Thank you very much for your response. I did it with no luck. Hope to see another solutions for this case. Cheer
C:\Users\buda\Downloads\jwscan>java -jar jwscan.jar SSH.exe
____ _ _ _ _ ___ ____ _ _ ____ _ _ _ _ ____ ____ ____ _ _
|___ | | | | / | | |\ | |___ __ | | | | [__ | |__| |\ |
|___ \/ | |___ /__ |__| | \| |___ _| |_|_| ___] |___ | | | \|
by Deque
scanning file ...
file name: SSH.exe
Exception in thread "main" java.lang.IllegalArgumentException: MALFORMED
at java.util.zip.ZipCoder.toString(Unknown Source)
at java.util.zip.ZipCoder.toStringUTF8(Unknown Source)
at java.util.zip.ZipInputStream.readLOC(Unknown Source)
at java.util.zip.ZipInputStream.getNextEntry(Unknown Source)
at com.github.katjahahn.tools.Jar2ExeScanner.readZipEntriesAt(Jar2ExeSca
nner.scala:47)
at com.github.katjahahn.tools.Jar2ExeScanner$$anonfun$getZipAddresses$1.
apply$mcZJ$sp(Jar2ExeScanner.scala:104)
at com.github.katjahahn.tools.Jar2ExeScanner$$anonfun$getZipAddresses$1.
apply(Jar2ExeScanner.scala:102)
at com.github.katjahahn.tools.Jar2ExeScanner$$anonfun$getZipAddresses$1.
apply(Jar2ExeScanner.scala:102)
at scala.collection.TraversableLike$$anonfun$filter$1.apply(TraversableL
ike.scala:264)
at scala.collection.immutable.List.foreach(List.scala:318)
at scala.collection.TraversableLike$class.filter(TraversableLike.scala:2
63)
at scala.collection.AbstractTraversable.filter(Traversable.scala:105)
at com.github.katjahahn.tools.Jar2ExeScanner.getZipAddresses(Jar2ExeScan
ner.scala:102)
at com.github.katjahahn.tools.Jar2ExeScanner.createReport(Jar2ExeScanner
.scala:78)
at com.github.katjahahn.tools.Jar2ExeScanner$.invokeCLI(Jar2ExeScanner.s
cala:192)
at com.github.katjahahn.tools.Jar2ExeScanner$.main(Jar2ExeScanner.scala:
173)
at com.github.katjahahn.tools.Jar2ExeScanner.main(Jar2ExeScanner.scala)
Congrats and thank you for finding a bug in my program.
Here is a scan after correcting the bug:
scanning file ...
file name: Lazy SSH.exe
Signatures found:
* Jar2Exe.com signature
* PZIP Magic Number (weak indication for embedded zip)
Entry point: 0x14f9b
ZIP/Jar offsets: 0x423a8, 0x105084
So you know now it was done with the tool jar2exe and you know two file offsets the jar is probably saved in.
If you are on windows you could give it a shot to just rename the .exe to .zip and try to open it with e.g. 7zip.
See if you can extract the .class files like that. If that doesn't work, you should try to cut the jar at the offsets specified and try to extract after. You can use my tool for doing so, but I have to upload the corrected version first.
Once you have the .class files decompiling them should be a piece of cake.
Write again if you have any problems.