{"id":2393,"date":"2026-05-13T15:52:05","date_gmt":"2026-05-13T13:52:05","guid":{"rendered":"https:\/\/cyber-detect.com\/reverse-analysis-of-malware-distributed-by-the-supply-chain-attack-on-jdownloader\/"},"modified":"2026-05-13T16:19:36","modified_gmt":"2026-05-13T14:19:36","slug":"reverse-analysis-of-malware-distributed-by-the-supply-chain-attack-on-jdownloader","status":"publish","type":"post","link":"https:\/\/cyber-detect.com\/en\/reverse-analysis-of-malware-distributed-by-the-supply-chain-attack-on-jdownloader\/","title":{"rendered":"[Reverse] Analysis of malware distributed by the Supply-chain attack on JDownloader"},"content":{"rendered":"<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>The JDownloader website was compromised in early May 2026 and distributed a modified version of the Windows and Linux installers of JDownloader <em>(<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/jdownloader-site-hacked-to-replace-installers-with-python-rat-malware\/\">https:\/\/www.bleepingcomputer.com\/news\/security\/jdownloader-site-hacked-to-replace-installers-with-python-rat-malware\/<\/a>)<\/em>, a Supply-Chain attack. This type of supply chain compromise attack is particularly formidable, as it exploits the legitimacy of the official website to infect unsuspecting users.<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>The compromised versions of the JDownloader installer contain a loader (stage 2) that executes a Python RAT (stage 3) after disabling the antivirus software on the infected machine.  <\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p><\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"337\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2026\/05\/image-1-1024x337.png\" alt=\"\" class=\"wp-image-2366\" srcset=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2026\/05\/image-1-1024x337.png 1024w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2026\/05\/image-1-300x99.png 300w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2026\/05\/image-1-768x252.png 768w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2026\/05\/image-1.png 1080w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p><em>Attack summary<\/em><\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>We present here an analysis of this malware (md5: d3b398a757b424f91e645985ade00516)based on the results of our Gorille analysis engine. Gorille will verify the integrity of JDownloader installers by comparing functionalities with previously identified malicious functionalities.<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p><\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p><\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<h2 class=\"wp-block-heading\">Identifying the malicious function with Gorille<\/h2>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p><\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"253\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2026\/05\/Screenshot-from-2026-05-12-11-23-54-1024x253.png\" alt=\"\" class=\"wp-image-2387\" srcset=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2026\/05\/Screenshot-from-2026-05-12-11-23-54-1024x253.png 1024w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2026\/05\/Screenshot-from-2026-05-12-11-23-54-300x74.png 300w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2026\/05\/Screenshot-from-2026-05-12-11-23-54-768x190.png 768w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2026\/05\/Screenshot-from-2026-05-12-11-23-54-1536x379.png 1536w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2026\/05\/Screenshot-from-2026-05-12-11-23-54.png 1619w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p> <em>Main view of Gorille analysis<\/em><\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p><\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>The installer is detected by Gorille as sharing common code with several different malware. It successfully identified a malicious modification of the JDownloader installer. <a href=\"https:\/\/demo.gorille.tech\/file\/detail\/6a042237cffac4adba7e6679?publicToken=bqWXvnHnrgfjsWZNAoiubLGOb7eWDoxL1rQnjqn6Je8\"><a href=\"https:\/\/demo.gorille.tech\/file\/detail\/6a0483aafa6bd8c8ea7e71a4?publicToken=EDzRHRCguQnhVVUeB6b5ECJ_uqlVTGJjZYbWZLfAxOQ\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/demo.gorille.tech\/file\/detail\/6a0483aafa6bd8c8ea7e71a4?publicToken=EDzRHRCguQnhVVUeB6b5ECJ_uqlVTGJjZYbWZLfAxOQ<\/a><\/a><\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"715\" height=\"381\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2026\/05\/image-2.png\" alt=\"\" class=\"wp-image-2369\" srcset=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2026\/05\/image-2.png 715w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2026\/05\/image-2-300x160.png 300w\" sizes=\"auto, (max-width: 715px) 100vw, 715px\" \/><\/figure>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p><em>Description of similarities in Gorille analysis<\/em><\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"258\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2026\/05\/image-3-1024x258.png\" alt=\"\" class=\"wp-image-2371\" srcset=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2026\/05\/image-3-1024x258.png 1024w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2026\/05\/image-3-300x76.png 300w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2026\/05\/image-3-768x194.png 768w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2026\/05\/image-3-1536x387.png 1536w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2026\/05\/image-3.png 1603w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p><em>Display of Gorille similarity addresses \u2013 reverse engineering aid<\/em><\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p><\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p><\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>Gorille analysis goes further by targeting the problematic functionality in the compromised JDownloader installer code. To do this, simply list the addresses identified as malicious code. These addresses in the compromised JDownloader installer code target a very specific area of the installer: the sub_1400019e0 function.<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"610\" height=\"329\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2026\/05\/image-4.png\" alt=\"\" class=\"wp-image-2373\" srcset=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2026\/05\/image-4.png 610w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2026\/05\/image-4-300x162.png 300w\" sizes=\"auto, (max-width: 610px) 100vw, 610px\" \/><\/figure>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p><em>Malicious function in the JDownloader installer <\/em><\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>This function notably performs a PEB walk to hide API calls \u2014 a highly suspicious behavior common to many malware \u2014 that Gorille is capable of detecting. This function notably performs a PEB walk to hide API calls \u2014 a highly suspicious behavior common to many malware \u2014 that Gorille is capable of detecting. <\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p><\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p><\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<h2 class=\"wp-block-heading\">Gorille put us on the right track to begin analysis<\/h2>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>The explainability of Gorille results allows us to retrieve the exact locations it considers suspicious, enabling the function to be linked to functions that may have already been analyzed by reverse engineering teams. Here we immediately identified the API hashing function through similarity with other malware using the same type of functionality. <\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p><a><\/a><a><\/a>Here we immediately identified the API hashing function through similarity with other malware using the same type of functionality.<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p><\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p><\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<h2 class=\"wp-block-heading\"><a><\/a>In-depth analysis of the malicious function<\/h2>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>In this sub_1400019e0 function, we distinguish hidden calls to APIs, notably WriteFile and ShellExecute. We also identify a decryption loop: an xor that decrypts two files with the key ectb<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"801\" height=\"755\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2026\/05\/image-5.png\" alt=\"\" class=\"wp-image-2375\" srcset=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2026\/05\/image-5.png 801w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2026\/05\/image-5-300x283.png 300w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2026\/05\/image-5-768x724.png 768w\" sizes=\"auto, (max-width: 801px) 100vw, 801px\" \/><\/figure>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<ul class=\"wp-block-list\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<li>A file &#8220;BIN1&#8221;, legitimate file that launches the legitimate JDownloader installer<\/li>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<li>A file &#8220;BIN2&#8221;, the stage 2 loader that is dropped in Temp. This loader disables several antivirus programs and launches the Python RAT. <\/li>\n<\/div><\/div><\/div><\/ul>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p><\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"359\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2026\/05\/image-6-1024x359.png\" alt=\"\" class=\"wp-image-2377\" srcset=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2026\/05\/image-6-1024x359.png 1024w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2026\/05\/image-6-300x105.png 300w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2026\/05\/image-6-768x269.png 768w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2026\/05\/image-6-1536x539.png 1536w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2026\/05\/image-6-2048x718.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p><em>Stage 2 Loader decryption loop<\/em><\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"414\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2026\/05\/image-7-1024x414.png\" alt=\"\" class=\"wp-image-2379\" srcset=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2026\/05\/image-7-1024x414.png 1024w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2026\/05\/image-7-300x121.png 300w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2026\/05\/image-7-768x310.png 768w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2026\/05\/image-7-1536x620.png 1536w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2026\/05\/image-7-2048x827.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p><em>Writing the temporary file containing the Stage 2 Loader<\/em><\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p><\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"376\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2026\/05\/image-8-1024x376.png\" alt=\"\" class=\"wp-image-2381\" srcset=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2026\/05\/image-8-1024x376.png 1024w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2026\/05\/image-8-300x110.png 300w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2026\/05\/image-8-768x282.png 768w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2026\/05\/image-8-1536x563.png 1536w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2026\/05\/image-8-2048x751.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p><em>Stage 2 Loader execution<\/em><\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p><\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p><\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>Once executed, the strings corresponding to the registry and Python script launch are decrypted on the fly with the key: fywo<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"656\" height=\"779\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2026\/05\/image-9.png\" alt=\"\" class=\"wp-image-2383\" srcset=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2026\/05\/image-9.png 656w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2026\/05\/image-9-253x300.png 253w\" sizes=\"auto, (max-width: 656px) 100vw, 656px\" \/><\/figure>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p><em>Encrypted strings in the Stage 2 Loader code<\/em><\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p><\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>Once decrypted, we distinguish the following strings :<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<pre class=\"wp-block-code\"><code>sub_140003320\nRegistry Manipulation, Deactivate Real-Time protection, ...&nbsp;\n&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;SOFTWARE\\Policies\\Microsoft\\Windows Defender&nbsp;\n&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;DisableAntiSpyware&nbsp;\n&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;SOFTWARE\\Policies\\Microsoft\\Windows Defender\\Real-Time Protection&nbsp;\n&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;DisableRealtimeMonitoring&nbsp;\n&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;SOFTWARE\\Policies\\Microsoft\\Windows Defender Security Center\\Account protection&nbsp;\n&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;SOFTWARE\\Policies\\Microsoft\\Windows Defender Security Center\\App and Browser protection&nbsp;\n&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;SOFTWARE\\Policies\\Microsoft\\Windows Defender Security Center\\Device performance and health&nbsp;\n&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;SOFTWARE\\Policies\\Microsoft\\Windows Defender Security Center\\Family options&nbsp;\n&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;SOFTWARE\\Policies\\Microsoft\\Windows Defender Security Center\\Firewall and Network protection&nbsp;\n&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;SOFTWARE\\Policies\\Microsoft\\Windows Defender Security Center\\Virus and threat protection&nbsp;\n&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;\\Policies\\Microsoft\\Windows\\WindowsUpdate\n <\/code><\/pre>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>The stage 2 loader installs its own &#8220;pythonw.exe&#8221; interpreter and installs various libraries for the malicious Python script, notably cryptography and request which will be used to contact the C2s.<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>The loader executes the malicious Python script packed by PyArmor<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<pre class=\"wp-block-code\"><code>unk_14002eff0 (Installation RunTime) &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;\\pythonw.exe -m pip install --timeout 30 --retries 99999 -U pywin32 cryptography msvc-runtime gevent requests requests&#91;socks]<br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<br>sub_14000ADD0 runPython:&nbsp;<br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;PYTHON314_INSTALLER&nbsp;<br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;\/quiet Include_tcltk=0 Include_test=0 Include_doc=0 Shortcuts=0 AppendPath=1&nbsp;<br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;C:\\Program Files\\Python314&nbsp;<br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;BIN1&nbsp;<br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;BIN2&nbsp;<br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;BIN3&nbsp;<br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;\\Lib\\runtime.py&nbsp;<br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;\\Lib\\pyarmor_runtime_000000&nbsp;<br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;\\Lib\\pyarmor_runtime_000000\\__init__.py&nbsp;<br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;\\Lib\\pyarmor_runtime_000000\\pyarmor_runtime.pyd&nbsp;<br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;pythonw.exe&nbsp;<br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;HKCU\\SOFTWARE\\Python<\/code><\/pre>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p><\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p><\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<h2 class=\"wp-block-heading\">Assessment of using Gorille to detect Supply-Chain attacks<\/h2>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>Gorille is an effective tool in this Supply-chain attack context, allowing as shown here to immediately identify the JDownloader compromise. But it also goes further to accelerate the analysis of the compromise, which is an essential step to understand the real impact of the attack on systems that downloaded the compromised version of JDownloader. <\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p><\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<h2 class=\"wp-block-heading\">IOCs<\/h2>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td>d3b398a757b424f91e645985ade00516<\/td><td>Compromised JDownloader installer (Windows version)<\/td><\/tr><tr><td>0721d27c2530ee11b92ed67d8aae29be<\/td><td>Loader stage 2 (BIN2)<\/td><\/tr><tr><td>parkspringshotel[.]com\/m\/Lu6aeloo.php auraguest[.]lk\/m\/douV2quu.php 172.96.172.91 209.133.215.178<\/td><td>C2 servers<\/td><\/tr><\/tbody><\/table><\/figure>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td>eb8efd7edf031bcebca058569960ff0d<\/td><td>AES-GCM key obtained from pyarmor_runtime.pyd<\/td><\/tr><tr><td>fywo<\/td><td>Xor key stage 2 to decrypt loader code<\/td><\/tr><tr><td>ectb<\/td><td><a><\/a>Xor Key stage 1 to decrypt loader<\/td><\/tr><\/tbody><\/table><\/figure>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p><\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<h2 class=\"wp-block-heading\">References<\/h2>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>Gorille analysis of the corrupted JDownloader installation program :<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<ul class=\"wp-block-list\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<li><a href=\"https:\/\/demo.gorille.tech\/file\/detail\/6a0483aafa6bd8c8ea7e71a4?publicToken=EDzRHRCguQnhVVUeB6b5ECJ_uqlVTGJjZYbWZLfAxOQ\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/demo.gorille.tech\/file\/detail\/6a0483aafa6bd8c8ea7e71a4?publicToken=EDzRHRCguQnhVVUeB6b5ECJ_uqlVTGJjZYbWZLfAxOQ<\/a><\/li>\n<\/div><\/div><\/div><\/ul>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>Article about this attack<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<ul class=\"wp-block-list\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<li><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/jdownloader-site-hacked-to-replace-installers-with-python-rat-malware\/\">https:\/\/www.bleepingcomputer.com\/news\/security\/jdownloader-site-hacked-to-replace-installers-with-python-rat-malware\/<\/a><\/li>\n<\/div><\/div><\/div><\/ul>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>People who also shared their analysis of this malware when we completed writing this article :<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<ul class=\"wp-block-list\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<li><a href=\"https:\/\/x.com\/thomasklemenc\/status\/2052725993215852693\">https:\/\/x.com\/thomasklemenc\/status\/2052725993215852693<\/a><\/li>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<li><a href=\"https:\/\/www.reddit.com\/r\/jdownloader\/comments\/1t6goqe\/is_the_website_hacked\/\">https:\/\/www.reddit.com\/r\/jdownloader\/comments\/1t6goqe\/is_the_website_hacked\/<\/a><\/li>\n<\/div><\/div><\/div><\/ul>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>PyArmor key extraction<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<ul class=\"wp-block-list\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<li><a href=\"https:\/\/github.com\/GDATAAdvancedAnalytics\/Pyarmor-Tooling\">https:\/\/github.com\/GDATAAdvancedAnalytics\/Pyarmor-Tooling<\/a><\/li>\n<\/div><\/div><\/div><\/ul>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p><\/p>\n<\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>The JDownloader website was compromised in early May 2026 and distributed a modified version of the Windows and Linux installers of JDownloader, a Supply-chain attack.<\/p>\n","protected":false},"author":1,"featured_media":2391,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[13],"tags":[],"class_list":["post-2393","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualites-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>[Reverse] Analysis of malware distributed by the Supply-chain attack on JDownloader - Cyber-Detect<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cyber-detect.com\/en\/reverse-analysis-of-malware-distributed-by-the-supply-chain-attack-on-jdownloader\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"[Reverse] Analysis of malware distributed by the Supply-chain attack on JDownloader - Cyber-Detect\" \/>\n<meta property=\"og:description\" content=\"The JDownloader website was compromised in early May 2026 and distributed a modified version of the Windows and Linux installers of JDownloader, a Supply-chain attack.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cyber-detect.com\/en\/reverse-analysis-of-malware-distributed-by-the-supply-chain-attack-on-jdownloader\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber-Detect\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-13T13:52:05+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-13T14:19:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2026\/05\/ChatGPT-Image-13-mai-2026-14_47_10-1024x683.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"683\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"adminbilliotte\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"adminbilliotte\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/cyber-detect.com\/en\/reverse-analysis-of-malware-distributed-by-the-supply-chain-attack-on-jdownloader\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/cyber-detect.com\/en\/reverse-analysis-of-malware-distributed-by-the-supply-chain-attack-on-jdownloader\/\"},\"author\":{\"name\":\"adminbilliotte\",\"@id\":\"https:\/\/cyber-detect.com\/en\/#\/schema\/person\/9bc85be73e00a52bbc3294f538e0ae47\"},\"headline\":\"[Reverse] Analysis of malware distributed by the Supply-chain attack on JDownloader\",\"datePublished\":\"2026-05-13T13:52:05+00:00\",\"dateModified\":\"2026-05-13T14:19:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/cyber-detect.com\/en\/reverse-analysis-of-malware-distributed-by-the-supply-chain-attack-on-jdownloader\/\"},\"wordCount\":752,\"publisher\":{\"@id\":\"https:\/\/cyber-detect.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/cyber-detect.com\/en\/reverse-analysis-of-malware-distributed-by-the-supply-chain-attack-on-jdownloader\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2026\/05\/ChatGPT-Image-13-mai-2026-14_47_10.png\",\"articleSection\":[\"Actualit\u00e9s\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cyber-detect.com\/en\/reverse-analysis-of-malware-distributed-by-the-supply-chain-attack-on-jdownloader\/\",\"url\":\"https:\/\/cyber-detect.com\/en\/reverse-analysis-of-malware-distributed-by-the-supply-chain-attack-on-jdownloader\/\",\"name\":\"[Reverse] Analysis of malware distributed by the Supply-chain attack on JDownloader - Cyber-Detect\",\"isPartOf\":{\"@id\":\"https:\/\/cyber-detect.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cyber-detect.com\/en\/reverse-analysis-of-malware-distributed-by-the-supply-chain-attack-on-jdownloader\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cyber-detect.com\/en\/reverse-analysis-of-malware-distributed-by-the-supply-chain-attack-on-jdownloader\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2026\/05\/ChatGPT-Image-13-mai-2026-14_47_10.png\",\"datePublished\":\"2026-05-13T13:52:05+00:00\",\"dateModified\":\"2026-05-13T14:19:36+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/cyber-detect.com\/en\/reverse-analysis-of-malware-distributed-by-the-supply-chain-attack-on-jdownloader\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cyber-detect.com\/en\/reverse-analysis-of-malware-distributed-by-the-supply-chain-attack-on-jdownloader\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cyber-detect.com\/en\/reverse-analysis-of-malware-distributed-by-the-supply-chain-attack-on-jdownloader\/#primaryimage\",\"url\":\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2026\/05\/ChatGPT-Image-13-mai-2026-14_47_10.png\",\"contentUrl\":\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2026\/05\/ChatGPT-Image-13-mai-2026-14_47_10.png\",\"width\":1536,\"height\":1024},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cyber-detect.com\/en\/reverse-analysis-of-malware-distributed-by-the-supply-chain-attack-on-jdownloader\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cyber-detect.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"[Reverse] Analysis of malware distributed by the Supply-chain attack on JDownloader\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cyber-detect.com\/en\/#website\",\"url\":\"https:\/\/cyber-detect.com\/en\/\",\"name\":\"Cyber-Detect\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/cyber-detect.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cyber-detect.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cyber-detect.com\/en\/#organization\",\"name\":\"Cyber-Detect\",\"url\":\"https:\/\/cyber-detect.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cyber-detect.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/08\/AI-CYBER-DETECT-MORPHOLOGICAL-ANALYSIS-PAYSAGE-RGB-white-vecto.svg\",\"contentUrl\":\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/08\/AI-CYBER-DETECT-MORPHOLOGICAL-ANALYSIS-PAYSAGE-RGB-white-vecto.svg\",\"width\":728,\"height\":242,\"caption\":\"Cyber-Detect\"},\"image\":{\"@id\":\"https:\/\/cyber-detect.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/cyber-detect.com\/en\/#\/schema\/person\/9bc85be73e00a52bbc3294f538e0ae47\",\"name\":\"adminbilliotte\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cyber-detect.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e8ef84d61786269a92f9010e4333520a29594c88cc4f2c10f2805d592432d683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e8ef84d61786269a92f9010e4333520a29594c88cc4f2c10f2805d592432d683?s=96&d=mm&r=g\",\"caption\":\"adminbilliotte\"},\"url\":\"https:\/\/cyber-detect.com\/en\/author\/adminbilliotte\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"[Reverse] Analysis of malware distributed by the Supply-chain attack on JDownloader - Cyber-Detect","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cyber-detect.com\/en\/reverse-analysis-of-malware-distributed-by-the-supply-chain-attack-on-jdownloader\/","og_locale":"en_US","og_type":"article","og_title":"[Reverse] Analysis of malware distributed by the Supply-chain attack on JDownloader - Cyber-Detect","og_description":"The JDownloader website was compromised in early May 2026 and distributed a modified version of the Windows and Linux installers of JDownloader, a Supply-chain attack.","og_url":"https:\/\/cyber-detect.com\/en\/reverse-analysis-of-malware-distributed-by-the-supply-chain-attack-on-jdownloader\/","og_site_name":"Cyber-Detect","article_published_time":"2026-05-13T13:52:05+00:00","article_modified_time":"2026-05-13T14:19:36+00:00","og_image":[{"width":1024,"height":683,"url":"https:\/\/cyber-detect.com\/wp-content\/uploads\/2026\/05\/ChatGPT-Image-13-mai-2026-14_47_10-1024x683.png","type":"image\/png"}],"author":"adminbilliotte","twitter_card":"summary_large_image","twitter_misc":{"Written by":"adminbilliotte","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cyber-detect.com\/en\/reverse-analysis-of-malware-distributed-by-the-supply-chain-attack-on-jdownloader\/#article","isPartOf":{"@id":"https:\/\/cyber-detect.com\/en\/reverse-analysis-of-malware-distributed-by-the-supply-chain-attack-on-jdownloader\/"},"author":{"name":"adminbilliotte","@id":"https:\/\/cyber-detect.com\/en\/#\/schema\/person\/9bc85be73e00a52bbc3294f538e0ae47"},"headline":"[Reverse] Analysis of malware distributed by the Supply-chain attack on JDownloader","datePublished":"2026-05-13T13:52:05+00:00","dateModified":"2026-05-13T14:19:36+00:00","mainEntityOfPage":{"@id":"https:\/\/cyber-detect.com\/en\/reverse-analysis-of-malware-distributed-by-the-supply-chain-attack-on-jdownloader\/"},"wordCount":752,"publisher":{"@id":"https:\/\/cyber-detect.com\/en\/#organization"},"image":{"@id":"https:\/\/cyber-detect.com\/en\/reverse-analysis-of-malware-distributed-by-the-supply-chain-attack-on-jdownloader\/#primaryimage"},"thumbnailUrl":"https:\/\/cyber-detect.com\/wp-content\/uploads\/2026\/05\/ChatGPT-Image-13-mai-2026-14_47_10.png","articleSection":["Actualit\u00e9s"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/cyber-detect.com\/en\/reverse-analysis-of-malware-distributed-by-the-supply-chain-attack-on-jdownloader\/","url":"https:\/\/cyber-detect.com\/en\/reverse-analysis-of-malware-distributed-by-the-supply-chain-attack-on-jdownloader\/","name":"[Reverse] Analysis of malware distributed by the Supply-chain attack on JDownloader - Cyber-Detect","isPartOf":{"@id":"https:\/\/cyber-detect.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cyber-detect.com\/en\/reverse-analysis-of-malware-distributed-by-the-supply-chain-attack-on-jdownloader\/#primaryimage"},"image":{"@id":"https:\/\/cyber-detect.com\/en\/reverse-analysis-of-malware-distributed-by-the-supply-chain-attack-on-jdownloader\/#primaryimage"},"thumbnailUrl":"https:\/\/cyber-detect.com\/wp-content\/uploads\/2026\/05\/ChatGPT-Image-13-mai-2026-14_47_10.png","datePublished":"2026-05-13T13:52:05+00:00","dateModified":"2026-05-13T14:19:36+00:00","breadcrumb":{"@id":"https:\/\/cyber-detect.com\/en\/reverse-analysis-of-malware-distributed-by-the-supply-chain-attack-on-jdownloader\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cyber-detect.com\/en\/reverse-analysis-of-malware-distributed-by-the-supply-chain-attack-on-jdownloader\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyber-detect.com\/en\/reverse-analysis-of-malware-distributed-by-the-supply-chain-attack-on-jdownloader\/#primaryimage","url":"https:\/\/cyber-detect.com\/wp-content\/uploads\/2026\/05\/ChatGPT-Image-13-mai-2026-14_47_10.png","contentUrl":"https:\/\/cyber-detect.com\/wp-content\/uploads\/2026\/05\/ChatGPT-Image-13-mai-2026-14_47_10.png","width":1536,"height":1024},{"@type":"BreadcrumbList","@id":"https:\/\/cyber-detect.com\/en\/reverse-analysis-of-malware-distributed-by-the-supply-chain-attack-on-jdownloader\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cyber-detect.com\/en\/"},{"@type":"ListItem","position":2,"name":"[Reverse] Analysis of malware distributed by the Supply-chain attack on JDownloader"}]},{"@type":"WebSite","@id":"https:\/\/cyber-detect.com\/en\/#website","url":"https:\/\/cyber-detect.com\/en\/","name":"Cyber-Detect","description":"","publisher":{"@id":"https:\/\/cyber-detect.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cyber-detect.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cyber-detect.com\/en\/#organization","name":"Cyber-Detect","url":"https:\/\/cyber-detect.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyber-detect.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/08\/AI-CYBER-DETECT-MORPHOLOGICAL-ANALYSIS-PAYSAGE-RGB-white-vecto.svg","contentUrl":"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/08\/AI-CYBER-DETECT-MORPHOLOGICAL-ANALYSIS-PAYSAGE-RGB-white-vecto.svg","width":728,"height":242,"caption":"Cyber-Detect"},"image":{"@id":"https:\/\/cyber-detect.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/cyber-detect.com\/en\/#\/schema\/person\/9bc85be73e00a52bbc3294f538e0ae47","name":"adminbilliotte","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyber-detect.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e8ef84d61786269a92f9010e4333520a29594c88cc4f2c10f2805d592432d683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e8ef84d61786269a92f9010e4333520a29594c88cc4f2c10f2805d592432d683?s=96&d=mm&r=g","caption":"adminbilliotte"},"url":"https:\/\/cyber-detect.com\/en\/author\/adminbilliotte\/"}]}},"_links":{"self":[{"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/posts\/2393","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/comments?post=2393"}],"version-history":[{"count":6,"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/posts\/2393\/revisions"}],"predecessor-version":[{"id":2400,"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/posts\/2393\/revisions\/2400"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/media\/2391"}],"wp:attachment":[{"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/media?parent=2393"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/categories?post=2393"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/tags?post=2393"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}