This is a field-sourced document of known Indicators of Compromise (IOCs) associated with the dual-channel JWrapper/SimpleHelp and weaponized ScreenConnect intrusion chain, frequently utilized by Initial Access Brokers (IABs) linked to Medusa Ransomware. All entries below are confirmed from real incident response and forensic analysis of live infections.
Contributions: Submit a pull request or open an issue to add new IOCs observed in the wild.
| Filename | Description |
|---|---|
e-Signature-Key_Access_ID-MY7362HY73E.exe |
Initial lure / NSIS v2.51 installer. Carries a valid DigiCert Authenticode cert. |
e-Signature-Key_Access_ID-MY7362HY73E (1).exe |
Duplicate variant (observed on some systems) |
rq.msi |
Weaponized ConnectWise ScreenConnect v25.2.4.9229 installer |
rqe.exe |
Custom DotNetRunner — manages the ScreenConnect session |
ScreenConnect.WindowsClient.exe |
ScreenConnect remote access client |
ScreenConnect.WindowsFileManager.exe |
ScreenConnect file transfer component |
ScreenConnect.WindowsBackstageShell.exe |
ScreenConnect remote command shell |
ScreenConnect.WindowsAuthenticationPackage.dll |
Windows credential provider integration DLL |
system.config |
ScreenConnect C2 relay configuration (contains gqpplgq2g.anondns.net:8041 and RSA-2048 auth key) |
app.config |
ScreenConnect stealth configuration (all 13 user-visibility settings explicitly set to false) |
| Filename | Description |
|---|---|
officeSH26_working_verf.scr |
JWrapper deployment payload disguised as a Windows Screensaver file |
Remote_Access_Service.exe |
Main JWrapper/SimpleHelp service executable (runs as SYSTEM) |
Remote_AccessWinLauncher.exe |
JWrapper Windows launcher component |
Remote_Access_Configure.exe |
RAT reconfiguration utility |
Remote_Access_Launcher.exe |
RAT launcher component |
SimpleService.exe |
SafeBoot persistence binary — writes/removes SafeBoot\Network registry key |
StopSimpleGatewayService.exe |
Attacker-facing RAT management utility (stop/restart service) |
jwutils_win32.dll |
JWrapper native utility library — contains CreateRemoteThread (process injection) |
jwutils_win64.dll |
JWrapper native utility library 64-bit — contains CreateRemoteThread |
libzstd-jni.dll |
Zstandard v1.5.2 compression library — used to compress data before C2 exfiltration |
serviceconfig.xml |
Live C2 configuration file — contains relay IPs, registration key, and capability flags |
alertsdb |
Encrypted session activity database (16KB+) — records all C2 session events |
verified |
Plaintext file written after successful C2 connectivity — contains all three relay IPs |
sgport |
Contains the local IPC port used by the RAT service (confirmed: 41431) |
jwLastRun |
Binary timestamp of last C2 session (milliseconds since epoch) |
secmsg-http*.secmsg |
Per-server encrypted session authentication tokens (one per C2 relay) |
secmsg-http*.bcutil |
Supporting session crypto utility files |
C:\ProgramData\JWrapper-Remote Access\ (entire tree)
C:\ProgramData\JWrapper-Remote Access\JWAppsSharedConfig\
C:\ProgramData\JWrapper-Remote Access\JWAppsSharedConfig\SimpleGatewayService\
C:\ProgramData\JWrapper-Remote Access\logs\
C:\Windows\SystemTemp\ScreenConnect\
C:\Windows\SystemTemp\ScreenConnect\25.2.4.9229\
%TEMP%\ScreenConnect\
C:\Windows\Temp\ScreenConnect\
C:\Program Files\ScreenConnect Client*\
C:\Program Files (x86)\ScreenConnect Client*\
C:\ProgramData\JWrapper-Remote Access\JWAppsSharedConfig\serviceconfig.xml
C:\ProgramData\JWrapper-Remote Access\JWAppsSharedConfig\alertsdb
C:\ProgramData\JWrapper-Remote Access\JWAppsSharedConfig\verified
C:\ProgramData\JWrapper-Remote Access\JWAppsSharedConfig\sgport
C:\ProgramData\JWrapper-Remote Access\JWAppsSharedConfig\jwLastRun
C:\ProgramData\JWrapper-Remote Access\JWAppsSharedConfig\SimpleGatewayService\Remote_Access_Service.exe
C:\ProgramData\JWrapper-Remote Access\JWAppsSharedConfig\SimpleGatewayService\SimpleService.exe
C:\ProgramData\JWrapper-Remote Access\JWAppsSharedConfig\SimpleGatewayService\StopSimpleGatewayService.exe
C:\Windows\SystemTemp\ScreenConnect\25.2.4.9229\system.config
C:\Windows\SystemTemp\ScreenConnect\25.2.4.9229\app.config
C:\Windows\SystemTemp\ScreenConnect\25.2.4.9229\rq.msi
C:\Windows\SystemTemp\ScreenConnect\25.2.4.9229\rqe.exe
C:\Windows\SystemTemp\ScreenConnect\25.2.4.9229\ScreenConnect.WindowsAuthenticationPackage.dll
C:\ProgramData\JWrapper-Remote Access\JWAppsSharedConfig\working\toolbox-*\
C:\ProgramData\JWrapper-Remote Access\JWAppsSharedConfig\working\toolbox-7486505558619514016\remove20msp20rmm*.ps1
These paths are used by the attacker to stage and execute additional PowerShell scripts — including scripts that uninstall legitimate RMM agents.
C:\Users\jmorgan\Source\cwcontrol\Custom\DotNetRunner\Release\DotNetRunner.pdb
C:\Compile\screenconnect\Product\WindowsAuthenticationPackage\bin\Release\ScreenConnect.WindowsAuthenticationPackage.pdb
HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Network\Remote Access Service
HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Remote Access Service
Ensures the RAT service starts even when the machine is booted into Safe Mode with Networking. This is the primary reason standard removal tools fail on this infection.
HKLM\SYSTEM\CurrentControlSet\Services\Remote Access Service
HKLM\SYSTEM\CurrentControlSet\Services\ScreenConnect Client*
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Remote Access
| Address | Port | Protocol | Notes |
|---|---|---|---|
gqpplgq2g.anondns.net |
8041 |
TCP | Anonymous dynamic DNS — conceals true server location |
| Address | Port | Protocol | Role |
|---|---|---|---|
147.45.218.0 |
443 |
HTTP (over HTTPS port) | Primary C2 relay |
91.215.85.219 |
443 |
HTTP (over HTTPS port) | Redundant C2 relay |
147.45.218.13 |
443 |
HTTP (over HTTPS port) | Redundant C2 relay |
All three JWrapper relays use port 443 to blend with HTTPS traffic and bypass firewall rules. They share a single registration key (see Campaign Identifiers), confirming single-operator control.
41431 (TCP, localhost — used by StopSimpleGatewayService.exe to communicate with the running RAT service)
| Filename | SHA-256 |
|---|---|
e-Signature-Key_Access_ID-MY7362HY73E.exe |
b555ceff3236a8175b48b892c1ebc4977fc82c623f3c15ed1efab0c4ac61a9b6 |
rq.msi |
924600a3a55c196b362e82151fbc3f9dcf03dc29e6c45e0bd113d7b0d95c6850 |
rqe.exe |
959524efe7d4aa6a132a88daf7d1e1871fa14eae8a6025ba73ab1fb65f7e4f22 |
Remote_Access_Service.exe |
bdbdbffb37bc421edac4ac5b20c72db1c72d7f6e819e115c96cde5413146bb36 |
StopSimpleGatewayService.exe |
d26b8e1ba6383b1f7749a133cfbf90e85a22a4bece9f171ed57a3d1ab7833f48 |
SimpleService.exe |
d14a1f14d6ca46bd2168b9d2acf281d8eea62d30e2869d47dd4bf0ad556fb9a2 |
ScreenConnect.WindowsAuthenticationPackage.dll |
a5b8f0070201e4f26260af6a25941ea38bd7042aefd48cd68b9acf951fa99ee5 |
Transport office101/103/AUTODETECT (initial profile — observed March 30 – April 4)
Star 2026/AUTODETECT (rotated profile — observed April 5 onward)
Profile rotation mid-intrusion is consistent with an initial access broker (IAB) handing off or selling the session to a secondary ransomware operator.
30994437457905930274238194135013257 (initial profile)
32662606070342690172655316692737204611 (post-rotation profile)
SG_3243431771723114121
9F6D305069D23FF1265FA557A597E0CF5EBAE0BEA0EE1BA49A0546E15B809263EB5C0C6AFF2D08B8C9208BDB03B2EDD0A58915D052F76CD9C6B399C414471997
JWrapper core: 00118607049
Remote Access bundle: 00118607124 (SimpleHelp v5.5.14)
Windows JRE: 00118596800 (JRE 21.0.8)
ScreenConnect version: 25.2.4.9229
ba136626de3df076f7210ffde178060755007ae8c2a82e3392424f4b015fd80e3b02797753769c143cc2a46e59d9a5ce8139208405443a433522b48d959bf6e2
c0ff50beeefa3822b38afe48b5296a8e15d92096b16583a06ece69027f9455482ef6b1d473f0f7f272593222dfc85dc64a5fe9419ec0756401d10b58bb7a5989
e616c631f41874299b8c8306861e080be6528df51d27b72b4329257020491c123b49b93ff6fa2ff7d73dd2c4c023662f9248ee74ce19232ade2e2a377611fe95
| Tactic | Technique | Detail |
|---|---|---|
| Initial Access | T1566.001 | Spearphishing attachment — fake e-signature file |
| Initial Access | T1656 | Impersonation — e-signature brand (DocuSign/Adobe style lure) |
| Execution | T1204.002 | User Execution: Malicious File |
| Execution | T1059.001 | PowerShell — confirmed executed immediately post-install |
| Persistence | T1543.003 | Create/Modify System Process: Windows Service |
| Persistence | T1547 | Boot/Logon Autostart — SafeBoot registry key |
| Privilege Escalation | T1548.002 | Bypass UAC via DigiCert-signed NSIS installer |
| Defense Evasion | T1036.005 | Masquerading — .scr extension, fake e-signature filename |
| Defense Evasion | T1553.002 | Code Signing — valid DigiCert Authenticode certificate on dropper |
| Defense Evasion | T1218 | System Binary Proxy Execution — JVM/JWrapper launches payload |
| Defense Evasion | T1562 | Impair Defenses — polls for and removes legitimate RMM agents |
| C2 | T1219 | Remote Access Tools — ScreenConnect + SimpleHelp both weaponized |
| C2 | T1071.001 | Application Layer Protocol: HTTP traffic disguised on port 443 |
| C2 | T1568 | Dynamic Resolution — anonymous DNS (anondns.net) for Stage 1 C2 |
| C2 | T1573 | Encrypted Channel — RSA-2048 session keys for JWrapper C2 auth |
| Collection | T1113 | Screen Capture — AllowMonitoring=true, mdupload class active |
| Collection | T1056.001 | Keylogging — capability present via active remote desktop control |
| Exfiltration | T1041 | Exfiltration over C2 Channel — Zstandard-compressed uploads |
| Lateral Movement | T1021 | Remote Services — SYSTEM-level access enables local network pivot |
| Injection | T1055 | Process Injection — CreateRemoteThread in jwutils_win32/64.dll |
| Discovery | T1518.001 | Security Software Discovery — WMI polls for MBAMService (Malwarebytes) and WinDefend |
- Operator timezone: Monitoring sessions observed at
03:44local time suggest threat actor operates in UTC+3 to UTC+5 (Eastern Europe / Russia) - Complete UI suppression: ScreenConnect configured with all 13 visibility settings
false— no tray icon, no banners, no notifications of any kind during active sessions - Kill-signal resistance: JVM launched with
-Xrsflag, making the process resistant to standardSIGTERM/OS kill signals - Auto-recovery:
AllowRecovery=truecauses the service to auto-reconnect if the connection drops - SafeBoot persistence:
SimpleService.exeexportsSetSafeBootKeyandDeleteSafeBootKeyfunctions — explicitly designed to survive incident response Safe Mode reboots - Redundant C2: Three relay servers are registered simultaneously; if one is unreachable the RAT fails over automatically, with no single point of failure for the attacker
- Self-updating:
GenericUpdatercomponent checks for and applies RAT updates from C2 servers on an ongoing basis
All IOCs verified from live field incident data. Pacific Northwest Computers — jon@pnwcomputers.com | 360-624-7379 Contributions welcome — see CONTRIBUTE.md