Ratty config extractor is a python script that extracts the "command & control" server address from a Ratty JAR file.
This tool was published as part of the blog about polyglot JAR files:
https://www.deepinstinct.com/blog/malicious-jars-and-polyglot-files-who-do-you-think-you-jar
Clone the repository and install the requirements.
pip install -r requirements.txt
python3 ratty-decrypt.py <path_to_ratty_jar_file>
Pull requests are welcome. For major changes, please open an issue first to discuss what you would like to change.
The code provided is offered as-is and is intended for educational or informational purposes only. The user assumes all responsibility for the use of this code and any consequences that may arise from its use. The creator of this code and its affiliates cannot be held liable for any damages or losses resulting from the use of this code