cedowens / Mythic-Macro-Generator

Python3 script to generate a macro to launch a Mythic payload. Author: Cedric Owens

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Mythic-Macro-Generator

Python3 script to generate MS Office macros for launching Mythic JXA payloads.

This script generates an Office macro which uses osascript to download and execute the Mythic JXA .js payload.

Steps:

  1. Set up Mythic C2 server and generate an "apfell" jxa payload (note: this generator assumes that the payload is using http not https...if you are using https instead, you can just modify the generator script to have curl use https). Download that payload on the Mythic server.

  2. Remove the first line of the Mythic JXA .js launcher ("// Created by Cody Thomas - @its_a_feature_"). Some static A/V signatures have been known to check for this static string. Host that payload (ex: put the .js payload in a folder and use python -m SimpleHTTPServer to host)

  3. Run this macro generator:

python3 jxa-macro.py -u [url to the hosted .js payload in #2 above]

example: python3 jxa-macro.py -u http://192.168.1.1:8000/apfell2.js

  1. The macro text will be dropped to a file in the same directory named "macro.txt"

  2. Copy and paste that macro into an MS Office doc.


Detection:

This macro spawns the following parent-child relationships that can be used for detection:

Office Product (ex: Microsoft Word.app) --> /bin/sh

Office Product (ex: Microsoft Word.app) --> /bin/bash

Office Product (ex: Microsoft Word.app) --> /usr/bin/curl


Note: This will launch the JXA payload inside of the App Sandbox. However, Mythic does have the ability to add Login Item persistence even from the App Sandbox.

About

Python3 script to generate a macro to launch a Mythic payload. Author: Cedric Owens

License:BSD 3-Clause "New" or "Revised" License


Languages

Language:Python 100.0%