Malware Attackers Utilizing MacroPack to Ship Havoc, Brute Ratel, and PhantomCore

Sep 05, 2024Ravie LakshmananCyber Menace / Malware

Malware Attackers Utilizing MacroPack to Ship Havoc, Brute Ratel, and PhantomCore

Menace actors are possible using a software designated for crimson teaming workout routines to serve malware, in keeping with new findings from Cisco Talos.

This system in query is a payload era framework known as MacroPack, which is used to generate Workplace paperwork, Visible Primary scripts, Home windows shortcuts, and different codecs for penetration testing and social engineering assessments. It was developed by French developer Emeric Nasi.

Cybersecurity

The cybersecurity firm stated it discovered artifacts uploaded to VirusTotal from China, Pakistan, Russia, and the U.S. that had been all generated by MacroPack and used to ship numerous payloads resembling Havoc, Brute Ratel, and a brand new variant of PhantomCore, a distant entry trojan (RAT) attributed to a hacktivist group named Head Mare.

“A standard characteristic in all of the malicious paperwork we dissected that caught our consideration is the existence of 4 non-malicious VBA subroutines,” Talos researcher Vanja Svajcer stated.

“These subroutines appeared in all of the samples and weren’t obfuscated. In addition they had by no means been utilized by every other malicious subroutines or anyplace else in any paperwork.”

An necessary side to notice right here is that the lure themes spanning these paperwork are diverse, starting from generic subjects that instruct customers to allow macros to official-looking paperwork that seem to come back from army organizations. This means the involvement of distinct risk actors.

A number of the paperwork have additionally been noticed benefiting from superior options provided as a part of MacroPack to bypass anti-malware heuristic detections by concealing the malicious performance utilizing Markov chains to create seemingly significant features and variable names.

Cybersecurity

The assault chains, noticed between Might and July 2024, observe a three-step course of that entails sending a booby-trapped Workplace doc containing MacroPack VBA code, which then decodes a next-stage payload to finally fetch and execute the ultimate malware.

The event is an indication that risk actors are continually updating techniques in response to disruptions and taking extra subtle approaches to code execution.

Discovered this text attention-grabbing? Observe us on Twitter and LinkedIn to learn extra unique content material we put up.


Leave a Reply

Your email address will not be published. Required fields are marked *