@OALABS
  @OALABS
OALabs | Analyzing Adwind / JRAT Java Malware @OALABS | Uploaded 6 years ago | Updated 3 hours ago
Open Analysis Live! We analyze Adwind / JRAT malware using x64dbg and Java ByteCode Viewer. This was a subscriber request asking us to take a closer look at Adwind and how to extract the config...

-----
OALABS DISCORD
discord.gg/6h5Bh5AMDU

OALABS PATREON
patreon.com/oalabs

OALABS TIP JAR
ko-fi.com/oalabs

OALABS GITHUB
github.com/OALabs

UNPACME - AUTOMATED MALWARE UNPACKING
unpac.me/#

-----

Packed sample:
SHA256 - 937a18e19ad1579ffc5f9399830860c13fc9f54df4c3f4a0f9f15a658e02ddac
malshare.com/sample.php?action=detail&hash=f0abfd6d3fb0ba12a5d874b16ac753fc

Hybrid Analysis sandbox:
hybrid-analysis.com/sample/937a18e19ad1579ffc5f9399830860c13fc9f54df4c3f4a0f9f15a658e02ddac?environmentId=100

Decoy Adwind unpacked:
malshare.com/sample.php?action=detail&hash=c10199b8c0855b502d6edfe204bf7767

Adwind config:
pastebin.com/aq7K1GNY

Blog post on Adwind:
codemetrix.net/decrypting-adwind-jrat-jbifrost-trojan

x64dbg:
x64dbg.com/#start

Java ByteCode Viewer:
bytecodeviewer.com

Compile and run Java Class file
docs.oracle.com/javase/tutorial/getStarted/cupojava/win32.html

Java JAR basics
docs.oracle.com/javase/tutorial/deployment/jar/basicsindex.html

Python Adwind decryptor:
gist.github.com/herrcore/8336975475e88f9bc539d94000412885

Feedback, questions, and suggestions are always welcome : )

Sergei twitter.com/herrcore
Sean twitter.com/seanmw

As always check out our tools, tutorials, and more content over at http://www.openanalysis.net
Analyzing Adwind / JRAT Java MalwareUnpacking VB6 Packers With IDA Pro and API Hooks (Re-Upload)Using Yara Rules With IDA Pro - New Tool!

Analyzing Adwind / JRAT Java Malware @OALABS

SHARE TO X SHARE TO REDDIT SHARE TO FACEBOOK WALLPAPER