Unit 42 researchers identified that njRAT (or Bladabindi) is used for downloading and execution of secondary-stage payloads via Pastebin. Through this technique, the attackers don’t need to establish a command and control (C&C) server at all.
Read full article on HackRead