First off, thank you for considering contributing to this repository. It is through community collaboration that we can track, identify, and mitigate these highly organized intrusion chains.
This repository relies on real-world data gathered during incident response engagements. Your contributions help sysadmins and security engineers worldwide defend against Initial Access Brokers (IABs) and the ransomware deployments they facilitate.
We are actively looking for the following types of data related to JWrapper/SimpleHelp and Weaponized ScreenConnect infections:
- File Hashes: New SHA-256 hashes of droppers, installers, DLLs, or payload components.
- Network IOCs: New IP addresses, domains (especially dynamic DNS like
anondns.net), relay ports, or C2 hostnames. - File Paths: New directories or naming conventions used by the malware (e.g., new
toolboxscript names or lure filename patterns). - Registry Keys: New persistence mechanisms, especially variations of the
SafeBootregistry modification or new Scheduled Task names. - Campaign Identifiers: New profile names, session IDs, or
reckeyvalues decoded from JWrapper logs. - Behavioral Signatures: New TTPs, security product polling behavior, or RMM agent uninstall scripts observed in the wild.
- Remediation Improvements: Updates to
Check-System.ps1,Fix.ps1, orRUN_ME.batto handle new malware variants or edge cases.
To keep this repository safe and responsible:
- Do not submit actual malware binaries, DLLs, or executable files. Hashes and metadata only.
- Do not submit embedded cryptographic keys, private tokens, or session credentials extracted from malware samples.
- Do not submit unredacted client data of any kind — see sanitization requirements below.
- Do not submit theoretical or unverified IOCs. This repository is for field-confirmed data only.
If you have new indicators but don't want to edit the documentation yourself:
- Navigate to the Issues tab.
- Click New Issue.
- Include as much context as possible:
- What the file is and what it does
- Where it was found (directory path)
- SHA-256 hash
- Date of first observation
- Campaign name or profile identifier if known
- Any associated network IOCs (defanged — see guidelines below)
To add data directly to indicators.md or improve the remediation scripts:
- Fork the repository to your own GitHub account.
- Clone your fork to a local machine.
- Create a new branch for your update:
git checkout -b add-new-iocs-june-2026 - Make your changes to
indicators.mdor the relevant script files. Keep formatting consistent with the existing layout. - Commit with a clear, descriptive message:
git commit -m "Add new JWrapper C2 relay IP and updated campaign profile name" - Push your branch to your fork:
git push origin add-new-iocs-june-2026 - Open a Pull Request against the
mainbranch of this repository.
When including IPs, domains, or URLs in Issues or PR descriptions, defang them to prevent accidental clicks:
147[.]45[.]218[.]0
hXXp://91[.]215[.]85[.]219:443
gqpplgq2g[.]anondns[.]net
In indicators.md itself, plain format is fine since the document is used for hunting and blocking — just be consistent with the existing style.
Only submit IOCs verified during an actual incident response or malware analysis engagement. No theoretical, generated, or hypothetical indicators.
A file hash alone is useful. A file hash plus the directory it was found in plus the registry key that launched it plus the campaign profile it was associated with is far more valuable. Provide as much surrounding context as you legally and safely can.
Before submitting any logs, screenshots, config files, or extracted data, scrub all of the following:
- Internal hostnames and computer names
- Internal IP addresses (RFC 1918 ranges: 10.x, 172.16–31.x, 192.168.x)
- Usernames, employee names, or any PII
- Company names, client names, or identifying business information
- Email addresses (other than attacker infrastructure)
- File paths that contain usernames (e.g.,
C:\Users\john.smith\...→ replace withC:\Users\[USERNAME]\...)
If you are unsure whether something is safe to share, err on the side of caution and open an Issue with a summary instead.
By participating in this project, you agree to abide by standard open-source community guidelines. Be respectful, constructive, and focused on the shared goal of improving defensive cybersecurity. Contributions intended to enable offensive use of this data will be rejected.
Pacific Northwest Computers — Vancouver, WA jon@pnwcomputers.com | 360-624-7379