Pierluigi Paganini December 20, 2023
Researchers from AT&T Alien Labs uncovered a previously undetected Go-based information stealer dubbed JaskaGO that targets Windows and macOS systems.
JaskaGO is a sophisticated malware that supports an extensive array of commands and can maintain persistence in different ways.
The macOS variant of the malware was first spotted in July 2023, it was spreading in the form of installers for pirated legitimate software such as CapCut or AnyConnect.
Following the discovery, researchers observed dozens of new samples that show the malware. The researchers pointed out that the recent malware sample still has a low detection rate.
Upon initial execution, the malware displays a fake error message, claiming a missing file, in an attempt to mislead the user into believing that the malicious code failed to run.
The malware also performs a series of checks to avoid execution in a virtualized environment.
“The malware conducts thorough checks to determine if it is operating within a virtual machine (VM). This process begins with the examination of general machine information, where specific criteria such as the number of processors, system up-time, available system memory, and MAC addresses are checked.” reads the report published by AT&T Alien Labs. “The presence of MAC addresses associated with well-known VM software, such as VMware or VirtualBox, is a key indicator.”
JaskaGO collects information from the infected system and connects to the C2 infrastructure awaiting for instructions.
The malware supports the following commands:
JaskaGO supports multiple exfiltration capabilities. The malware stores harvested data in a specially created folder, zipping and sending it to the C2.
The malware can steal the following info from Chrome and Firefox browsers:
The info stealer also targets browser crypto wallet extensions and can exfiltrate files and folders.
On macOS, JaskaGO replies on a multi-step process to maintain persistence. It executes as Root, disables Gatekeeper, and duplicates itself, adopting the name format “com.%s.appbackgroundservice,” to obfuscate its presence on the system. The malware also creates a LaunchDaemon / LaunchAgent to ensure persistence.
“Employing sophisticated anti-VM tactics, JaskaGO sidesteps automatic analysis, making it a formidable challenge for detection. Its persistence mechanisms reveal a determined effort to embed itself within systems, while its stealer capabilities transform the malware into a dangerous threat, extracting sensitive information from unsuspecting victims.” concludes the report that includes indicators of compromise (IOCs).
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
(SecurityAffairs – hacking, JaskaGO)