Monday, April 7, 2025
HomeSecurity NewsRubella Macro Builder - A Malware Development Crimeware Kit Selling in Underground...

Rubella Macro Builder – A Malware Development Crimeware Kit Selling in Underground Hacking Forum

Published on

SIEM as a Service

Follow Us on Google News

A Malware development crimeware kit called Rubella Macro Builder activity selling in Russian based underground hacking Forum for $500 per month.

This kit has extremely sophisticated with a lot more capabilities with cheap cost with fast performance and also evade the antivirus detection.

A Malware kit developers also reduce the price since April to $120 USD for a 3-month license and Rubella Macro Builder activities getting various updates, additions, and pricing changes in hacking Forum.

- Advertisement - Google News

This tool enables to use various social engineering techniques to distribute the malware through office document and enable the macro.

Also, this crimeware kit using various encryption algorithm choices ( XOR and Base64), download methods (PowerShell, Bitsadmin, Microsoft.XMLHTTP, MSXML2.XMLHTTP, custom PowerShell payload), payload execution methods (executable, JavaScript, Visual Basic Script)
Rubella Macro Builder settings

Malware Builder Capabilities in Hacking Forum

Office document and Excel-based Email attachment is the main medium of distribution  Rubella-generated malware act as a first-stage loader and it helps to download other malware and install into the target machine.

After the infection, if it doesn’t find any vulnerabilities in the vicitms machine, it relies on social engineering techniques to force victims to enable malicious macro execution to run it.

Also Rubella Macro Builder capable to generate Microsoft Word (.DOC) and Microsoft Excel (.XLS) payloads.

Rubella document imitates a DPD shipping document to Enable Macro

According to flashpoint research, The observed server call request is achieved via the IXMLHTTPRequest method in this specific variant. The macro code contains auto execution when the Word document is opened via an AutoOpen call. Additionally, the code has logic to delete the file if it exists via a Kill call.

Rubella Kit Malware leads to install two banking malware called Panda and Gootkit which has a capacity to perform credential harvesting capabilities, browser infection through webinjects, and remote PC access via a hidden virtual network computing.

Researchers believe that these two banking malware developers gang are customers of the actor offering Rubella on the underground.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Threat Actors Exploit Toll Payment Services in Widespread Hacking Campaign

In a sophisticated cybercrime operation, the Smishing Triad, a China-based group, has been identified...

Everest Ransomware Gang’s Leak Site Hacked and Defaced

TechCrunch has uncovered a concerning development in consumer-grade spyware: a stealthy Android monitoring app...

ToddyCat Attackers Exploited ESET Command Line Scanner Vulnerability to Conceal Their Tool

In a sophisticated cyberattack, the notorious ToddyCat APT group utilized a previously unknown vulnerability...

Threat Actors Use VPS Hosting Providers to Deliver Malware and Evade Detection

Cybercriminals are intensifying phishing campaigns to spread the Grandoreiro banking trojan, targeting users primarily...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Advanced CoffeeLoader Malware Evades Security to Deliver Rhadamanthys Shellcode

Security researchers at Zscaler ThreatLabz have identified a new sophisticated malware family called CoffeeLoader,...

Clio: Real-Time Logging Tool with Locking, User Authentication, and Audit Trails

Clio is a cutting-edge, secure logging platform designed specifically for red team operations and...

Enhancing Satellite Security by Encrypting Video Data Directly on Payloads

The rapid expansion of low-Earth orbit (LEO) satellite constellations has underscored the need for...