DanDrop

Description

(SecureWorks) The threat actors use this malicious macro to extract the DanBot payload from the weaponized document and then Base64-decode and install the malware using a scheduled task. The basic form and function of the macro have remained constant across analyzed samples, but the threat actors have made incremental improvements to obfuscate the macro and refactor some of the functionality.

Names

Name
DanDrop

Category

Malware

Type

  • Dropper

Information

Other Information

Uuid

580fa928-850c-4a8e-9b58-406a68f57e13

Last Card Change

2020-04-20