About njRAT / Bladabindi
njRAT is a Remote Access Trojan (RAT) that can be used to remotely control a hacked computer. It has been around since 2013, but despite being over 10 years old it still remains one of the most popular backdoors used by malicious actors.
njRAT Artefacts Extracted by NetworkMiner
NetworkMiner has a built-in parser for the njRAT Command-and-Control (C2) protocol. This njRAT parser kicks in whenever there is traffic to a well-known njRAT port, such as TCP 1177 or 5552, plus a few extra ports (like TCP 14817 that was used by the analysed sample).
You’ll need NetworkMiner Professional to decode njRAT traffic to other ports, since it comes with a port-independent-protocol-identification (PIPI) feature that automatically detects the protocol regardless which port the server runs on.
As demonstrated in the video, NetworkMiner can extract the following types of artefacts from njRAT network traffic:
Covered njRAT Commands and Plugins
These njRAT commands and plugins are mentioned in the video:
IOC List
Rock County officials are investigating a fatal crash that claimed a driver who was ejected…
Southwest Airlines will discontinue service to Chicago's O'Hare airport in June, citing challenging operations and…
Defense Secretary Pete Hegseth speaks at a briefing at the Pentagon on March 13, 2026.…
The Illinois State Fire Marshall is investigating the cause of a fire at an apartment…
Instagram will no longer support end-to-end encrypted messages starting May 8th. In a statement to…
Microsoft announced at GDC today that it's adding Automatic Super Resolution (Auto SR) to the…
This website uses cookies.