Red-Team-Tool "MacroPack" bei Angriffen zum Einsatz von Brute Ratel missbraucht

Teilen:

The MacroPack framework, initially designed for Red Team exercises, is being abused by threat actors to deploy malicious payloads, including Havoc, Brute Ratel, and PhatomCore.

Security researchers at Cisco Talos have analyzed malicious document submissions on VirusTotal from various countries, including the United States, Russia, China, and Pakistan.

These documents varied in their lures, sophistication, and infection vectors, indicating that MacroPack is being abused by multiple threat actors, signifying a potential trend.

MacroPack payload generation

MacroPack is a proprietary tool focused on Red Team exercises and adversary simulations, created by French developer Emeric Nasi (dba BallisKit).

It offers advanced features such as anti-malware bypass, anti-reversing techniques, and the ability to build various document payloads with code obfuscation and embed undetectable VB scripts.

There’s also a “lite” open-source version called MacroPack Community, which is no longer maintained.

Cisco reports catching many document samples in the wild that carry signs they were created on MacroPack, including Markov-chain-based function and variable renaming, removal of comments and surplus space characters that minimize static analysis detection rates, and strings encoding.

ADVERTISING

The giveaway characteristic on all those documents indicating they were built on MacroPack Pro is the existence of four non-malicious VBA subroutines that the researchers say they confirmed were added by the professional version of the framework.

Victims opening these Microsoft Office documents will trigger a first-stage VBA code, which loads a malicious DLL that connects to the attacker’s command and control (C2) server.

Documents in the wild

Cisco Talos’ report identifies four significant clusters of malicious activity associated with MacroPack abuse, which are summarized as follows:

  • China: Documents from IP addresses in China, Taiwan, and Pakistan (May-July 2024) instructed users to enable macros, delivering Havoc and Brute Ratel payloads. These payloads connected to C2 servers located in Henan, China (AS4837).
  • Pakistan: Documents with Pakistani military themes were uploaded from locations in Pakistan. One document, posing as a circular from the Pakistan Air Force, and another as an employment confirmation, deployed Brute Ratel badgers. The documents communicated using DNS over HTTPS and Amazon CloudFront, with one embedding a base64-encoded blob for Adobe Experience Cloud tracking.
  • Russia: A blank Excel workbook uploaded from a Russian IP in July 2024 delivered PhantomCore, a Golang-based backdoor used for espionage. The document ran multi-stage VBA code, which attempted to download the backdoor from a remote URL.
  • U.S.: A document uploaded in March 2023 posed as an encrypted NMLS renewal form and used Markov Chain-generated function names to evade detection. The document contained multi-stage VBA code, which checked for sandbox environments before attempting to download an unknown payload via mshta.exe.
  • Brute Ratel is a post-exploitation attack framework hackers have been deploying as an alternative to Cobalt Strike since mid-2022.

    Ransomware groups were also spotted using a cracked version of the tool to evade EDRs and AVs during attacks.

    The abuse of MacroPack adds another layer of stealth to these attacks and is a worrying development for defenders.

    BleepingComputer has contacted Emeric Nasi about the observed abuse, but we have not received a response yet.

Bill Toulas

Kommentar verfassen

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert

lade-bild
London, GB
3:14 pm, Juni 23, 2025
Wetter-Symbol 22°C
L: 21° | H: 24°
broken clouds
Luftfeuchtigkeit: 40 %
Druck: 1014 mb
Wind: 17 mph W
Windböe: 0 mph
UV-Index: 0
Niederschlag: 0 mm
Wolken: 53%
Regen Chance: 0%
Sichtbarkeit: 10 km
Sonnenaufgang: 4:43 am
Sonnenuntergang: 9:21 pm
TäglichStündlich
Tägliche VorhersageStündliche Vorhersage
Today 10:00 pm
Wetter-Symbol
21° | 24°°C 0 mm 0% 14 mph 49 % 1015 mb 0 mm/h
Tomorrow 10:00 pm
Wetter-Symbol
13° | 23°°C 0.2 mm 20% 14 mph 80 % 1016 mb 0 mm/h
Mi. Juni 25 10:00 pm
Wetter-Symbol
16° | 28°°C 0 mm 0% 9 mph 89 % 1013 mb 0 mm/h
Do. Juni 26 10:00 pm
Wetter-Symbol
17° | 22°°C 1 mm 100% 14 mph 91 % 1017 mb 0 mm/h
Fr. Juni 27 10:00 pm
Wetter-Symbol
14° | 27°°C 0 mm 0% 16 mph 69 % 1020 mb 0 mm/h
Today 4:00 pm
Wetter-Symbol
22° | 22°°C 0 mm 0% 13 mph 40 % 1014 mb 0 mm/h
Today 7:00 pm
Wetter-Symbol
21° | 22°°C 0 mm 0% 14 mph 39 % 1014 mb 0 mm/h
Today 10:00 pm
Wetter-Symbol
17° | 19°°C 0 mm 0% 10 mph 49 % 1015 mb 0 mm/h
Tomorrow 1:00 am
Wetter-Symbol
14° | 14°°C 0 mm 0% 9 mph 68 % 1016 mb 0 mm/h
Tomorrow 4:00 am
Wetter-Symbol
13° | 13°°C 0 mm 0% 8 mph 80 % 1014 mb 0 mm/h
Tomorrow 7:00 am
Wetter-Symbol
15° | 15°°C 0 mm 0% 11 mph 75 % 1014 mb 0 mm/h
Tomorrow 10:00 am
Wetter-Symbol
19° | 19°°C 0 mm 0% 12 mph 63 % 1013 mb 0 mm/h
Tomorrow 1:00 pm
Wetter-Symbol
20° | 20°°C 0 mm 0% 14 mph 66 % 1013 mb 0 mm/h
Name Preis24H (%)
Bitcoin(BTC)
€89,300.51
1.45%
Ethereum(ETH)
€2,006.89
4.46%
Fesseln(USDT)
€0.87
0.01%
XRP(XRP)
€1.77
3.21%
Solana(SOL)
€119.15
5.94%
USDC(USDC)
€0.87
0.01%
Dogecoin(DOGE)
€0.135499
4.26%
Shiba Inu(SHIB)
€0.000010
5.69%
Pepe(PEPE)
€0.000008
5.99%
Peanut das Eichhörnchen(PNUT)
€0.219411
13.10%
Nach oben scrollen