Downloader Malware Written in JPHP Interpreter
A newly discovered malware utilizes JPHP, a PHP interpreter running on Java Virtual Machine, to create a downloader. The malware is distributed in a ZIP file containing Java Runtime Environment and libraries, enabling execution without a separate Java environment. It communicates with a C2 server, disables Windows Defender's behavior monitoring, and uses Telegram for additional C2 connections. The malware can download and execute additional payloads, potentially including data breach-type malware like Strrat and Danabot. This case highlights how threat actors exploit lesser-known technologies like JPHP for malware distribution, emphasizing the importance of scrutinizing executable files and scripts from various sources.
Pulse ID: 68012d9425b7ccf942f5f065
Pulse Link: https://otx.alienvault.com/pulse/68012d9425b7ccf942f5f065
Pulse Author: AlienVault
Created: 2025-04-17 16:34:28
Be advised, this data is unverified and should be considered preliminary. Always do further verification.
