GoldenJackal is an APT group active since 2019 that targets government and diplomatic entities in the Middle East and South Asia, using a .NET toolset (JackalControl, JackalWorm, JackalSteal, JackalPerInfo, JackalScreenWatcher) for espionage. They leveraged fake Skype installers and a Follina-exploiting Word document to gain access, then deployed modular malware to collect system information, exfiltrate data, and capture screenshots. #GoldenJackal #JackalControl #JackalWorm #Follina #Kazuar #Turla #Pakistan #Afghanistan #Turkey #WordPress
Keypoints
- GoldenJackal is an active APT group (since 2019) targeting government/diplomatic entities in the Middle East and South Asia with a .NET-based toolkit.
- Primary tools include JackalControl, JackalWorm, JackalSteal, JackalPerInfo, and JackalScreenWatcher, designed for remote control, exfiltration, credential theft, and surveillance.
- Infection vectors observed: fake Skype installers (skype32.exe dropper) and a malicious Word document exploiting Follina via remote template injection.
- JackalControl is a remotely controlled Trojan triggered via command-line arguments, with C2 over HTTPS and support for execute/download/upload operations.
- JackalWorm spreads via removable USB drives, hiding and propagating itself, and using configurations embedded in XML to guide infection on USB events.
- JackalSteal targets files of interest, supports profiles and masks, and can operate as a service or standard process for exfiltration.
- JackalPerInfo collects comprehensive system information and browser data, stores it in a binary file, and exfiltrates it to the C2.
- JackalScreenWatcher captures desktop screenshots upon user activity and uploads them to a hard-coded C2 server, using encrypted payloads.
- Infrastructure relies on compromised WordPress sites as C2 relays; victims reported in Afghanistan, Azerbaijan, Iran, Iraq, Pakistan, and Turkey.
MITRE Techniques
- [T1203] Exploitation for Client Execution – The Word document uses a remote template injection technique to download a malicious HTML page, which exploits the Follina vulnerability. ‘The remote webpage is a modified version of a public “Proof of Concept” to exploit the Follina vulnerability.’
- [T1071.001] Web Protocols – The malware communicates using HTTP POST requests to the C2. ‘The malware communicates using HTTP POST requests where data arguments will be carried in encoded form as part of the request’s body.’
- [T1021.002] Remote Services – Lateral movement via PsExec to start a malicious batch script. ‘the attacker using the psexec utility to start a malicious batch script.’
- [T1543.003] Create or Modify System Process: Windows Service – JackalControl can run as a Windows service. ‘The Trojan is an executable file that can be started as a standard program or as a Windows service.’
- [T1547.001] Registry Run Keys/Startup Folder – Persistence via registry Run keys. ‘Persistence is usually guaranteed with one of the following mechanisms: … creation of a Windows registry run key.’
- [T1053.005] Scheduled Task – Persistence via scheduled tasks. ‘The malware’s persistence is usually guaranteed with one of the following mechanisms: … creation of a Windows scheduled task.’
- [T1047] Windows Management Instrumentation – Information gathering via WMI queries (e.g., ‘select * from win32_computersystemproduct’ and ‘select * from win32_diskdrive’).
- [T1082] System Information Discovery – GetSysInfo collects computer name, OS version, domain, user, time, and interfaces. ‘Computer name: %s OS version: %S Domain: %S User: %S Local time: %s …’
- [T1047] Windows Management Instrumentation – See above; WMI queries used to gather hardware identifiers, such as UUID and serials. ‘The UUID value obtained from the following WMI query: select * from win32_computersystemproduct’*
- [T1041] Exfiltration Over C2 Channel – Data and command results are compressed/encrypted and uploaded via POST to C2. ‘The resulting payload is concatenated with the BOT_ID … uploaded to the remote server using the aforementioned POST request format.’
- [T1027] Obfuscated/Compressed Files and Information – DES/AES encryption and gzip-based compression used for command results and payloads. ‘The command results are usually composed into a message that also includes the values of the underlying command type and command ID, which are compressed with GZIP, encrypted with DES, and encoded with base64.’
- [T1113] Screen Capture – JackalScreenWatcher captures desktop screenshots and sends them to C2. ‘The malware can handle some arguments … The program’s primary function involves running a thread that scans all displays … it captures a screenshot and sends it to the remote server.’
- [T1036] Data from Local System – JackalPerInfo collects local system data including installed apps, processes, and browser data. ‘GetSysInfo collects … Applications: %Installed Application1% … Cookies … History …’
- [T1083] File and Directory Discovery – Watcher enumerates files in directories and subdirectories to identify targets for exfiltration. ‘the Watcher enumerates all files in the directory and its subdirectories.’
Indicators of Compromise
- [MD5 Hashes] – JackalControl: 5ed498f9ad6e74442b9b6fe289d9feb3, a5ad15a9115a60f15b7796bc717a471d, c6e5c8bd7c066008178bc1fb19437763, 4f041937da7748ebf6d0bbc44f1373c9, eab4f3a69b2d30b16df3d780d689794c, 8c1070f188ae87fba1148a3d791f2523
- [MD5 Hashes] – JackalSteal: c05999b9390a3d8f4086f6074a592bc2
- [MD5 Hashes] – JackalWorm: 5de309466b2163958c2e12c7b02d8384
- [MD5 Hashes] – JackalPerInfo: a491aefb659d2952002ef20ae98d7465
- [MD5 Hashes] – JackalScreenWatcher: 1072bfeee89e369a9355819ffa39ad20
- [URLs] – JackalControl C2: hxxp://abert-online[.]de/meeting/plugins[.]php, hxxp://acehigh[.]host/robotx[.]php
- [URLs] – JackalSteal/JackalScreenWatcher C2: hxxps://tahaherbal[.]ir/wp-includes/class-wp-http-iwr-client.php, hxxps://winoptimum[.]com/wp-includes/customize/class-wp-customize-sidebar-refresh.php
- [URLs] – Distribution websites: hxxps://wwwpak-developers[.]net/internal_data/templates/template.html, hxxps://wwwpak-developers[.]net/internal_data/templates/bottom.jpg
- [Domains] – Compromised WordPress hosting: finasteridehair[.]com (C2 hosting reference)
- [Files] – Dropper/executable names observed: skype32.exe, Gallery of Officers Who Have Received National And Foreign Awards.docx, GoogleUpdateSetup.exe, upd.exe
Read more: https://securelist.com/goldenjackal-apt-group/109677/