interested in the full series, please refer to the linked page above.
This page will be continuously updated as new research is added.
njRAT
njRAT, also known as Bladabindi, is a remote access tool (RAT) with a graphical user interface that allows operators to control a victim’s machine. It was first found in June 2013 with some variants traced to November 2012.
It was reportedly developed by a hacking group called M38dHhM and was often used against targets in the Middle East.
njRAT has many versions, and numerous variants can be found online. One of the most famous versions is the Lime Edition.
Supplement: I didn’t find any source of why it was named “Bladabindi”, but
balad (بلد)means “country” or “place” in Arabic. In addition, the author is namednjq8, this is probably why the RAT is also known asnjRAT.
njRAT is also one of the RATs that inspired my project DuplexSpy.
The njRAT Family
Note: Some RAT versions have minimal changes; therefore, certain nodes in the family tree may point to the same article. This is intentional. The table below lists all analyzed RAT versions and editions, with each article corresponding to a distinct version to maintain clarity and avoid overlap.
| RAT Version | Article |
|---|---|
| njRAT v0.7d | Analyzing njRAT v0.7d |
| njRAT v0.9d | Analyzing njRAT v0.9d |
| njRAT Lime/Green Edition | Analyzing njRAT Lime and Green Edition |
Many variants are derived from njRAT v0.7, making it a foundational version for understanding the evolution of this malware family. Therefore, analyzing v0.7 provides critical insights into the design patterns reused across later variants.
The variants can be broadly classified into two categories:
- Official versions: v0.7, v0.9, v0.10
- Modified / weaponized editions: Lime, Green, Danger, Golden, etc.
Most modified editions are derived from v0.7, inheriting its core architecture while introducing additional features such as DDoS, ransomware, or anti-analysis mechanisms.
Related Articles
THANKS FOR READING