AcronisAcronisAcronisAcronisAcronisAcronisAcronisAcronisAcronisAcronisAcronis
Acronis
April 14, 2026

New JanaWare ransomware targets Turkey via Adwind RAT

The Acronis TRU team identified a threat cluster leveraging a customized Adwind (Java RAT) variant with polymorphic characteristics to deliver a ransomware module, tracked as ‘JanaWare.' Analysis of malware samples, infrastructure and telemetry indicates the campaign is likely focused on Turkish users.

Authors: Acronis Threat Research Unit, Jozsef Gegeny, David Catalan Alegre

On this page
Summary
Introduction
Attack chain
Technical details
Conclusion
Detection by Acronis
IoCs

Summary

  • The Acronis TRU team identified a threat cluster leveraging a customized Adwind (Java RAT) variant with polymorphic characteristics to deliver a ransomware module, tracked as ‘JanaWare.’
  • Analysis of malware samples, infrastructure and telemetry indicates the campaign is likely focused on Turkish users. The malware enforces execution constraints based on system locale and external IP geolocation, which likely restricts activity to systems located in Turkey.
  • Observed samples and telemetry suggest the activity has been ongoing since at least 2020. A sample compiled in November 2025 indicates that associated command-and-control infrastructure remains active. Obfuscation, polymorphism and geographic restrictions have likely contributed to limited visibility.
  • Victimology appears to primarily include home users and small to medium-sized businesses. Initial access is assessed to occur via phishing emails delivering malicious Java archives. Ransom demands observed in analyzed samples range from $200–$400, consistent with a low-value, high-volume monetization approach.
  • This combination of consumer- and SMB-focused victimology, low ransom demands and opportunistic targeting suggests the operation is distinct from enterprise-focused ransomware campaigns, which typically prioritize high-value targets and larger payouts.

Introduction

The investigation began with the analysis of a customized Adwind RAT variant suspected to be associated with ransomware activity. After collecting several JAR archive samples from VirusTotal, we discovered that one of them behaved differently during testing. When executed in our analysis environment, the sample dropped the following ransom note on the test machine:

Acronis
Figure 1. Ransom note left by the malware

The ransom note was written in Turkish. Its translated content is shown below:

Acronis

The attackers encourage victims to establish contact through a secure and private channel, such as qTox — a free, open-source desktop messaging application that operates over the Tox peer-to-peer network. qTox is a decentralized chat client with no central servers, that provides end-to-end encryption and is designed to protect user privacy and anonymity. In some campaigns, however, instead of using qTox, victims were instructed to download the Tor Browser and visit a dedicated .onion site to communicate with the attackers.

Attack chain

Through telemetry hunting, we reconstructed the infection sequence using EDR data, revealing how the ransomware is delivered and executed within the victim environment. The analysis indicates that the campaign relies on email-based phishing to initiate the attack, leading users to download a malicious payload that ultimately results in ransomware execution. The overall infection flow is illustrated below:

Acronis
Figure 2. Infection chain

The reconstructed attack chain is supported by EDR telemetry, which captures the process execution flow on compromised systems:

Acronis
Figure 3. Raw telemetry data

Analysis of telemetry data indicates that the victim accessed an email through Outlook, which triggered the launch of a Chrome process to open a Google Drive link. This resulted in the download and subsequent execution of a malicious JAR file via javaw.exe:

  • Grandparent Process: OUTLOOK.EXE (MD5: 253F6E68931EAA76A39AA0C05B12C822) located at C:\Program Files\Microsoft Office\root\Office16\OUTLOOK.EXE
  • Parent Process: chrome.exe (MD5: 253F6E68931EAA76A39AA0C05B12C822) located at C:\Program Files\Google\Chrome\Application\chrome.exe with the command line: "C:\Program Files\Google\Chrome\Application\chrome.exe" --single-argument hxxps://drive.google[.]com/uc?export=download&id=1j7V_-umsxY6oVXY1T0XCNGyXI0q3p9qO
  • Ransomware Execution: javaw.exe executing the JAR archive: "C:\Program Files\Java\jre1.8.0_451\bin\javaw.exe" -jar "C:\Users\%USERNAME%\Downloads\...."

This activity is clearly part of a phishing campaign, where users are tricked into clicking a link in a deceptive email, ultimately downloading and running the ransomware. This distribution method is further corroborated by victim reports on public forums (such as www.bleepingcomputer.com), where users describe similar infection scenarios:

Acronis
Figure 4. Victim 1
Acronis
Figure 5. Victim 2

Technical details

Obfuscation

Although Java bytecode is relatively easy to decompile, this becomes significantly more difficult when obfuscation is applied. The malware authors employ multiple obfuscation and protection techniques, including custom class loaders. During our analysis, we identified two publicly available obfuscators in use: Stringer and Allatori. The open-source project java-deobfuscator provides tooling that can assist in reversing protections implemented by both of these obfuscators.

Polymorphism

Furthermore, the malware contains a class named FilePumper, whose purpose is to perform self-modification. Instead of simply copying itself to the target system during installation, the malware adds random content to its JAR archive, inflating the file size by tens of megabytes. As a result, each deployed instance becomes unique, producing a different file hash (e.g., MD5) on every infected machine. In the screenshot below, we can observe the randomly added classes within the JAR archive, compared to the original version.

Acronis
Figure 6. Comparison of the initial and dropped sample

This technique effectively hinders straightforward hash-based detection and signature matching.

Configuration

At the beginning of its initialization process, the malware loads a set of hard-coded configuration parameters embedded in a Java class. These parameters define key aspects of its runtime behavior and communication.

The configuration specifies the command-and-control (C2) infrastructure, including a domain and two TCP ports, which the malware uses to establish and maintain its control channel. It also includes references to TOR-related paths and components, indicating that the malware can route over the TOR network. In this context, TOR is not related to payment mechanisms, but rather to network obfuscation and potential anonymized communications or data exfiltration.

The configuration also contains a version identifier, suggesting the malware is maintained as part of an evolving codebase, and a parameter (STARTUP_TYPE) that defines the persistence mechanism (e.g., registry-based startup). While this value is statically defined in the sample, its presence indicates the malware is designed with configurable deployment options, meaning different builds could easily switch persistence techniques without modifying core logic.

The most relevant configuration parameter is PASSWORD, which is used as a shared secret for multiple purposes:

  • It acts as a static authentication token during the initial C2 handshake, allowing the server to validate incoming clients.
  • It is used as a decryption key for downloaded payloads or modules, enabling the malware to securely receive and execute additional functionality at runtime.

Overall, the configuration structure shows that the malware is designed to be flexible and extensible, with support for dynamically delivered modules and adjustable behavior across different deployments.

The configuration structure is illustrated below:

Acronis
Figure 7. Malware configuration

Geofencing

The malware implements multiple layers of geofencing and environment filtering to control where its malicious payload is executed. Initially, it checks the system’s locale, language and country settings, specifically requiring the environment to match Turkish language and region.

It also verifies the machine’s external geolocation via an IP lookup and proceeds only if the reported country code begins with “TR”. This layered geofencing approach helps the malware restrict execution to systems located in Turkey.

While this behavior contributes to anti-analysis and sandbox evasion, it also likely reflects intentional targeting of a specific geographic region. By limiting execution to Turkish environments, the operators can reduce exposure to international security researchers and automated analysis systems, which are often hosted outside the target region. Additionally, region-specific targeting may align with campaign objectives, such as focusing on local victims, language-specific lures or operational constraints (e.g., infrastructure, monetization channels or legal risk).

Overall, this geofencing mechanism suggests the malware is not opportunistic but instead part of a targeted campaign with a defined geographic scope, using location checks both to evade detection and to ensure it operates only in intended environments.

Acronis
Figure 8. Country and language check

File encryption

If the infected system passes the geofencing checks, the malware first weakens the system’s defenses by executing a series of PowerShell and registry commands. These actions are designed to:

  • Disable or weaken Microsoft Defender.
  • Suppress security notifications.
  • Remove recovery mechanisms such as Microsoft Volume Shadow Copy Service (VSS).
  • Disable Windows Update.
  • Hide ransomware protection features.
  • Enumerate installed antivirus products.
  • Interfere with endpoint protection integrations in Windows Explorer.

After these preparatory steps are completed, the malware proceeds to download a ransomware plugin specifically designed to work with this customized version of Adwind RAT. This module is also implemented in Java, and it is responsible for encrypting files across all available drives. The module relies exclusively on Tor for command-and-control (C2) communication and is capable not only of encrypting files but also of deleting and exfiltrating them. During the handshake with the C2 server, it uses the prefix JANAWARE, which is why we have dubbed it JanaWare ransomware.

Acronis
Figure 9. Settings of the ransomware module

Once file encryption is complete, the malicious Java application drops the ransom note in multiple folders, as observed in the Procmon capture logs:

Acronis
Figure 10. Procmon log

The filename is partially randomized, but a fixed component is configured within the malware itself. For example, in _ONEMLI_NOT_F3E4CFA185D1AEAE.TXT, the prefix _ONEMLI_NOT_ is defined in the malware code as shown below:

Acronis
Figure 11. Filename generation

In Turkish, ONEMLI NOT translates to Important Note. The content of the ransom note is also embedded directly within the malware, further highlighting that this threat is specifically targeting Turkish users. For example, the malware contains the following Java method that constructs the note:

Acronis
Figure 12. Content of the ransom note

Based on static analysis of the Java classes, the ransomware employs AES encryption, with the encryption key transmitted to the C2 server over Tor. As a result, recovery of encrypted files is not feasible without access to the C2 infrastructure, which is highly unlikely.

Conclusion

The analysis presented in this report highlights a relatively low-profile but persistent ransomware operation that we refer to as JanaWare Ransomware. Unlike large-scale ransomware campaigns targeting enterprises, this operation appears to focus primarily on Turkish users and smaller organizations, combining geofencing, Turkish-language artifacts and modest ransom demands. The ransomware is delivered as a module for a customized version of Adwind RAT, allowing the operators to deploy it selectively after initial compromise.

Technically, the malware employs several measures to hinder detection and analysis, including heavy obfuscation, dynamic module loading and self-modifying binaries that generate unique hashes for each infection. Despite evidence suggesting the campaign has been active for several years, its regional focus and relatively small-scale operations likely helped it remain largely unnoticed. This case demonstrates how targeted, localized ransomware campaigns can quietly persist in the threat landscape.

Detection by Acronis

This threat has been detected and blocked by Acronis EDR / XDR:

Acronis
Figure 13. Threat detection

IoCs

Samples

MD5
Description
4f0444e11633a331eddb0deeec17fd69
Adwind RAT
b2d5bbf7746c2cb87d5505ced8d6c4c6
Ransomware module (JanaWare)

Command and control servers

Hostname
IP
elementsplugin.duckdns.org:49152
151.243.109.115
elementsplugin.duckdns.org:49153
151.243.109.115