{"id":94312,"date":"2019-03-01T08:00:15","date_gmt":"2019-03-01T16:00:15","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=94312"},"modified":"2024-02-18T19:14:26","modified_gmt":"2024-02-19T03:14:26","slug":"java-vbs-joint-exercise-delivers-rat","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/java-vbs-joint-exercise-delivers-rat\/","title":{"rendered":"JAVA-VBS Joint Exercise Delivers RAT"},"content":{"rendered":"<p>The Adwind remote administration tool (RAT) is a Java-based backdoor Trojan that targets various platforms supporting Java files. For an infection to occur, the user must typically execute the malware by double-clicking on the .jar file that usually arrives as an email attachment. Generally, infection begins if the user has the Java Runtime Environment installed. Once the malicious .jar file runs successfully on the target system, the malware silently installs itself and connects to a remote server through a preconfigured port. This allows it to receive commands from the remote attacker and perform further malicious activities. Recently, McAfee labs has seen a surge in a variant which comes as a JAR attachment via a spam email and uses the famous Houdini VBS worm to infect user.<\/p>\n<h2>Infection chain:<\/h2>\n<p>The malware\u2019s spreading mechanism is the same as in previous versions. It arrives in a spam email with a .jar attachment. The contents of the email are carefully crafted to lure victims using social engineering techniques. We can summarise the whole infection chain as shown in the below snippet:<\/p>\n<p><strong>\u00a0<img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-94313\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/02\/Infection-chain.png\" alt=\"\" width=\"950\" height=\"501\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Infection-chain.png 950w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Infection-chain-300x158.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Infection-chain-768x405.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Infection-chain-948x500.png 948w\" sizes=\"auto, (max-width: 950px) 100vw, 950px\" \/><\/strong><\/p>\n<p>The spam email may look like this:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-94314\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/02\/spam-email.png\" alt=\"\" width=\"561\" height=\"457\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/spam-email.png 561w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/spam-email-300x244.png 300w\" sizes=\"auto, (max-width: 561px) 100vw, 561px\" \/><\/p>\n<h3><strong>The parent JAR file: <\/strong><\/h3>\n<p>To keep things simple, we just called the attached .jar file as a parent jar file and named it Sample.jar. Generally, Adwind comes in an obfuscated form to hide its malicious intent. Its payload and configuration file (which serves as an installation file) are encrypted with the DES, RC4, or RC6 cipher, depending on the variant. The Adwind backdoor will decrypt itself on the fly during execution. In this variant we can see the contents of Manifest.MF. It has main class <em>bogjbycqdq.<strong>Mawbkhvaype<\/strong><\/em>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-94315\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/02\/Manifest.png\" alt=\"\" width=\"566\" height=\"126\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Manifest.png 566w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Manifest-300x67.png 300w\" sizes=\"auto, (max-width: 566px) 100vw, 566px\" \/><\/p>\n<h3><strong>Mawbkhvaype.class<\/strong><\/h3>\n<p>The main task of this class is to check for a resource file available in the Jar bundle. Here, resource mzesvhbami is a vbs file. <strong><em>Mawbkhvaye.class<\/em><\/strong> will check for <strong><em>mzesvhbami<\/em><\/strong> in the resource section and later drop <strong><em>bymqzbfsrg.vbs<\/em><\/strong> in the user\u2019s Home directory before executing it with the help of wscript.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-94316\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/02\/wscript1.png\" alt=\"\" width=\"744\" height=\"245\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/wscript1.png 744w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/wscript1-300x99.png 300w\" sizes=\"auto, (max-width: 744px) 100vw, 744px\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-94317\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/02\/wscript2.png\" alt=\"\" width=\"1011\" height=\"90\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/wscript2.png 1011w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/wscript2-300x27.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/wscript2-768x68.png 768w\" sizes=\"auto, (max-width: 1011px) 100vw, 1011px\" \/><\/p>\n<h3><strong>Bymqzbfsrg.vbs<\/strong><\/h3>\n<p>It has a huge chunk of obfuscated base64 encoded data present. The below snippet shows the partial part of <em>Bymqzbfsrg.vbs script.<\/em><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-94318\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/02\/Script.png\" alt=\"\" width=\"527\" height=\"696\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Script.png 527w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Script-227x300.png 227w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Script-379x500.png 379w\" sizes=\"auto, (max-width: 527px) 100vw, 527px\" \/><\/p>\n<p>Once deobfuscated and decoded, the base64 encoded data converts to ntfsmgr.jar and is dropped in %appdata%\/Roaming. The below snippet shows the conversion of base64 encoded data into Jar file:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-94319\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/02\/JAR-file.png\" alt=\"\" width=\"609\" height=\"518\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/JAR-file.png 609w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/JAR-file-300x255.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/JAR-file-588x500.png 588w\" sizes=\"auto, (max-width: 609px) 100vw, 609px\" \/><\/p>\n<p><em>Decoded to JAR file (ntfsmgr.jar)<\/em><\/p>\n<p><strong>Ntfsmgr.jar <\/strong><\/p>\n<p>Here, important files present in ntfsmgr.jar are drop.box, mega.download and sky.drive which will be used later for creating the configuration file for the malware.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-94320\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/02\/Ntfsmgr.png\" alt=\"\" width=\"725\" height=\"308\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Ntfsmgr.png 725w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Ntfsmgr-300x127.png 300w\" sizes=\"auto, (max-width: 725px) 100vw, 725px\" \/><\/p>\n<h3><strong>Final Payload:<\/strong><\/h3>\n<p>Ntfsmgr.jar has <em>operational.<strong>Jrat<\/strong><\/em> as the main class. The purpose of <em>operational.<strong>Jrat<\/strong><\/em> is to drop another .jar file into the %TEMP% folder with random file name [underscore] [dot] [random numbers] [dot] class, e.g. _0.1234567897654265678.class, which will be the actual payload and later will perform malicious activities on the user\u2019s system. The below snippet shows the routine present in <em>operational.<strong>Jrat <\/strong>for creation of the final payload in %TEMP% location<\/em>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-94321\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/02\/Snippet.png\" alt=\"\" width=\"722\" height=\"293\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Snippet.png 722w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Snippet-300x122.png 300w\" sizes=\"auto, (max-width: 722px) 100vw, 722px\" \/><\/p>\n<p>The contents of Manifest.MF looks somewhat similar to ntfsmgr.jar. All the other files in the final Java archive will be decrypted on the fly and will infect the system. After Adwind successfully infects a system, we have seen it log keystrokes, modify and delete files, download and execute further malware, take screenshots, access the system\u2019s camera, take control of the mouse and keyboard, update itself, and more. We are not going to dig into this threat in this direction now but you can read more about Adwind <a href=\"https:\/\/kc.mcafee.com\/resources\/sites\/MCAFEE\/content\/live\/PRODUCT_DOCUMENTATION\/26000\/PD26278\/en_US\/McAfee_Labs_Threat_Advisory_Adwind.pdf\" target=\"_blank\" rel=\"noopener\">here<\/a> and <a href=\"https:\/\/www.mcafee.com\/enterprise\/en-us\/assets\/reports\/rp-quarterly-threats-mar-2016.pdf\" target=\"_blank\" rel=\"noopener\">here<\/a>. In this blog we will now discuss another part of the story, <em>Bymqzbfsrg.vbs<\/em><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-94322\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/02\/Bymqzbfsrg.png\" alt=\"\" width=\"725\" height=\"295\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Bymqzbfsrg.png 725w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Bymqzbfsrg-300x122.png 300w\" sizes=\"auto, (max-width: 725px) 100vw, 725px\" \/><\/p>\n<h3><strong>Working of Bymqzbfsrg.vbs <\/strong><\/h3>\n<p>After successful execution, Bymqzbfsrg.vbs drops <em>ntfsmgr.jar<\/em> and <em>sKXoevtgAv.vbs<\/em> in %appdata%\/Roaming.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-94323\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/02\/Execution.png\" alt=\"\" width=\"696\" height=\"301\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Execution.png 696w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Execution-300x130.png 300w\" sizes=\"auto, (max-width: 696px) 100vw, 696px\" \/><\/p>\n<p><em>Bymqzbfsrg.vbs<\/em> dynamically executes a method <em>naira<\/em> inside the script by using <strong><em>ExecuteGlobal<\/em>, as seen in the below snippet.<\/strong>:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-94324\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/02\/Naira.png\" alt=\"\" width=\"496\" height=\"197\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Naira.png 496w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Naira-300x119.png 300w\" sizes=\"auto, (max-width: 496px) 100vw, 496px\" \/><\/p>\n<p>Dynamic execution of the script looks like this:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-94325\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/02\/Dynamic-execution.png\" alt=\"\" width=\"850\" height=\"130\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Dynamic-execution.png 850w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Dynamic-execution-300x46.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Dynamic-execution-768x117.png 768w\" sizes=\"auto, (max-width: 850px) 100vw, 850px\" \/><\/p>\n<p>The below snippet shows the script for dropping <em>sKXoevtgAv.vbs in %appdata%Roaming.<\/em><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-94326\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/02\/Script-drop.png\" alt=\"\" width=\"640\" height=\"78\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Script-drop.png 640w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Script-drop-300x37.png 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/p>\n<p>Here we see the script for dropping <em>ntfsmgr in %appdata%Roaming. <\/em><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-94327\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/02\/Script-drop2.png\" alt=\"\" width=\"509\" height=\"102\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Script-drop2.png 509w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Script-drop2-300x60.png 300w\" sizes=\"auto, (max-width: 509px) 100vw, 509px\" \/><\/p>\n<p>At the time of execution, <em>sKXoevtgAv.vbs<\/em> decodes itself to Houdini vbs worm which is the final payload. The first few lines of the script are as follows:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-94328\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/02\/Houdini.png\" alt=\"\" width=\"679\" height=\"511\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Houdini.png 679w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Houdini-300x226.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Houdini-664x500.png 664w\" sizes=\"auto, (max-width: 679px) 100vw, 679px\" \/><\/p>\n<p>The attacker may perform many malicious activities on the victim\u2019s machine, including::<\/p>\n<ul>\n<li>Downloading and executing files on the victim\u2019s machine<\/li>\n<li>Running command instructions<\/li>\n<li>Updating or uninstalling a copy of itself<\/li>\n<li>Downloading and uploading files<\/li>\n<li>Deleting a file or folder<\/li>\n<li>Terminating certain process<\/li>\n<\/ul>\n<p>Enumerating files and folders on the victim\u2019s machine<\/p>\n<h3><strong>Additional Points: <\/strong><\/h3>\n<ol>\n<li>For persistence it creates a run entry.<\/li>\n<\/ol>\n<p>When the ntfsmgtr.jar runs, it adds itself into the start-up so that it will be run whenever the system starts.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-94329\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/02\/Start-up.png\" alt=\"\" width=\"905\" height=\"121\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Start-up.png 905w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Start-up-300x40.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Start-up-768x103.png 768w\" sizes=\"auto, (max-width: 905px) 100vw, 905px\" \/><\/p>\n<ol start=\"2\">\n<li>It checks for installed anti-malware products on the system.<\/li>\n<\/ol>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-94330\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/02\/Anti-malware.png\" alt=\"\" width=\"729\" height=\"152\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Anti-malware.png 729w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Anti-malware-300x63.png 300w\" sizes=\"auto, (max-width: 729px) 100vw, 729px\" \/><\/p>\n<ol start=\"3\">\n<li>If available, it copies the installed Java Runtime files to a temporary directory within the victim&#8217;s home directory, otherwise it downloads from the web and copies in the same directory.<\/li>\n<\/ol>\n<h2>Conclusion:<\/h2>\n<p>In past, we have seen threat actors using two similar functioning malware families in a single infection. Usually, threat actors chose this path for higher probability of successful infection.<\/p>\n<p>The hashes used in the analysis:<\/p>\n<p>Sample.jar: <em>07cb6297b47c007aab43311fcfa9976158b4149961911f42d96783afc517226a<\/em><\/p>\n<p>Ntfsmgr.jar: <em>ee868807a4261a418e02b0fb1de7ee7a8900acfb66855ce46628eb5ab9b1d029<\/em><\/p>\n<p>McAfee advises users to keep their antimalware signatures up to date at all times. McAfee products detect the malicious jar files as Adwind-FDVH.jar! [Partial hash] and Adwind-FDVJ.jar! [Partial Hash], with DAT Versions 9137 and later.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Adwind remote administration tool (RAT) is a Java-based backdoor Trojan that targets various platforms supporting Java files. For an&#8230;<\/p>\n","protected":false},"author":674,"featured_media":93005,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[],"coauthors":[3973],"class_list":["post-94312","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mcafee-labs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>JAVA-VBS Joint Exercise Delivers RAT | McAfee Blog<\/title>\n<meta name=\"description\" content=\"The Adwind remote administration tool (RAT) is a Java-based backdoor Trojan that targets various platforms supporting Java files. For an infection to\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"JAVA-VBS Joint Exercise Delivers RAT | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"The Adwind remote administration tool (RAT) is a Java-based backdoor Trojan that targets various platforms supporting Java files. For an infection to\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/java-vbs-joint-exercise-delivers-rat\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-01T16:00:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-19T03:14:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/12\/Digitally-Generated-Image-of-Online-Virus-Concept.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2048\" \/>\n\t<meta property=\"og:image:height\" content=\"1415\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/java-vbs-joint-exercise-delivers-rat\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/java-vbs-joint-exercise-delivers-rat\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"JAVA-VBS Joint Exercise Delivers RAT\",\"datePublished\":\"2019-03-01T16:00:15+00:00\",\"dateModified\":\"2024-02-19T03:14:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/java-vbs-joint-exercise-delivers-rat\/\"},\"wordCount\":929,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/java-vbs-joint-exercise-delivers-rat\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/12\/Digitally-Generated-Image-of-Online-Virus-Concept.jpg\",\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/java-vbs-joint-exercise-delivers-rat\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/java-vbs-joint-exercise-delivers-rat\/\",\"name\":\"JAVA-VBS Joint Exercise Delivers RAT | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/java-vbs-joint-exercise-delivers-rat\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/java-vbs-joint-exercise-delivers-rat\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/12\/Digitally-Generated-Image-of-Online-Virus-Concept.jpg\",\"datePublished\":\"2019-03-01T16:00:15+00:00\",\"dateModified\":\"2024-02-19T03:14:26+00:00\",\"description\":\"The Adwind remote administration tool (RAT) is a Java-based backdoor Trojan that targets various platforms supporting Java files. For an infection to\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/java-vbs-joint-exercise-delivers-rat\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/java-vbs-joint-exercise-delivers-rat\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/java-vbs-joint-exercise-delivers-rat\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/12\/Digitally-Generated-Image-of-Online-Virus-Concept.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/12\/Digitally-Generated-Image-of-Online-Virus-Concept.jpg\",\"width\":2048,\"height\":1415},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/java-vbs-joint-exercise-delivers-rat\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"JAVA-VBS Joint Exercise Delivers RAT\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"JAVA-VBS Joint Exercise Delivers RAT | McAfee Blog","description":"The Adwind remote administration tool (RAT) is a Java-based backdoor Trojan that targets various platforms supporting Java files. For an infection to","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"JAVA-VBS Joint Exercise Delivers RAT | McAfee Blog","og_description":"The Adwind remote administration tool (RAT) is a Java-based backdoor Trojan that targets various platforms supporting Java files. For an infection to","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/java-vbs-joint-exercise-delivers-rat\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2019-03-01T16:00:15+00:00","article_modified_time":"2024-02-19T03:14:26+00:00","og_image":[{"width":2048,"height":1415,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/12\/Digitally-Generated-Image-of-Online-Virus-Concept.jpg","type":"image\/jpeg"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/java-vbs-joint-exercise-delivers-rat\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/java-vbs-joint-exercise-delivers-rat\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"JAVA-VBS Joint Exercise Delivers RAT","datePublished":"2019-03-01T16:00:15+00:00","dateModified":"2024-02-19T03:14:26+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/java-vbs-joint-exercise-delivers-rat\/"},"wordCount":929,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/java-vbs-joint-exercise-delivers-rat\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/12\/Digitally-Generated-Image-of-Online-Virus-Concept.jpg","articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/java-vbs-joint-exercise-delivers-rat\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/java-vbs-joint-exercise-delivers-rat\/","name":"JAVA-VBS Joint Exercise Delivers RAT | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/java-vbs-joint-exercise-delivers-rat\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/java-vbs-joint-exercise-delivers-rat\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/12\/Digitally-Generated-Image-of-Online-Virus-Concept.jpg","datePublished":"2019-03-01T16:00:15+00:00","dateModified":"2024-02-19T03:14:26+00:00","description":"The Adwind remote administration tool (RAT) is a Java-based backdoor Trojan that targets various platforms supporting Java files. For an infection to","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/java-vbs-joint-exercise-delivers-rat\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/java-vbs-joint-exercise-delivers-rat\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/java-vbs-joint-exercise-delivers-rat\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/12\/Digitally-Generated-Image-of-Online-Virus-Concept.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/12\/Digitally-Generated-Image-of-Online-Virus-Concept.jpg","width":2048,"height":1415},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/java-vbs-joint-exercise-delivers-rat\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"JAVA-VBS Joint Exercise Delivers RAT"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/94312","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=94312"}],"version-history":[{"count":1,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/94312\/revisions"}],"predecessor-version":[{"id":182953,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/94312\/revisions\/182953"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/93005"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=94312"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=94312"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=94312"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=94312"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}