New JanaWare ransomware targets Turkey via Adwind RAT | #ransomware | #cybercrime


Summary

  • The Acronis TRU team identified a threat cluster leveraging a customized Adwind (Java RAT) variant with polymorphic characteristics to deliver a ransomware module, tracked as ‘JanaWare.’

  • Analysis of malware samples, infrastructure and telemetry indicates the campaign is likely focused on Turkish users. The malware enforces execution constraints based on system locale and external IP geolocation, which likely restricts activity to systems located in Turkey.

  • Observed samples and telemetry suggest the activity has been ongoing since at least 2020. A sample compiled in November 2025 indicates that associated command-and-control infrastructure remains active. Obfuscation,
    polymorphism and geographic restrictions have likely contributed to limited visibility.

  • Victimology appears to primarily include home users and small to medium-sized businesses. Initial access is assessed to occur via phishing emails delivering malicious Java archives. Ransom demands observed in analyzed samples range from $200–$400, consistent with a low-value, high-volume monetization approach.

  • This combination of consumer- and SMB-focused victimology, low ransom demands and opportunistic targeting suggests the operation is distinct from enterprise-focused ransomware campaigns, which typically prioritize high-value targets and larger payouts.

Introduction

The investigation
began with the analysis of a customized Adwind RAT variant suspected to be
associated with ransomware activity. After collecting several JAR archive
samples from VirusTotal, we discovered that one of them behaved differently
during testing. When executed in our analysis environment, the sample dropped the
following ransom note on the test machine:

Figure 1. Ransom note left by the malware

The ransom note was written in Turkish.
Its translated content is shown below:

The attackers encourage victims to
establish contact through a secure and private channel, such as qTox — a free,
open-source desktop messaging application that operates over the Tox peer-to-peer
network. qTox is a decentralized chat client with no central servers, that
provides end-to-end encryption and is designed to protect user privacy and
anonymity. In some campaigns, however, instead of using qTox, victims were
instructed to download the Tor Browser and visit a dedicated .onion site to
communicate with the attackers.

Attack chain

Through telemetry hunting, we reconstructed
the infection sequence using EDR data, revealing how the ransomware is
delivered and executed within the victim environment. The analysis indicates
that the campaign relies on email-based phishing to initiate the attack, leading
users to download a malicious payload that ultimately results in ransomware
execution. The overall infection flow is illustrated below:

Figure 2. Infection chain

The reconstructed attack chain is supported
by EDR telemetry, which captures the process execution flow on compromised
systems:

Figure 3. Raw telemetry data

Analysis of telemetry data indicates that
the victim accessed an email through Outlook, which triggered the launch of a
Chrome process to open a Google Drive link. This resulted in the download and
subsequent execution of a malicious JAR file via javaw.exe:

  • Grandparent Process: OUTLOOK.EXE (MD5: 253F6E68931EAA76A39AA0C05B12C822) located at C:\Program Files\Microsoft Office\root\Office16\OUTLOOK.EXE

  • Parent Process: chrome.exe (MD5: 253F6E68931EAA76A39AA0C05B12C822) located at C:\Program
    Files\Google\Chrome\Application\chrome.exe with the command line:
    “C:\Program Files\Google\Chrome\Application\chrome.exe” –single-argument hxxps://drive.google[.]com/uc?export=download&id=1j7V_-umsxY6oVXY1T0XCNGyXI0q3p9qO

  • Ransomware Execution: javaw.exe executing the JAR archive: “C:\Program Files\Java\jre1.8.0_451\bin\javaw.exe” -jar “C:\Users\%USERNAME%\Downloads\….”

This activity is clearly part of a phishing
campaign, where users are tricked into clicking a link in a deceptive email,
ultimately downloading and running the ransomware. This distribution method is
further corroborated by victim reports on public forums (such as www.bleepingcomputer.com),
where users describe similar infection scenarios:

Figure 4. Victim 1

Figure 5. Victim 2

Technical details

Obfuscation

Although Java bytecode is relatively easy
to decompile, this becomes significantly more difficult when obfuscation is
applied. The malware authors employ multiple obfuscation and protection
techniques, including custom class loaders. During our analysis, we identified
two publicly available obfuscators in use: Stringer and Allatori.
The open-source project 
java-deobfuscator provides tooling that can assist in reversing protections implemented by both
of these obfuscators.

Polymorphism

Furthermore, the
malware contains a class named FilePumper, whose purpose is to perform
self-modification. Instead of simply copying itself to the target system during
installation, the malware adds random content to its JAR archive, inflating the
file size by tens of megabytes. As a result, each deployed instance becomes
unique, producing a different file hash (e.g., MD5) on every infected machine.
In the screenshot below, we can observe the randomly added classes
within the JAR archive, compared to the original version.

Figure 6. Comparison of the initial and dropped sample

This technique
effectively hinders straightforward hash-based detection and signature
matching.

Configuration

At the beginning of
its initialization process, the malware loads a set of hard-coded configuration
parameters embedded in a Java class. These parameters define key aspects of its
runtime behavior and communication.

The configuration
specifies the command-and-control (C2) infrastructure, including a domain and
two TCP ports, which the malware uses to establish and maintain its control
channel. It also includes references to TOR-related paths and components,
indicating that the malware can route over the TOR network. In this context,
TOR is not related to payment mechanisms, but rather to network obfuscation and
potential anonymized communications or data exfiltration.

The configuration also
contains a version identifier, suggesting the malware is maintained as part of
an evolving codebase, and a parameter (STARTUP_TYPE) that defines the
persistence mechanism (e.g., registry-based startup). While this value is
statically defined in the sample, its presence indicates the malware is
designed with configurable deployment options, meaning different builds could
easily switch persistence techniques without modifying core logic.

The most relevant
configuration parameter is PASSWORD, which is used as a shared secret for
multiple purposes:

  • It acts as a static authentication token during the initial C2 handshake, allowing the server to validate incoming clients.

  • It is used as a decryption key for downloaded payloads or modules, enabling the malware to securely receive and execute additional functionality at runtime.

Overall, the
configuration structure shows that the malware is designed to be flexible and
extensible, with support for dynamically delivered modules and adjustable
behavior across different deployments.

The configuration structure is illustrated below:

Figure 7. Malware configuration

Geofencing

The malware implements multiple layers of geofencing and environment
filtering to control where its malicious payload is executed. Initially, it
checks the system’s locale, language and country settings, specifically
requiring the environment to match Turkish language and region.

It also verifies the machine’s external geolocation via an IP lookup and
proceeds only if the reported country code begins with “TR”. This layered
geofencing approach helps the malware restrict execution to systems located in
Turkey.

While this behavior contributes to anti-analysis and sandbox evasion, it
also likely reflects intentional targeting of a specific geographic region. By
limiting execution to Turkish environments, the operators can reduce exposure
to international security researchers and automated analysis systems, which are
often hosted outside the target region. Additionally, region-specific targeting
may align with campaign objectives, such as focusing on local victims,
language-specific lures or operational constraints (e.g., infrastructure,
monetization channels or legal risk).

Overall, this geofencing mechanism suggests the malware is not
opportunistic but instead part of a targeted campaign with a defined geographic
scope, using location checks both to evade detection and to ensure it operates
only in intended environments.

Figure 8. Country and language check

File encryption

If the infected system passes the
geofencing checks, the malware first weakens the system’s defenses by executing
a series of PowerShell and registry commands. These actions are designed to:

  • Disable or weaken Microsoft Defender.

  • Suppress security notifications.

  • Remove recovery mechanisms such as Microsoft Volume Shadow Copy Service (VSS).

  • Hide ransomware protection features.

  • Enumerate installed antivirus products.

  • Interfere with endpoint protection integrations in Windows Explorer.

After these preparatory steps are
completed, the malware proceeds to download a ransomware plugin specifically
designed to work with this customized version of Adwind RAT. This module is
also implemented in Java, and it is responsible for encrypting files across all
available drives. The module relies exclusively on Tor for command-and-control
(C2) communication and is capable not only of encrypting files but also of
deleting and exfiltrating them. During the handshake with the C2 server, it
uses the prefix JANAWARE, which is why we have dubbed it JanaWare ransomware.

Figure 9. Settings of the ransomware module

Once file encryption is complete, the
malicious Java application drops the ransom note in multiple folders, as
observed in the Procmon capture logs:

Figure 10. Procmon log

The filename is partially randomized, but a
fixed component is configured within the malware itself. For example, in _ONEMLI_NOT_F3E4CFA185D1AEAE.TXT,
the prefix _ONEMLI_NOT_ is defined in the malware code as shown below:

Figure 11. Filename generation

In Turkish, ONEMLI NOT translates to
Important Note.
The content
of the ransom note is also embedded directly within the malware, further
highlighting that this threat is specifically targeting Turkish users. For
example, the malware contains the following Java method that constructs the
note:

Figure 12. Content of the ransom note

Based on static
analysis of the Java classes, the ransomware employs AES encryption, with the
encryption key transmitted to the C2 server over Tor. As a result, recovery of
encrypted files is not feasible without access to the C2 infrastructure, which
is highly unlikely.

Conclusion

The analysis presented in this report
highlights a relatively low-profile but persistent ransomware operation that we
refer to as JanaWare Ransomware. Unlike large-scale ransomware campaigns
targeting enterprises, this operation appears to focus primarily on Turkish
users and smaller organizations, combining geofencing, Turkish-language
artifacts and modest ransom demands. The ransomware is delivered as a module
for a customized version of Adwind RAT, allowing the operators to deploy
it selectively after initial compromise.

Technically, the malware employs several
measures to hinder detection and analysis, including heavy obfuscation, dynamic
module loading and self-modifying binaries that generate unique hashes for each
infection. Despite evidence suggesting the campaign has been active for several
years, its regional focus and relatively small-scale operations likely helped
it remain largely unnoticed. This case demonstrates how targeted, localized
ransomware campaigns can quietly persist in the threat landscape.

Detection by Acronis

This threat has been
detected and blocked by Acronis 
EDR / XDR:

Figure 13. Threat detection

IoCs

Samples

4f0444e11633a331eddb0deeec17fd69

Adwind RAT

b2d5bbf7746c2cb87d5505ced8d6c4c6

Ransomware module (JanaWare)

Command and control servers

elementsplugin.duckdns.org:49152

151.243.109.115

elementsplugin.duckdns.org:49153

151.243.109.115

 



Click Here For The Original Source.

——————————————————–

..........

.

.

National Cyber Security

FREE
VIEW