Hello,
By analyzing several AlmaLinux *-demo-debug packages, including:
java-1.8.0-openjdk-demo-slowdebug-1.8.0.462.b08-2.el8.x86_64.rpm
java-1.8.0-openjdk-demo-fastdebug-1.8.0.462.b08-2.el8.x86_64.rpm
…I noticed that extracting these files triggered an alert via a YARA rule named EquationGroup_Toolset_Apr17_FullThreadDump, which I’ve attached.
This rule comes from Florian Roth’s signature-base and is designed to detect components potentially related to the Equation Group’s (NSA) internal debugging tools, made public during the Shadow Brokers leak in 2017.
The detected files contain the following Java classes:
FullThreadDump.class
ThreadMonitor.class
Deadlock$DeadlockThread.class
The decompiled code appears to show that this is a classic JMX debugging tool, designed to perform a remote threadDump() via RMI/JMX, which is common in demo tools. This could therefore be a false positive due to an overly broad signature.
However, given the sensitivity of the terms used in the rule and the exact match with the filenames reported in APT toolsets, I prefer to:
Check whether these classes are intentional and legitimate in these .rpm files.
Confirm that the content comes from OpenJDK without any undocumented modifications or additions.
Possibly clarify this publicly to reassure users who scan packages with YARA tools.
Thank you in advance for your feedback.
Sincerely,
Bread
