{"id":50642,"date":"2016-06-21T15:47:22","date_gmt":"2016-06-21T22:47:22","guid":{"rendered":"https:\/\/blogs.mcafee.com\/?p=50642"},"modified":"2025-06-02T19:15:16","modified_gmt":"2025-06-03T02:15:16","slug":"macro-malware-adds-tricks-uses-maxmind-to-avoid-detection","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/macro-malware-adds-tricks-uses-maxmind-to-avoid-detection\/","title":{"rendered":"Macro Malware Adds Tricks, Uses MaxMind to Avoid Detection"},"content":{"rendered":"<p>Macro malware continues to evolve and use new tricks to evade detection. This threat is responsible for downloading malicious Trojans such as <a href=\"https:\/\/securingtomorrow.mcafee.com\/mcafee-labs\/macro-malware-associated-dridex-finds-new-ways-hide\/\">Dridex <\/a>and ransomware such as <a href=\"https:\/\/securingtomorrow.mcafee.com\/mcafee-labs\/locky-ransomware-arrives-via-email-attachment\/\">Locky.<\/a><\/p>\n<p>Recently McAfee Labs has encountered a new variant of macro malware that uses new techniques to avoid executing in an undesirable environment. With this variant when we click on a doc file, we see some junk content and a request to enable macros. If a user clicks Enable Content, macros will be enabled and will download malicious content. (By default protected view is enabled, preventing malicious macros from running unless users enable them.)<\/p>\n<p>&nbsp;<\/p>\n<h2>\n<img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-50643\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/warning-1.png\" alt=\"warning\" width=\"808\" height=\"412\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/warning-1.png 808w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/warning-1-300x153.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/warning-1-768x392.png 768w\" sizes=\"auto, (max-width: 808px) 100vw, 808px\" \/>On Macro Malware<\/h2>\n<p>McAfee Labs has previously <a href=\"https:\/\/securingtomorrow.mcafee.com\/mcafee-labs\/macro-malware-employs-advanced-obfuscation-to-avoid-detection\/\">blogged <\/a>about macro malware using high-obfuscation algorithms and several other layers of evasion to avoid detection. Previous variants have used fudging techniques such as virtual machine awareness, sandbox awareness, and others. At first glance, it is difficult to guess the intentions of this macro malware.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-50644\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/strings-1.png\" alt=\"strings\" width=\"786\" height=\"311\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/strings-1.png 786w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/strings-1-300x119.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/strings-1-768x304.png 768w\" sizes=\"auto, (max-width: 786px) 100vw, 786px\" \/><\/p>\n<p>The malware hides all strings that\u00a0can give a hint of its behavior. To this point, we have seen two\u00a0types of string obfuscation. In the first type, two parameters are passed to get the following string. The first parameter of the function is an obfuscated string and the second parameter is a junk string that needs to be removed from the first.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-50645\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/1-4.png\" alt=\"1\" width=\"374\" height=\"15\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/1-4.png 374w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/1-4-300x12.png 300w\" sizes=\"auto, (max-width: 374px) 100vw, 374px\" \/><\/p>\n<p>The following Python script decrypts the content:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-50646\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/python.png\" alt=\"python\" width=\"240\" height=\"242\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/python.png 240w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/python-150x150.png 150w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/python-32x32.png 32w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/python-64x64.png 64w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/python-96x96.png 96w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/python-128x128.png 128w\" sizes=\"auto, (max-width: 240px) 100vw, 240px\" \/><\/p>\n<p>With the second type of string obfuscation, only one\u00a0string is passed to the function:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-50647\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2nd.png\" alt=\"2nd\" width=\"374\" height=\"13\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2nd.png 374w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2nd-300x10.png 300w\" sizes=\"auto, (max-width: 374px) 100vw, 374px\" \/><\/p>\n<p>The Python script to decrypt the string:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-50648\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/python2.png\" alt=\"python2\" width=\"268\" height=\"226\" \/><\/p>\n<p>In addition to string obfuscations, the malware\u00a0checks the number of recently opened or accessed files. The execution exits if the number is less than three. This is a simple technique to avoid analysis because security researchers often use a fresh copy of a virtual environment that has no\u00a0recently used files. The VBA code:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-50649\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/recentfiles.png\" alt=\"recentfiles\" width=\"294\" height=\"33\" \/><\/p>\n<p>The macros employ\u00a0a legitimate site for their malicious purposes. The threat actors use the MaxMind service to gather IP-based location data. (MaxMind provides location data for IP addresses.) The VBA code:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-50650\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/maxmind.png\" alt=\"maxmind\" width=\"748\" height=\"194\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/maxmind.png 748w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/maxmind-300x78.png 300w\" sizes=\"auto, (max-width: 748px) 100vw, 748px\" \/><\/p>\n<p>ResponseText1 contains the location, IP address, organization name, and other information. The malware checks whether the following names are contained in ResponseText1.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-50651\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/check1.png\" alt=\"check1\" width=\"583\" height=\"83\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/check1.png 583w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/check1-300x43.png 300w\" sizes=\"auto, (max-width: 583px) 100vw, 583px\" \/><\/p>\n<p>If any of these names are present, the malware stops. It avoids executing in several antimalware and web hosting organizations, as well as in some cases in Russia and North America. After execution the malware downloads malware families such as Ursnif, which steals banking information.<\/p>\n<p>McAfee advises all users to keep their antimalware products up to date. McAfee products detect this malware as W97M\/Downloader.<\/p>\n<p>Analyzed MD5 hashes:<\/p>\n<ul>\n<li>fac4245a1a3f9e4f5f4c9b727133837b<\/li>\n<li>e3f93401a1494112d242c80333703b0f<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Macro malware continues to evolve and use new tricks to evade detection. This threat is responsible for downloading malicious Trojans&#8230;<\/p>\n","protected":false},"author":815,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[1814,76,180],"coauthors":[4610],"class_list":["post-50642","post","type-post","status-publish","format-standard","hentry","category-mcafee-labs","tag-computer-security","tag-cybercrime","tag-malware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Macro Malware Adds Tricks, Uses MaxMind to Avoid Detection | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Macro malware continues to evolve and use new tricks to evade detection. This threat is responsible for downloading malicious Trojans such as Dridex and\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Macro Malware Adds Tricks, Uses MaxMind to Avoid Detection | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Macro malware continues to evolve and use new tricks to evade detection. This threat is responsible for downloading malicious Trojans such as Dridex and\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/macro-malware-adds-tricks-uses-maxmind-to-avoid-detection\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/devendrasingh.gurjar.94\" \/>\n<meta property=\"article:published_time\" content=\"2016-06-21T22:47:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-03T02:15:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/warning-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"808\" \/>\n\t<meta property=\"og:image:height\" content=\"412\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Devendra Singh\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Devendra Singh\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/macro-malware-adds-tricks-uses-maxmind-to-avoid-detection\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/macro-malware-adds-tricks-uses-maxmind-to-avoid-detection\/\"},\"author\":{\"name\":\"Devendra Singh\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/8f2496c4191cf2bc7639b5c041cf478a\"},\"headline\":\"Macro Malware Adds Tricks, Uses MaxMind to Avoid Detection\",\"datePublished\":\"2016-06-21T22:47:22+00:00\",\"dateModified\":\"2025-06-03T02:15:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/macro-malware-adds-tricks-uses-maxmind-to-avoid-detection\/\"},\"wordCount\":450,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/macro-malware-adds-tricks-uses-maxmind-to-avoid-detection\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/warning-1.png\",\"keywords\":[\"computer security\",\"cybercrime\",\"malware\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/macro-malware-adds-tricks-uses-maxmind-to-avoid-detection\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/macro-malware-adds-tricks-uses-maxmind-to-avoid-detection\/\",\"name\":\"Macro Malware Adds Tricks, Uses MaxMind to Avoid Detection | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/macro-malware-adds-tricks-uses-maxmind-to-avoid-detection\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/macro-malware-adds-tricks-uses-maxmind-to-avoid-detection\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/warning-1.png\",\"datePublished\":\"2016-06-21T22:47:22+00:00\",\"dateModified\":\"2025-06-03T02:15:16+00:00\",\"description\":\"Macro malware continues to evolve and use new tricks to evade detection. This threat is responsible for downloading malicious Trojans such as Dridex and\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/macro-malware-adds-tricks-uses-maxmind-to-avoid-detection\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/macro-malware-adds-tricks-uses-maxmind-to-avoid-detection\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/macro-malware-adds-tricks-uses-maxmind-to-avoid-detection\/#primaryimage\",\"url\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/warning-1.png\",\"contentUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/warning-1.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/macro-malware-adds-tricks-uses-maxmind-to-avoid-detection\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Macro Malware Adds Tricks, Uses MaxMind to Avoid Detection\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/8f2496c4191cf2bc7639b5c041cf478a\",\"name\":\"Devendra Singh\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/cbf81975ab1078233e5ac0b815db2b78\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/613956760625882b51f3a0ce25b39a27?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/613956760625882b51f3a0ce25b39a27?s=96&d=mm&r=g\",\"caption\":\"Devendra Singh\"},\"description\":\"Devendra Singh is a Research Scientist with McAfee Labs. He enjoys working on latest threats and figuring out ways to protect customers from them. His hobbies include playing cricket and reading books.\",\"sameAs\":[\"https:\/\/www.facebook.com\/devendrasingh.gurjar.94\",\"https:\/\/www.linkedin.com\/in\/devendra-singh-82324655\/\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/devendra-singh\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Macro Malware Adds Tricks, Uses MaxMind to Avoid Detection | McAfee Blog","description":"Macro malware continues to evolve and use new tricks to evade detection. This threat is responsible for downloading malicious Trojans such as Dridex and","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Macro Malware Adds Tricks, Uses MaxMind to Avoid Detection | McAfee Blog","og_description":"Macro malware continues to evolve and use new tricks to evade detection. This threat is responsible for downloading malicious Trojans such as Dridex and","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/macro-malware-adds-tricks-uses-maxmind-to-avoid-detection\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/devendrasingh.gurjar.94","article_published_time":"2016-06-21T22:47:22+00:00","article_modified_time":"2025-06-03T02:15:16+00:00","og_image":[{"width":808,"height":412,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/warning-1.png","type":"image\/png"}],"author":"Devendra Singh","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"Devendra Singh","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/macro-malware-adds-tricks-uses-maxmind-to-avoid-detection\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/macro-malware-adds-tricks-uses-maxmind-to-avoid-detection\/"},"author":{"name":"Devendra Singh","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/8f2496c4191cf2bc7639b5c041cf478a"},"headline":"Macro Malware Adds Tricks, Uses MaxMind to Avoid Detection","datePublished":"2016-06-21T22:47:22+00:00","dateModified":"2025-06-03T02:15:16+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/macro-malware-adds-tricks-uses-maxmind-to-avoid-detection\/"},"wordCount":450,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/macro-malware-adds-tricks-uses-maxmind-to-avoid-detection\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/warning-1.png","keywords":["computer security","cybercrime","malware"],"articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/macro-malware-adds-tricks-uses-maxmind-to-avoid-detection\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/macro-malware-adds-tricks-uses-maxmind-to-avoid-detection\/","name":"Macro Malware Adds Tricks, Uses MaxMind to Avoid Detection | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/macro-malware-adds-tricks-uses-maxmind-to-avoid-detection\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/macro-malware-adds-tricks-uses-maxmind-to-avoid-detection\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/warning-1.png","datePublished":"2016-06-21T22:47:22+00:00","dateModified":"2025-06-03T02:15:16+00:00","description":"Macro malware continues to evolve and use new tricks to evade detection. This threat is responsible for downloading malicious Trojans such as Dridex and","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/macro-malware-adds-tricks-uses-maxmind-to-avoid-detection\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/macro-malware-adds-tricks-uses-maxmind-to-avoid-detection\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/macro-malware-adds-tricks-uses-maxmind-to-avoid-detection\/#primaryimage","url":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/warning-1.png","contentUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/warning-1.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/macro-malware-adds-tricks-uses-maxmind-to-avoid-detection\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"Macro Malware Adds Tricks, Uses MaxMind to Avoid Detection"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/8f2496c4191cf2bc7639b5c041cf478a","name":"Devendra Singh","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/cbf81975ab1078233e5ac0b815db2b78","url":"https:\/\/secure.gravatar.com\/avatar\/613956760625882b51f3a0ce25b39a27?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/613956760625882b51f3a0ce25b39a27?s=96&d=mm&r=g","caption":"Devendra Singh"},"description":"Devendra Singh is a Research Scientist with McAfee Labs. He enjoys working on latest threats and figuring out ways to protect customers from them. His hobbies include playing cricket and reading books.","sameAs":["https:\/\/www.facebook.com\/devendrasingh.gurjar.94","https:\/\/www.linkedin.com\/in\/devendra-singh-82324655\/"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/devendra-singh\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/50642","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/815"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=50642"}],"version-history":[{"count":2,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/50642\/revisions"}],"predecessor-version":[{"id":214925,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/50642\/revisions\/214925"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=50642"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=50642"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=50642"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=50642"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}