New malware: Akemi sample uses trailing slash in class filenames to thwart static analysis and unzipping
恶意JAR文件利用类名中的尾随斜杠隐藏行为,绕过静态分析和解压。提供样本执行路径、MITRE框架映射及IP、URL等详细信息,并支持下载IOC和被修改文件。 2025-6-6 15:47:45 Author: www.vmray.com(查看原文) 阅读量:11 收藏

Skip to content

Malicious JAR uses trailing slash in class filenames to thwart static analysis and unzipping

See why we think this is malicious in plain language.

See the whole path of the sample’s execution

Map the malicious activities on the MITRE ATT&CK Framework

Explore detailed information on the IP addresses, URLs and DNS, including function logs and PCAP Streams

Download the IOCs and artifacts to have a clear picture of the threat.

Download the files that the malware downloads, drops or modifies.

Explore how you can use these insights


文章来源: https://www.vmray.com/new-malware-akemi-sample-uses-trailing-slash-in-class-filenames-to-thwart-static-analysis-and-unzipping/
如有侵权请联系:admin#unsafe.sh