Malicious Software Attackers Leveraging MacroPack to Distribute Chaos, Strong Arm, and ShadowCore

September 05, 2024Ravie LakshmananCyber Threat / Malicious Software

Adversaries are likely using a utility designed for red teaming exercises to deliver malicious software, as per recent discoveries from Cisco Talos.

Malware Attackers Using MacroPack to Deliver Havoc, Brute Ratel, and PhantomCore

September 05, 2024Ravie LakshmananCyber Threat / Malicious Software

Malware Attackers Using MacroPack to Deliver Havoc, Brute Ratel, and PhantomCore

Adversaries are likely using a utility designed for red teaming exercises to deliver malicious software, as per recent discoveries from Cisco Talos.

The application under scrutiny is a payload creation platform known as MacroPack, which is employed to produce Office files, Visual Basic scripts, Windows shortcuts, and other file types for penetration testing and social engineering evaluations. It was created by French programmer Emeric Nasi.

Cybersecurity

The cybersecurity firm mentioned that it identified artifacts uploaded to VirusTotal from China, Pakistan, Russia, and the U.S. that were all generated using MacroPack and utilized to deploy various payloads such as Chaos, Strong Arm, and a new iteration of ShadowCore, a remote access trojan (RAT) linked to a hacktivist faction called Head Mare.

“A shared characteristic in all the malevolent files we examined that grabbed our notice is the presence of four non-harmful VBA subroutines,” Talos analyst Vanja Svajcer mentioned.

“These subroutines were present in all the samples and were not obscured. They also had never been utilized by any other malicious subroutines or elsewhere in any files.”

An important point to highlight here is that the enticement themes across these files vary, encompassing generic subjects instructing users to enable macros to official-looking documents appearing to originate from military establishments. This implies the engagement of diverse threat actors.

Some of the files have also been seen exploiting advanced functionalities provided as part of MacroPack to evade anti-malware heuristic detections by hiding the malevolent operations using Markov chains to generate apparently meaningful functions and variable names.

Cybersecurity

The attack sequences, witnessed between May and July 2024, follow a three-stage procedure whereby a booby-trapped Office file containing MacroPack VBA code is sent, which then decodes a subsequent-stage payload to ultimately retrieve and run the final malware.

The development signifies that malicious actors are continuously refining strategies in reaction to disturbances and adopting more advanced methods for code execution.

Found this article intriguing? Track us on Twitter and LinkedIn to read more exclusive content we post.

About Author

Subscribe To InfoSec Today News

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

World Wide Crypto will use the information you provide on this form to be in touch with you and to provide updates and marketing.