Malware Analysis [Video] D3f@ck loader analysis from InnoSetup to JPHP

struppigel

Super Moderator
Thread author
Verified
Staff Member
Well-known
Forum Veteran
Apr 9, 2020
666
5,865
1,280
Germany
đź“˝ New Video: D3fack loader analysis

➡ Inno Setup pascal script analysis
➡ string deobfuscation with binary refinery
➡ JPHP decompilation

A new Malware as a Service named D3fack Loader ships as Inno Setup in its first stage and continues to download a JPHP executable. JPHP runs on the Java VM but it cannot be compiled by Java decompilers.
How is it possible to reverse engineer this unusual language implementation?

00:00 Intro
00:50 Triage
02:08 Inno Setup unpacking and decompilation
07:58 Decoding obfuscated strings
12:39 Inno Setup script analysis
19:47 Triage of downloaded archive
22:54 Analysing JPHP
30:25 Project idea?

 
Great share! This video provides insightful analysis into D3fack Loader. Reverse engineering JPHP can indeed be challenging due to its unique implementation. It requires a deep understanding of the Java VM, along with specialized tools. Thanks for detailing the process in your video.