DropBook

Description

(Cybereason) The newly discovered DropBook backdoor used fake Facebook accounts or Simplenote for command and control (C2) operations, and both SharpStage and DropBook implement a Dropbox client in order to exfiltrate the data stolen from their targets to a cloud storage, as well as for storing their espionage tools.

DropBook can download and execute an extended arsenal of payloads stored on Dropbox, such as: MoleNet Downloader, QuasarRAT, SharpStage Backdoor, an updated version of DropBook, and ProcessExplorer, a legitimate tool by Microsoft to monitor Windows processes, often used by attackers for reconnaissance and to dump credentials.

Names

Name
DropBook

Category

Malware

Type

  • Backdoor
  • Info stealer
  • Exfiltration

Information

Mitre Attack

Malpedia

Other Information

Uuid

7ff05b70-6c5f-4aa1-b95e-1c29508fded7

Last Card Change

2022-12-30