HomeCII/OTThreat Actors Used MacroPack to Deploy Hazardous Payloads

Threat Actors Used MacroPack to Deploy Hazardous Payloads

Published on

spot_img

Cybercriminals have been utilizing MacroPack, a legitimate framework created for red team exercises, to disseminate harmful payloads, including the Brute Ratel and Havoc tools, as well as a new version of the PhantomCore remote access trojan (RAT). The analysis of MacroPack lure documents showed the utilization of obfuscation tactics to sidestep detection, such as function and variable renaming, string encoding, and the removal of comments and extra whitespace. These activities were aimed at victims in China, Pakistan, Russia, and the United States.

When researchers at Cisco Talos delved into the matter, they discovered various clusters of MacroPack-generated documents, each with unique lure themes and payloads. The initial cluster consisted of generic Word documents prompting users to activate content, which would then allow the malicious macros to operate. These documents, originating from China, Taiwan, and Pakistan, dispensed the Havoc post-exploitation framework as the final payload.

Havoc, an open-source tool used by penetration testers and red teams, has also been misused by threat actors for malicious intents. The Havoc implants, known as ‘demons,’ grant attackers remote access to compromised systems. The subsequent cluster of documents, uploaded from Pakistan, presented military-themed attractions, like a circular announcing awards for officers in the Pakistani Air Force. These documents distributed Brute Ratel, another viable red teaming framework that has been co-opted by actual threat actors.

Brute Ratel allows for a wide array of malicious activities, such as remote command execution, lateral movement, persistence, and evasion of endpoint security solutions. The payloads from Brute Ratel employed DNS over HTTPS and Amazon CloudFront CDN servers for command-and-control communications.

A striking feature of the MacroPack-generated documents was the inclusion of four non-malicious VBA subroutines. These benign functions, sourced from a website hosting VBA examples and a French Microsoft Word programming book, were likely incorporated to decrease the overall entropy of the code and bypass heuristic-driven detection. The author of MacroPack also integrated a mechanism to generate function and variable names using Markov chains, crafting seemingly sensible names to further evade detection.

Although the observed tactics, techniques, and procedures (TTPs) in these samples were undoubtedly malicious, the researchers were unable to attribute the actions to a single threat actor and did not exclude the possibility that some of the documents might have represented red teaming exercises rather than real-world attacks. While the researchers have shared indicators of compromise (IOCs) linked to the identified samples, certain details were omitted from the report due to the likelihood of them being part of legitimate red team activities.

Source link

Latest articles

FBI-Backed Operation Targets Crypto Scam Centers

Cryptocurrency Fraud, ...

Researchers discover industrial sabotage malware that predates Stuxnet by five years

Uncovering the Shadows: The Implications of Malware Targeting Water Modeling Systems Recent findings by cybersecurity...

Most Common Authentication Methods

The current landscape of digital user authentication is characterized by significant confusion and complexity....

Silverfort Acquires Fabrix to Enhance Access Decisions with AI

Fabrix Security Acquisition by Silverfort Enhances Real-Time Decision-Making for Identity Management In a significant move...

More like this

FBI-Backed Operation Targets Crypto Scam Centers

Cryptocurrency Fraud, ...

Researchers discover industrial sabotage malware that predates Stuxnet by five years

Uncovering the Shadows: The Implications of Malware Targeting Water Modeling Systems Recent findings by cybersecurity...

Most Common Authentication Methods

The current landscape of digital user authentication is characterized by significant confusion and complexity....