Table of Contents
A new Njrat sample was identified by threat intelligence feeds on 2026-04-23 09:32:03. This post breaks down what we know about the specific sample, how to recognize related activity on your network, and what to do if you or your organization might be affected.
The Sample at a Glance
| Field | Value |
|---|---|
| SHA-256 | b649944f79f7f0e8a1c550f92190015ce473b8841f8c14137a1e07154bf29774 |
| File name | b649944f79f7f0e8a1c550f92190015ce473b8841f8c1.exe |
| File type | exe |
| Size | 186.5 KB |
| Origin (first observed) | NL |
| First seen | 2026-04-23 09:32:03 |
| Family | Njrat |
| Tags | exe, njrat, RAT |
| VirusTotal detection | 53/76 engines flagged malicious |
What Njrat Does
njRAT is a remote access trojan that has been around for over a decade. It gives attackers full control of the infected machine — keystrokes, files, microphone, and webcam — and is often spread through pirated software and social-engineering lures.
Seeing this family on your network — or finding a file matching this hash — is a red flag. Njrat samples are typically distributed through phishing emails, malvertising, fake software downloads, or cracked installers. Once executed, the malware usually establishes persistence on the host, harvests credentials and sensitive data, and establishes an outbound channel to command-and-control infrastructure operated by the attackers.
Detection Landscape
Multiple security vendors have weighed in on this specific sample:
- ANY.RUN:
[{'malware_family': 'vidar', 'verdict': 'Malicious activity', 'file_name': 'test.ps1.ps1', 'date': '2026-04-22 20:29:11', 'analysis_url': 'https://app.any.run/tasks/663391cd-d1e8-4550-ae4f-02c9212107ec', 'tags': ['loader', 'powershell', 'vidar', 'stealer', 'susp-powershell', 'unlocker-eject', 'tool', 'amadey', 'nircmd', 'botnet', 'auto', 'generic', 'arch-exec', 'saked', 'dropper', 'telegram', 'autoit', 'upx', 'stealc', 'credentialflusher', 'evasion']}] - YOROI_YOMI:
Malicious File - vxCube:
malware2 - Intezer:
malicious - CAPE:
Amadey - Triage:
vidar - Spamhaus_HBL:
[{'detection': 'suspicious', 'link': 'https://www.spamhaus.org/hbl/'}] - UnpacMe:
[{'sha256_hash': 'b649944f79f7f0e8a1c550f92190015ce473b8841f8c14137a1e07154bf29774', 'md5_hash': '8368d91bcd80ff5da728f480167519d1', 'sha1_hash': 'c2de48b8d0241a5bb8d4811008ee74199982d7d2', 'detections': [], 'link': 'https://www.unpac.me/results/cdf04254-650c-4521-9471-8b79aac6aa95/'}, {'sha256_hash': 'db74500245168523b4f5465dea1478e3c8ca854282f4283ef62fca49a114e18f', 'md5_hash': '848e6a5bfc98d0d7c90791aba4fc34ec', 'sha1_hash': 'ec6be5dd311a35e45d8534636f2488ed221f3766', 'detections': [], 'link': 'https://www.unpac.me/results/cdf04254-650c-4521-9471-8b79aac6aa95/'}] - VMRay:
Vidar,Amadey - Kaspersky:
Malware
Indicators of Compromise
If you're hunting for this sample or related Njrat activity, here are the concrete indicators to feed into your SIEM, EDR, or host-based searches:
- SHA-256 hash:
b649944f79f7f0e8a1c550f92190015ce473b8841f8c14137a1e07154bf29774 - Filename pattern:
b649944f79f7f0e8a1c550f92190015ce473b8841f8c1.exe - File type: exe
- Behavioral tags: exe, njrat, RAT
- YARA rules matched: Amadey, cobalt_strike_tmp01925d3f, CP_Script_Inject_Detector, DebuggerCheck__API, DebuggerCheck__QueryInfo
How to Check If You're Affected
- Search your endpoint logs for the SHA-256
b649944f79f7f0e8a1c550f92190015ce473b8841f8c14137a1e07154bf29774. Most EDR platforms support historical hash searches across all monitored hosts. - Check for the filename
b649944f79f7f0e8a1c550f92190015ce473b8841f8c1.exein recently downloaded files, email attachments, and installer bundles. - Look for outbound connections to uncommon TLDs or newly registered domains — Njrat typically beacons to command-and-control infrastructure shortly after execution.
- Review scheduled tasks and registry run keys — this family commonly establishes persistence through standard Windows autorun locations.
- Run an updated AV or EDR scan across potentially affected hosts. Because this sample is already in public threat intel feeds, current signatures should flag it.
What to Do If You Find It
If you find evidence of this sample or related activity on your systems:
- Isolate the affected host from the network immediately to prevent lateral movement.
- Capture memory and disk images before rebooting. Reboots destroy critical forensic evidence, especially in RAM.
- Rotate credentials that may have been exposed — browser-saved passwords, VPN credentials, SSH keys, and any service accounts used on the affected host. Njrat frequently targets these.
- Check for secondary payloads. Njrat is often a stepping stone for additional malware including ransomware or banking trojans.
- Report the incident to your security team. For larger organizations, consider notifying your regional CERT.
Free Threat Lookups
You can verify any suspicious hash against the ThreatChain database for free — no signup, no API key required. Paste any MD5, SHA-1, or SHA-256 at threatchain.io/lookup and get results across multiple intel sources in seconds.
For cross-referencing this specific sample, you can also look it up directly on MalwareBazaar where the original submission and vendor analysis is recorded.
This sample is available as a password-protected ZIP (password: infected) for security researchers.
Protect Your Infrastructure with ThreatChain SIEM
Real-time threat detection powered by 2.6M+ indicators. Search any hash, domain, wallet, or IP.
View Pricing