Dumping COVID-19.jar with Java Instrumentation
#1
Bug 
Quote:
[Image: blog-default-header-1.jpg]

There is a generic and easy way to unpack Java malware that is not well-known yet. For demonstration I use a recent JAR malware sample that jumps on the COVID-19 bandwagon.

From the point of view of a threat actor, Java based malware has the advantage that it works regardless of the operating system as long as Java is installed. While the numbers of Java malware have declined in the last 5 years, certain strains are still seen frequently in the wild, e.g., the backdoor Adwind. Malware authors are also still creating new Java based strains like the information stealer Qealler which was first seen in February 2019.

Almost all of those threats are packed, using protection tools like Allatori which makes reverse engineering a bit harder.

In the following video I demonstrate a generic way to unpack Java based malware dynamically. This method uses Java instrumentation, more specifically Java Agents. They are a tool for developers to change the behaviour of their programs without having to modify the original source code. The Java Agent is part of a separate JAR file that is applied to the actual software while running it. That way developers can easily add profiling or logging.

In this instance a Java Agent will dump all Java classes while they are being executed, thus dynamically unpacking the protected payload.

...
Continue Reading
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
XYplorer
What's new in Rele...Kool — 08:50
QOwnNotes
26.3.3  Added sma...Kool — 08:47
KeePass 2.61
KeePass 2.61 KeePa...harlan4096 — 16:59
Vivaldi 7.8 Build 3925.76
Vivaldi 7.8 Build ...harlan4096 — 16:57
HWiNFO v8.44
HWiNFO v8.44 Re...harlan4096 — 16:57

[-]
Birthdays
Today's Birthdays
avatar (41)ARYsahulatbazar
Upcoming Birthdays
avatar (44)gapedDow
avatar (38)snorydar
avatar (43)Hectorvot
avatar (51)knowhanPluts
avatar (39)Williamengiz
avatar (46)qaqapeti
avatar (44)battsourIonix
avatar (43)CedricSek
avatar (39)chasRex
avatar (43)slavrProck
avatar (45)Tyesharaike
avatar (49)TomeRerla
avatar (45)walllMIZ
avatar (41)oconyho
avatar (33)uteluxix
avatar (47)piafcflene
avatar (39)Matthewkah
avatar (51)tersfargum
avatar (50)alfreExept
avatar (38)Charlesfibre
avatar (42)napasvem
avatar (44)diploJeoca
avatar (38)francisnj3
avatar (43)artmaGoork
avatar (45)tukraNax
avatar (41)RichardCisee
avatar (40)ebenofit
avatar (38)ykazawu

[-]
Online Staff
There are no staff members currently online.

>