{"id":95824,"date":"2019-07-16T21:00:56","date_gmt":"2019-07-17T04:00:56","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=95824"},"modified":"2025-06-02T19:48:34","modified_gmt":"2025-06-03T02:48:34","slug":"mcafee-atr-aids-police-in-arrest-of-the-rubella-and-dryad-office-macro-builder-suspect","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-atr-aids-police-in-arrest-of-the-rubella-and-dryad-office-macro-builder-suspect\/","title":{"rendered":"McAfee ATR Aids Police in Arrest of Rubella &#038; Dryad Office Macro Builder"},"content":{"rendered":"<p>Everyday thousands of people receive emails with malicious attachments in their email inbox. Disguised as a missed payment or an invoice, a cybercriminal sender tries to entice a victim to open the document and enable the embedded macro. This macro then proceeds to pull in a whole array of nastiness and infect a victim\u2019s machine. Given the high success rate, malicious Office documents remain a preferred weapon in a cyber criminal\u2019s arsenal. To take advantage of this demand and generate revenue, some criminals decided to create off-the-shelf toolkits for building malicious Office documents. These toolkits are mostly offered for sale on underground cybercriminal forums.<\/p>\n<p>Announced today, the Dutch National High-Tech Crime Unit (NHTCU) arrested an individual suspected of building and selling such a criminal toolkit named the Rubella Macro Builder. McAfee Advanced Threat Research spotted the Rubella toolkit in the wild some time ago and was able to provide NHTCU with insights that proved crucial in its investigation. In the following blog we will explain some of the details we found that helped unmask the suspected actor behind the Rubella Macro Builder.<\/p>\n<h2>What is an Office Macro Builder?<\/h2>\n<p>An Office Macro Builder is a toolkit designed to weaponize an Office document so it can deliver a malicious payload by the use an obfuscated macro code that purposely tries to bypass endpoint security defenses. By using a toolkit dedicated to this purpose, an actor can push out higher quantities of malicious documents and successfully outsource the first stage evasion and delivery process to a specialized third party. Below is an overview with the general workings of an Office Macro Builder. The Defense evasion shown here is specific to Rubella Office Macro Builder. Additional techniques can be found in other builders.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-95825\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/07\/builer-overview.png\" alt=\"\" width=\"822\" height=\"1062\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/builer-overview.png 822w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/builer-overview-232x300.png 232w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/builer-overview-768x992.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/builer-overview-793x1024.png 793w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/builer-overview-387x500.png 387w\" sizes=\"auto, (max-width: 822px) 100vw, 822px\" \/><\/p>\n<h2>Dutch Language OpSec fail\u2026.<\/h2>\n<p>Rubella Macro Builder is such a toolkit and was offered by an actor by the same nickname \u201cRubella\u201d. The toolkit was marketed with colorful banners on different underground forums. For the price of 500 US Dollars per month you could use his toolkit to weaponize Office documents that bypass end-point security systems and deliver a malicious payload or run a PowerShell Code of your choice.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-95826\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/07\/advertisement.png\" alt=\"\" width=\"583\" height=\"930\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/advertisement.png 583w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/advertisement-188x300.png 188w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/advertisement-313x500.png 313w\" sizes=\"auto, (max-width: 583px) 100vw, 583px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Rubella advertisement banner<\/em><\/p>\n<p>In one of Rubella\u2019s forum postings the actor was detailing the toolkit and that it managed to bypass the Windows Anti Malware Scan Interface (AMSI) present in Windows 10. To prove this success, the post contained a link to a screenshot. Being a Dutch researcher, this screenshot immediately stood out because of the Dutch version of Microsoft Word that was used. Dutch is a very uncommon language, only a small percentage of the world\u2019s population speaks it, let alone an even smaller percentage of cybercriminals who use it.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-95827\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/07\/Dutch-version.png\" alt=\"\" width=\"1378\" height=\"627\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/Dutch-version.png 1378w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/Dutch-version-300x137.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/Dutch-version-768x349.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/Dutch-version-1024x466.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/Dutch-version-1099x500.png 1099w\" sizes=\"auto, (max-width: 1378px) 100vw, 1378px\" \/><\/p>\n<p style=\"text-align: center;\"><em>The linked screenshot with the Dutch version of Microsoft Word.<\/em><\/p>\n<p>Interestingly enough we <a href=\"https:\/\/securingtomorrow.mcafee.com\/other-blogs\/mcafee-labs\/what-drives-a-ransomware-criminal-coinvault-developers-convicted-in-dutch-court\/\" target=\"_blank\" rel=\"noopener noreferrer\">reported<\/a> last year on the individuals behind Coinvault ransomware. One of the reasons they got caught was the use of flawless Dutch in their code. With this in the back of our minds we decided to go deeper down the rabbit hole.<\/p>\n<h2>Forum Research<\/h2>\n<p>We looked further into the large amount of posts by <em>Rubella<\/em> to learn more about the person behind the builder. The actor <em>Rubella<\/em> was actually promoting a variety of different, some self-written, products and services, ranging from (stolen) credit card data, a crypto wallet stealer and a malicious loader software to a newly pitched product called Tantalus ransomware-as-a-service.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-95828\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/07\/Tantalus.png\" alt=\"\" width=\"2912\" height=\"854\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/Tantalus.png 2912w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/Tantalus-300x88.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/Tantalus-768x225.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/Tantalus-1024x300.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/Tantalus-1705x500.png 1705w\" sizes=\"auto, (max-width: 2912px) 100vw, 2912px\" \/><\/p>\n<p>During our research we were able to link different nicknames used by the actor on several forums across a timespan of many years. Piecing it all together, Rubella showed a classic growth pattern of an aspiring cybercriminal, started by gaining technical security knowledge on beginner forums with low op-sec and gradually moved to some of the bigger, exclusive forums to offer products and services.<\/p>\n<h2>PDB path Breitling<\/h2>\n<p>One of the posts Rubella placed on a popular hacker forum was promoting a piece of free software the actor coded to spoof email. The posting contained a link to VirusTotal and included a SHA-256 hash of the software. This gained our interest since it provided a possibility to link the adversary to the capability.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-95829\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/07\/Email-spoofer.png\" alt=\"\" width=\"1191\" height=\"554\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/Email-spoofer.png 1191w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/Email-spoofer-300x140.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/Email-spoofer-768x357.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/Email-spoofer-1024x476.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/Email-spoofer-1075x500.png 1075w\" sizes=\"auto, (max-width: 1191px) 100vw, 1191px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Email spoofer posting including the VirusTotal link\u00a0 <\/em><\/p>\n<p>Closer examination of the piece of software on VirusTotal showed that the mail Spoofer contained a debug or PDB path \u201cC:\\Users\\Breitling\u201d. Even though the username Breitling isn\u2019t very revealing about an actual person, leaving such a specific PDB path within malware is a classic mistake.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-95830\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/07\/classic-mistake.png\" alt=\"\" width=\"974\" height=\"577\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/classic-mistake.png 974w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/classic-mistake-300x178.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/classic-mistake-768x455.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/classic-mistake-844x500.png 844w\" sizes=\"auto, (max-width: 974px) 100vw, 974px\" \/><\/p>\n<p>By pivoting on the specific PDB path we found additional samples on VirusTotal, including a file that was named RubellaBuilder.exe, which was a version of the Macro builder that Rubella was offering. Later in the blog post we will take a closer look at the builder itself.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-95831\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/07\/additional-samples.png\" alt=\"\" width=\"1186\" height=\"540\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/additional-samples.png 1186w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/additional-samples-300x137.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/additional-samples-768x350.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/additional-samples-1024x466.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/additional-samples-1098x500.png 1098w\" sizes=\"auto, (max-width: 1186px) 100vw, 1186px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Finding additional samples with the Breitling PDB path<\/em><\/p>\n<p>Since Breitling was most likely the username used on the development machine, we were wondering if we could find Office documents that were crafted on the same machine and thus also containing the author name Breitling. We found an Office document with Breitling as author and the document happened to be created with a Dutch version of Microsoft Word.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-95832\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/07\/Word-document.png\" alt=\"\" width=\"605\" height=\"677\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/Word-document.png 605w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/Word-document-268x300.png 268w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/Word-document-447x500.png 447w\" sizes=\"auto, (max-width: 605px) 100vw, 605px\" \/><\/p>\n<p style=\"text-align: center;\"><em>The Word document containing the author name Breitling.<\/em><\/p>\n<p>Closer inspection of the content of the Word document revealed that it also contained a string with the familiar Jabber account of <em>Rubella<\/em>; Rubella(@)exploit.im.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-95833\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/07\/Jabber-account.png\" alt=\"\" width=\"1012\" height=\"374\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/Jabber-account.png 1012w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/Jabber-account-300x111.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/Jabber-account-768x284.png 768w\" sizes=\"auto, (max-width: 1012px) 100vw, 1012px\" \/><\/p>\n<p style=\"text-align: center;\"><em>The Malicious document containing the string with the actor\u2019s jabber account.<\/em><\/p>\n<p>Circling back to the forums we found an older posting under one of the nicknames we could link to Rubella. In this posting the actor is asking for advice on how to add a registry key using C#. They placed another screenshot to show the community what they were doing. This behavior clearly shows a lack of skill but at the same time his thirst for knowledge.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-95834\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/07\/help-sought.png\" alt=\"\" width=\"1117\" height=\"398\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/help-sought.png 1117w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/help-sought-300x107.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/help-sought-768x274.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/help-sought-1024x365.png 1024w\" sizes=\"auto, (max-width: 1117px) 100vw, 1117px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Older posting where the actor asks for help.<\/em><\/p>\n<p>A closer look at the screenshot revealed the same PDB path C:\\Users\\Breitling\\.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-95835\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/07\/PDB-path.png\" alt=\"\" width=\"931\" height=\"500\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/PDB-path.png 931w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/PDB-path-300x161.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/PDB-path-768x412.png 768w\" sizes=\"auto, (max-width: 931px) 100vw, 931px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Screenshot with the Breitling PDB path<\/em><\/p>\n<h2>Chatting with Rubella<\/h2>\n<p>Since <em>Rubella<\/em> was quite extroverted on the underground forums and had stated Jabber contact details in advertisements we decided to carefully initiate contact with him in the hope that we would get access to some more information. About a week after we added <em>Rubella<\/em> to our Jabber contact list, we received a careful \u201cHi.\u201d We started talking and posing as a potential buyer, carefully mentioning our interest the Rubella Macro Builder. During this chat <em>Rubella<\/em> was quite responsive and as a real businessperson, mentioned that he was offering a new \u201cmore exclusive\u201d Macro Builder named Dryad. <em>Rubella<\/em> proceeded to share a screenshot of Dryad with us.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-95836\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/07\/Dryad.png\" alt=\"\" width=\"809\" height=\"460\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/Dryad.png 809w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/Dryad-300x171.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/Dryad-768x437.png 768w\" sizes=\"auto, (max-width: 809px) 100vw, 809px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Screenshot of Dryad shared by Rubella<\/em><\/p>\n<p><em>\u00a0<\/em>Eventually we ended our conversation in a friendly manner and told Rubella we would be in touch if we remained interested.<\/p>\n<h2>Dryad Macro Builder<\/h2>\n<p>Based on the information provided from the chat with Rubella we performed a quick search for Dryad Macro Builder. We eventually found a sample of the Dryad Macro Builder and decided to further analyze this sample and compare it for overlap with the Rubella Macro Builder.<\/p>\n<h3>PE Summary<\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-95837\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/07\/PE-Summary.jpg\" alt=\"\" width=\"737\" height=\"181\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/PE-Summary.jpg 737w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/PE-Summary-300x74.jpg 300w\" sizes=\"auto, (max-width: 737px) 100vw, 737px\" \/><\/p>\n<p>We noticed that the program was coded in .NET Assembly which is usually a preferred language for less skilled malware coders.<\/p>\n<h3>Dynamic Analysis<\/h3>\n<p>When we ran the application, it asked us to enter a login and password in order to run.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-95839\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/07\/login.png\" alt=\"\" width=\"543\" height=\"222\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/login.png 543w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/login-300x123.png 300w\" sizes=\"auto, (max-width: 543px) 100vw, 543px\" \/><\/p>\n<p>We also noticed a number-generated HWID (Hardware-ID) that was always the same when running the app. The HWID number is a unique identifier specific to the machine it was running on and was used to register the app.<\/p>\n<p>When trying to enter a random name we detected a remote connection to the website \u2018hxxps:\/\/tailoredtaboo.com\/auth\/check.php\u2019 to verify the license.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-95840\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/07\/subscription.png\" alt=\"\" width=\"630\" height=\"226\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/subscription.png 630w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/subscription-300x108.png 300w\" sizes=\"auto, (max-width: 630px) 100vw, 630px\" \/><\/p>\n<p>The request is made with the following parameters \u2018hwid=&lt;HWID&gt;&amp;username=&lt;username&gt;&amp;password=&lt;password&gt;\u2019.<\/p>\n<p>Once the app is running and registered it shows the following interface.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-95842\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/07\/interface.png\" alt=\"\" width=\"944\" height=\"532\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/interface.png 944w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/interface-300x169.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/interface-768x433.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/interface-887x500.png 887w\" sizes=\"auto, (max-width: 944px) 100vw, 944px\" \/><\/p>\n<p>In this interface it is possible to see the function proposed by the app and it was similar to the screenshot that was shared during our chat.<\/p>\n<p>Basically, the tool allows the following:<\/p>\n<ul>\n<li>Download and execute a malicious executable from an URL<\/li>\n<li>Execute a custom command<\/li>\n<li>Type of payload can be exe, jar, vbs, pif, scr<\/li>\n<li>Modify the dropped filename<\/li>\n<li>Load a stub for increase obfuscation<\/li>\n<li>Generate a Word or Excel document<\/li>\n<\/ul>\n<p>It contains an Anti-virus Evasion tab:<\/p>\n<ul>\n<li>Use encryption and modify the encryption key<\/li>\n<li>Add junk code<\/li>\n<li>Add loop code<\/li>\n<\/ul>\n<p>It also contains a tab which is still in development:<\/p>\n<ul>\n<li>Create Jscript or VBscript<\/li>\n<li>Download and execute<\/li>\n<li>Payload URL<\/li>\n<li>Obfuscation with base64 and AMSI bypass which are not yet developed.<\/li>\n<\/ul>\n<h2>Reverse Engineering<\/h2>\n<p>The sample is coded in .Net without any obfuscation. We can see in the following screenshot the structure of the file.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-95843\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/07\/file-structure.png\" alt=\"\" width=\"392\" height=\"306\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/file-structure.png 392w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/file-structure-300x234.png 300w\" sizes=\"auto, (max-width: 392px) 100vw, 392px\" \/><\/p>\n<p>Additionally, it uses the Bunifu framework for the graphic interface. (<a href=\"https:\/\/bunifuframework.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/bunifuframework.com\/<\/a>)<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-95844\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/07\/Bunifu-framework.png\" alt=\"\" width=\"945\" height=\"208\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/Bunifu-framework.png 945w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/Bunifu-framework-300x66.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/Bunifu-framework-768x169.png 768w\" sizes=\"auto, (max-width: 945px) 100vw, 945px\" \/><\/p>\n<h2>Main function<\/h2>\n<p>The main function launches the interface with the pre-configuration options. We can see here the link to putty.exe (also visible in the screenshots) for the payload that needs to be changed by the user.<\/p>\n<p>Instead of running an executable, it is also possible to run a command.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-95845\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/07\/run-a-command.png\" alt=\"\" width=\"767\" height=\"839\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/run-a-command.png 767w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/run-a-command-274x300.png 274w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/run-a-command-457x500.png 457w\" sizes=\"auto, (max-width: 767px) 100vw, 767px\" \/><\/p>\n<p>By default, the path for the stub is the following:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-95846\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/07\/stub.png\" alt=\"\" width=\"804\" height=\"54\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/stub.png 804w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/stub-300x20.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/stub-768x52.png 768w\" sizes=\"auto, (max-width: 804px) 100vw, 804px\" \/><\/p>\n<p>We can clearly see here a link with Rubella.<\/p>\n<h2>Licensing function<\/h2>\n<p>To use the program, it requires a license, that the user has to enter from the login form.<\/p>\n<p>The following function shows the login form.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-95847\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/07\/login-form.png\" alt=\"\" width=\"945\" height=\"375\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/login-form.png 945w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/login-form-300x119.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/login-form-768x305.png 768w\" sizes=\"auto, (max-width: 945px) 100vw, 945px\" \/><\/p>\n<p>To validate the license the program will perform some check and combine a Hardware ID, a username and a password.<\/p>\n<p>The following function generates the hardware id.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-95848\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/07\/hardware-id.png\" alt=\"\" width=\"945\" height=\"88\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/hardware-id.png 945w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/hardware-id-300x28.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/hardware-id-768x72.png 768w\" sizes=\"auto, (max-width: 945px) 100vw, 945px\" \/><\/p>\n<p>It gets information from <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/desktop\/cimwin32prov\/win32-processor\">\u2018Win32_Processor class\u2019<\/a> to generate the ID.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-95849\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/07\/Win32.png\" alt=\"\" width=\"884\" height=\"394\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/Win32.png 884w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/Win32-300x134.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/Win32-768x342.png 768w\" sizes=\"auto, (max-width: 884px) 100vw, 884px\" \/><\/p>\n<p>It collects information from:<\/p>\n<ul>\n<li><strong>UniqueId:<\/strong> Globally unique identifier for the processor. This identifier may only be unique within a processor family.<\/li>\n<li><strong>ProcessorId:<\/strong> Processor information that describes the processor features.<\/li>\n<li><strong>Name:<\/strong> This value comes from the Processor Version member of the Processor Information structure in the SMBIOS information.<\/li>\n<li><strong>Manufacturer:<\/strong> This value comes from the Processor Manufacturer member of the Processor Information structure.<\/li>\n<li><strong>MaxClockSpeed:<\/strong> Maximum speed of the processor, in MHz.<\/li>\n<\/ul>\n<p>Then it will collect information from the <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/desktop\/cimwin32prov\/win32-bios\" target=\"_blank\" rel=\"noopener noreferrer\">\u2018Win32_BIOS class\u2019<\/a>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-95851\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/07\/Win32-BIOS-class.png\" alt=\"\" width=\"944\" height=\"40\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/Win32-BIOS-class.png 944w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/Win32-BIOS-class-300x13.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/Win32-BIOS-class-768x33.png 768w\" sizes=\"auto, (max-width: 944px) 100vw, 944px\" \/> <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-95850\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/07\/Win32-BIOS-class-2.png\" alt=\"\" width=\"944\" height=\"38\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/Win32-BIOS-class-2.png 944w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/Win32-BIOS-class-2-300x12.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/Win32-BIOS-class-2-768x31.png 768w\" sizes=\"auto, (max-width: 944px) 100vw, 944px\" \/><\/p>\n<ul>\n<li><strong>Manufacturer: <\/strong>This value comes from the Vendor member of the BIOS Information structure.<\/li>\n<li><strong>SMBIOSVersion:<\/strong> This value comes from the BIOS Version member of the BIOS Information structure<\/li>\n<li><strong>IdentificationCode:<\/strong> Manufacturer&#8217;s identifier for this software element.<\/li>\n<li><strong>SerialNumber:<\/strong> Assigned serial number of the software element.<\/li>\n<li><strong>ReleaseDate:<\/strong> Release date of the Windows BIOS in the Coordinated Universal Time (UTC) format of YYYYMMDDHHMMSS.MMMMMM(+-)OOO.<\/li>\n<li><strong>Version:<\/strong> Version of the BIOS. This string is created by the BIOS manufacturer.<\/li>\n<\/ul>\n<p>Then it will collect information from the \u2018<a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/desktop\/cimwin32prov\/win32-diskdrive\" target=\"_blank\" rel=\"noopener noreferrer\">Win32_DiskDrive class<\/a>\u2019.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-95852\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/07\/DiskDrive-class.png\" alt=\"\" width=\"943\" height=\"48\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/DiskDrive-class.png 943w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/DiskDrive-class-300x15.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/DiskDrive-class-768x39.png 768w\" sizes=\"auto, (max-width: 943px) 100vw, 943px\" \/><\/p>\n<ul>\n<li><strong>Model:<\/strong> Manufacturer&#8217;s model number of the disk drive.<\/li>\n<li><strong>Manufacturer:<\/strong> Name of the disk drive manufacturer.<\/li>\n<li><strong>Signature:<\/strong> Disk identification. This property can be used to identify a shared resource.<\/li>\n<li><strong>TotalHead:<\/strong> Total number of heads on the disk drive.<\/li>\n<\/ul>\n<p>Then it will collect information from the \u2018<a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/desktop\/cimwin32prov\/win32-baseboard\" target=\"_blank\" rel=\"noopener noreferrer\">Win32_BaseBoard class\u2019<\/a>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-95853\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/07\/BaseBoard-class.png\" alt=\"\" width=\"944\" height=\"52\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/BaseBoard-class.png 944w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/BaseBoard-class-300x17.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/BaseBoard-class-768x42.png 768w\" sizes=\"auto, (max-width: 944px) 100vw, 944px\" \/><\/p>\n<ul>\n<li><strong>Model:<\/strong> Name by which the physical element is known.<\/li>\n<li><strong>Manufacturer:<\/strong> Name of the organization responsible for producing the physical element.<\/li>\n<li><strong>Name,<\/strong><\/li>\n<li><strong>SerialNumber<\/strong><\/li>\n<\/ul>\n<p>Then it will collect information from the \u2018<a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/desktop\/cimwin32prov\/win32-videocontroller\" target=\"_blank\" rel=\"noopener noreferrer\">Win32_VideoController class\u2019<\/a>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-95854\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/07\/VideoController-class.png\" alt=\"\" width=\"943\" height=\"79\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/VideoController-class.png 943w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/VideoController-class-300x25.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/VideoController-class-768x64.png 768w\" sizes=\"auto, (max-width: 943px) 100vw, 943px\" \/><\/p>\n<ul>\n<li><strong>DriverVersion<\/strong><\/li>\n<li><strong>Name<\/strong><\/li>\n<\/ul>\n<p>With all that hardware information collected it will generate a hash that will be the unique identifier.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-95855\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/07\/unique-identifier.png\" alt=\"\" width=\"944\" height=\"399\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/unique-identifier.png 944w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/unique-identifier-300x127.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/unique-identifier-768x325.png 768w\" sizes=\"auto, (max-width: 944px) 100vw, 944px\" \/><\/p>\n<p>This hash, the username and password will be sent to the server to verify if the license is valid. In the source code we noticed the tailoredtaboo.com domain again.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-95856\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/07\/tailoredtaboo.png\" alt=\"\" width=\"929\" height=\"393\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/tailoredtaboo.png 929w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/tailoredtaboo-300x127.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/tailoredtaboo-768x325.png 768w\" sizes=\"auto, (max-width: 929px) 100vw, 929px\" \/><\/p>\n<h2>Generate Macro<\/h2>\n<p>To generate a macro the builder is using several parts. The format function shows how each file structure is generated.<\/p>\n<p>The structure is the following:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-95857\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/07\/structure.png\" alt=\"\" width=\"735\" height=\"441\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/structure.png 735w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/structure-300x180.png 300w\" sizes=\"auto, (max-width: 735px) 100vw, 735px\" \/><\/p>\n<p>To save the macro in the malicious doc it uses the function \u2018SaveMacro\u2019:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-95858\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/07\/SaveMacro.png\" alt=\"\" width=\"875\" height=\"212\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/SaveMacro.png 875w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/SaveMacro-300x73.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/SaveMacro-768x186.png 768w\" sizes=\"auto, (max-width: 875px) 100vw, 875px\" \/><\/p>\n<h3>Evasion Techniques<\/h3>\n<p>Additionally, it generates random code to obfuscate the content and adds junk code.<\/p>\n<p>The function GenRandom is used to generate random strings, chars as well as numbers. It is used to obfuscate the macro generated.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-95859\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/07\/GenRandom.png\" alt=\"\" width=\"662\" height=\"818\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/GenRandom.png 662w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/GenRandom-243x300.png 243w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/GenRandom-405x500.png 405w\" sizes=\"auto, (max-width: 662px) 100vw, 662px\" \/><\/p>\n<p>It also uses a Junk Code function to add junk code into the document:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-95860\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/07\/Junk-Code.png\" alt=\"\" width=\"947\" height=\"508\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/Junk-Code.png 947w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/Junk-Code-300x161.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/Junk-Code-768x412.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/Junk-Code-932x500.png 932w\" sizes=\"auto, (max-width: 947px) 100vw, 947px\" \/><\/p>\n<p>For additional obfuscation it uses XOR encryption as well as Base64.<\/p>\n<h3>Write Macro<\/h3>\n<p>Finally, the function WriteMacro, writes the content previously configured:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-95861\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/07\/WriteMacro.png\" alt=\"\" width=\"743\" height=\"815\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/WriteMacro.png 743w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/WriteMacro-273x300.png 273w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/WriteMacro-456x500.png 456w\" sizes=\"auto, (max-width: 743px) 100vw, 743px\" \/><\/p>\n<p>&nbsp;<\/p>\n<h5>Under construction<\/h5>\n<p>We did also notice that the builder uses additional functions that were still under development, as we can see with the \u201cScript Generator\u201d tab.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-95862\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/07\/script-generator.png\" alt=\"\" width=\"804\" height=\"454\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/script-generator.png 804w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/script-generator-300x169.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/script-generator-768x434.png 768w\" sizes=\"auto, (max-width: 804px) 100vw, 804px\" \/><\/p>\n<p>A message is printed when we click on it and that indicates it is still a function in development.<\/p>\n<p>Additionally, we can see the \u201cDecoy Option\u201d tab which is just a template to create another tab. The tab does not show anything. It seems the author left this tab to create another one.<\/p>\n<h5>Rubella Similarities<\/h5>\n<p>Dryad is very similar to the Rubella Builder; many hints present in the code confirm the conversation we had with Rubella. Unlike Rubella, Dryad did have a scrubbed PDB path.<\/p>\n<p>Both Rubella builder and Dryad Builder are using the Bunifu framework for the graphic design.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-95863 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/07\/Dryad2.png\" alt=\"\" width=\"295\" height=\"248\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-95864\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/07\/Dryad3.png\" alt=\"\" width=\"294\" height=\"270\" \/><\/p>\n<p>The license check is also the same function, using the domain tailoredtaboo.com, Below is the license check function from the Rubella builder:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-95867\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/07\/licence-check.png\" alt=\"\" width=\"831\" height=\"337\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/licence-check.png 831w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/licence-check-300x122.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/licence-check-768x311.png 768w\" sizes=\"auto, (max-width: 831px) 100vw, 831px\" \/><\/p>\n<h2>Tailoredtaboo.com Analysis<\/h2>\n<p>We analyzed the server used to register the builder and discovered additional samples:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-95868\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/07\/Tailoredtaboo-analysis.png\" alt=\"\" width=\"944\" height=\"387\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/Tailoredtaboo-analysis.png 944w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/Tailoredtaboo-analysis-300x123.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/Tailoredtaboo-analysis-768x315.png 768w\" sizes=\"auto, (max-width: 944px) 100vw, 944px\" \/><\/p>\n<p>Most of these samples were Word documents generated with the builder.<\/p>\n<p>A quick search into the domain Tailoredtaboo showed that it had several subdomains, including a control panel on a subdomain named cpanel.tailoredtaboo.com.<\/p>\n<p>The cPanel subdomain had the following login screen in the Dutch language.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-95869\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/07\/cPanel.png\" alt=\"\" width=\"647\" height=\"394\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/cPanel.png 647w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/cPanel-300x183.png 300w\" sizes=\"auto, (max-width: 647px) 100vw, 647px\" \/><\/p>\n<p>The domain tailoredtaboo.com has been linked to malicious content in the past. On Twitter the researcher <a href=\"https:\/\/twitter.com\/nullcookies?lang=en\">@nullcookies<\/a> reported in April 2018 that he found some malicious files hosted on the specific domain. In the directory listing of the main domain there were several files also mentioning the name Rubella.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-95870 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/07\/Twitter-mention.png\" alt=\"\" width=\"391\" height=\"482\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/Twitter-mention.png 391w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/Twitter-mention-243x300.png 243w\" sizes=\"auto, (max-width: 391px) 100vw, 391px\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-95871\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/07\/index.png\" alt=\"\" width=\"664\" height=\"581\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/index.png 664w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/index-300x263.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/index-571x500.png 571w\" sizes=\"auto, (max-width: 664px) 100vw, 664px\" \/><\/p>\n<p style=\"text-align: center;\"><em>TailoredTaboo.com mentioned on Twitter<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>Based on all the references, and the way the domain Tailoredtaboo.com was used, we believe that the domain plays a central administrative role for both Rubella and Dryad Macro Builder and can provide insight into the customers of both Macro Builders<\/p>\n<h2>Conclusion<\/h2>\n<p>Toolkits that build weaponized Office documents, like Dryad and Rubella, cater to the increasing cybercriminal demand of this type of infection vector. With the arrest of the suspect comes an end to the era of Dryad and Rubella Macro Builder. Based on his activity, the suspect looked like quite the cybercriminal entrepreneur, but given his young age this is also a worrisome thought. If only he would have used his skills for good. The lure of quick cash was apparently more enticing than building a solid long-term career. We at McAfee never like to see young talented individuals heading down a dark path.<\/p>\n<h2>Indicators of Compromise<\/h2>\n<p><strong>URL \/ Website: <\/strong><\/p>\n<p>hxxps:\/\/tailoredtaboo.com\/auth\/check.php<\/p>\n<p><strong>Hash Builder:<\/strong><\/p>\n<ul>\n<li>Dryad: 7d1603f815715a062e18ae56ca53efbaecc499d4193ea44a8aef5145a4699984<\/li>\n<li>Rubella: 2a20d3d9ac4dc74e184676710a4165c359a56051c7196ca120fcf8716b7c21b9<\/li>\n<\/ul>\n<p><strong>Hash related samples:<\/strong><\/p>\n<p>93db479835802dc22ba5e55a7915bd25f1f765737d1efab72bde11e132ff165a<\/p>\n<p>ad2f9ef7142a43094161eae9b9a55bfbb6dff85d890d1823e77fc4254f29ef17<\/p>\n<p>c2c2fdcc36569f6866e19fcda702c823e7bf73d5ca394652ac3a0ccc6ff9c905<\/p>\n<p>3c55e54f726758f5cb0d8ef81be47c6612dba5a73e3a29f82b73a4c773e691a3<\/p>\n<p>74c8389f20e50ae3a9b7d7e69f6ae7ed1a625ccc8bb6a52b3cc435cf94e6e2d3<\/p>\n<p>388ee9bc0acaeec139bc17bceb19a94071aa6ae43af4ec526518b5e1f1f38f07<\/p>\n<p>08694ad23cafe45495fa790bfdc411ab5c81cc2412370633a236c688b07d26aa<\/p>\n<p>428a30b8787d2ba441dba1dbc3acbfd40cf7f2fc143131a87a93f27db96b7a75<\/p>\n<p>93db479835802dc22ba5e55a7915bd25f1f765737d1efab72bde11e132ff165a<\/p>\n<p>c777012abe224126dca004561619cb0791096611257099058ece1b8d001277d0<\/p>\n<p>5b773acad7da2f33d86286df6b5e95ae355ac50d143171a5b7ee61d6b3cad6d5<\/p>\n<p>a17e3c2271a94450a7a7c6fcd936f177fc40ea156de4deafdfc14fd5aadfe503<\/p>\n<p>1de0ebc0c375332ec60104060eecad77e0732fa2ec934f483f330110a23b46e1<\/p>\n<p>b7a86965f22ed73de180a9f98243dc5dcfb6ee30533d44365bac36124b9a1541<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Everyday thousands of people receive emails with malicious attachments in their email inbox. Disguised as a missed payment or an&#8230;<\/p>\n","protected":false},"author":1008,"featured_media":93648,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[5526],"coauthors":[5403,4688],"class_list":["post-95824","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mcafee-labs","tag-advanced-threat-research"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>McAfee ATR Aids Police in Arrest of Rubella &amp; Dryad Office Macro Builder | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Everyday thousands of people receive emails with malicious attachments in their email inbox. Disguised as a missed payment or an invoice, a cybercriminal\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"McAfee ATR Aids Police in Arrest of Rubella &amp; Dryad Office Macro Builder | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Everyday thousands of people receive emails with malicious attachments in their email inbox. Disguised as a missed payment or an invoice, a cybercriminal\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-atr-aids-police-in-arrest-of-the-rubella-and-dryad-office-macro-builder-suspect\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-07-17T04:00:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-03T02:48:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/Network-of-internet-of-things-attacked-by-a-hacker-on-one-node-3D-illustration.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2048\" \/>\n\t<meta property=\"og:image:height\" content=\"1152\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"John Fokker, Thomas Roccia\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@john_fokker\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"John Fokker, Thomas Roccia\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"13 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-atr-aids-police-in-arrest-of-the-rubella-and-dryad-office-macro-builder-suspect\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-atr-aids-police-in-arrest-of-the-rubella-and-dryad-office-macro-builder-suspect\/\"},\"author\":{\"name\":\"John Fokker\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/d4dadad7c176dd7a73390cfce3ce5e41\"},\"headline\":\"McAfee ATR Aids Police in Arrest of Rubella &#038; Dryad Office Macro Builder\",\"datePublished\":\"2019-07-17T04:00:56+00:00\",\"dateModified\":\"2025-06-03T02:48:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-atr-aids-police-in-arrest-of-the-rubella-and-dryad-office-macro-builder-suspect\/\"},\"wordCount\":2702,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-atr-aids-police-in-arrest-of-the-rubella-and-dryad-office-macro-builder-suspect\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/Network-of-internet-of-things-attacked-by-a-hacker-on-one-node-3D-illustration.jpg\",\"keywords\":[\"Advanced Threat Research\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-atr-aids-police-in-arrest-of-the-rubella-and-dryad-office-macro-builder-suspect\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-atr-aids-police-in-arrest-of-the-rubella-and-dryad-office-macro-builder-suspect\/\",\"name\":\"McAfee ATR Aids Police in Arrest of Rubella & Dryad Office Macro Builder | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-atr-aids-police-in-arrest-of-the-rubella-and-dryad-office-macro-builder-suspect\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-atr-aids-police-in-arrest-of-the-rubella-and-dryad-office-macro-builder-suspect\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/Network-of-internet-of-things-attacked-by-a-hacker-on-one-node-3D-illustration.jpg\",\"datePublished\":\"2019-07-17T04:00:56+00:00\",\"dateModified\":\"2025-06-03T02:48:34+00:00\",\"description\":\"Everyday thousands of people receive emails with malicious attachments in their email inbox. Disguised as a missed payment or an invoice, a cybercriminal\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-atr-aids-police-in-arrest-of-the-rubella-and-dryad-office-macro-builder-suspect\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-atr-aids-police-in-arrest-of-the-rubella-and-dryad-office-macro-builder-suspect\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-atr-aids-police-in-arrest-of-the-rubella-and-dryad-office-macro-builder-suspect\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/Network-of-internet-of-things-attacked-by-a-hacker-on-one-node-3D-illustration.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/Network-of-internet-of-things-attacked-by-a-hacker-on-one-node-3D-illustration.jpg\",\"width\":2048,\"height\":1152},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-atr-aids-police-in-arrest-of-the-rubella-and-dryad-office-macro-builder-suspect\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"McAfee ATR Aids Police in Arrest of Rubella &#038; Dryad Office Macro Builder\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/d4dadad7c176dd7a73390cfce3ce5e41\",\"name\":\"John Fokker\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/8205fa3ae2b891a459426ee038d61bd4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Screen-Shot-2019-01-31-at-11.50.11-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Screen-Shot-2019-01-31-at-11.50.11-96x96.png\",\"caption\":\"John Fokker\"},\"description\":\"John Fokker is a Principal Engineer and Head of Cyber Investigations for the Advanced Threat Research. Prior to joining the team, he worked at the National High Tech Crime Unit (NHTCU), the Dutch national police unit dedicated to investigating advanced forms of cybercrime. Within NHTCU he led the data science group, which focused on threat intelligence research. During his career he has supervised numerous large-scale cybercrime investigations and takedowns. Fokker is also one of the cofounders of the NoMoreRansom Project. He started his career with the Netherlands Police Agency as a digital forensics investigator within a task force against organized crime. Before joining the national police, he served in the special operations and counterterrorism group of the Royal Netherlands Marine Corps.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/john-fokker-95b614107\/\",\"https:\/\/x.com\/john_fokker\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/john-fokker\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"McAfee ATR Aids Police in Arrest of Rubella & Dryad Office Macro Builder | McAfee Blog","description":"Everyday thousands of people receive emails with malicious attachments in their email inbox. Disguised as a missed payment or an invoice, a cybercriminal","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"McAfee ATR Aids Police in Arrest of Rubella & Dryad Office Macro Builder | McAfee Blog","og_description":"Everyday thousands of people receive emails with malicious attachments in their email inbox. Disguised as a missed payment or an invoice, a cybercriminal","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-atr-aids-police-in-arrest-of-the-rubella-and-dryad-office-macro-builder-suspect\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2019-07-17T04:00:56+00:00","article_modified_time":"2025-06-03T02:48:34+00:00","og_image":[{"width":2048,"height":1152,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/Network-of-internet-of-things-attacked-by-a-hacker-on-one-node-3D-illustration.jpg","type":"image\/jpeg"}],"author":"John Fokker, Thomas Roccia","twitter_card":"summary_large_image","twitter_creator":"@john_fokker","twitter_site":"@McAfee","twitter_misc":{"Written by":"John Fokker, Thomas Roccia","Est. reading time":"13 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-atr-aids-police-in-arrest-of-the-rubella-and-dryad-office-macro-builder-suspect\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-atr-aids-police-in-arrest-of-the-rubella-and-dryad-office-macro-builder-suspect\/"},"author":{"name":"John Fokker","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/d4dadad7c176dd7a73390cfce3ce5e41"},"headline":"McAfee ATR Aids Police in Arrest of Rubella &#038; Dryad Office Macro Builder","datePublished":"2019-07-17T04:00:56+00:00","dateModified":"2025-06-03T02:48:34+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-atr-aids-police-in-arrest-of-the-rubella-and-dryad-office-macro-builder-suspect\/"},"wordCount":2702,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-atr-aids-police-in-arrest-of-the-rubella-and-dryad-office-macro-builder-suspect\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/Network-of-internet-of-things-attacked-by-a-hacker-on-one-node-3D-illustration.jpg","keywords":["Advanced Threat Research"],"articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-atr-aids-police-in-arrest-of-the-rubella-and-dryad-office-macro-builder-suspect\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-atr-aids-police-in-arrest-of-the-rubella-and-dryad-office-macro-builder-suspect\/","name":"McAfee ATR Aids Police in Arrest of Rubella & Dryad Office Macro Builder | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-atr-aids-police-in-arrest-of-the-rubella-and-dryad-office-macro-builder-suspect\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-atr-aids-police-in-arrest-of-the-rubella-and-dryad-office-macro-builder-suspect\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/Network-of-internet-of-things-attacked-by-a-hacker-on-one-node-3D-illustration.jpg","datePublished":"2019-07-17T04:00:56+00:00","dateModified":"2025-06-03T02:48:34+00:00","description":"Everyday thousands of people receive emails with malicious attachments in their email inbox. Disguised as a missed payment or an invoice, a cybercriminal","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-atr-aids-police-in-arrest-of-the-rubella-and-dryad-office-macro-builder-suspect\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-atr-aids-police-in-arrest-of-the-rubella-and-dryad-office-macro-builder-suspect\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-atr-aids-police-in-arrest-of-the-rubella-and-dryad-office-macro-builder-suspect\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/Network-of-internet-of-things-attacked-by-a-hacker-on-one-node-3D-illustration.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/Network-of-internet-of-things-attacked-by-a-hacker-on-one-node-3D-illustration.jpg","width":2048,"height":1152},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-atr-aids-police-in-arrest-of-the-rubella-and-dryad-office-macro-builder-suspect\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"McAfee ATR Aids Police in Arrest of Rubella &#038; Dryad Office Macro Builder"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/d4dadad7c176dd7a73390cfce3ce5e41","name":"John Fokker","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/8205fa3ae2b891a459426ee038d61bd4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Screen-Shot-2019-01-31-at-11.50.11-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Screen-Shot-2019-01-31-at-11.50.11-96x96.png","caption":"John Fokker"},"description":"John Fokker is a Principal Engineer and Head of Cyber Investigations for the Advanced Threat Research. Prior to joining the team, he worked at the National High Tech Crime Unit (NHTCU), the Dutch national police unit dedicated to investigating advanced forms of cybercrime. Within NHTCU he led the data science group, which focused on threat intelligence research. During his career he has supervised numerous large-scale cybercrime investigations and takedowns. Fokker is also one of the cofounders of the NoMoreRansom Project. He started his career with the Netherlands Police Agency as a digital forensics investigator within a task force against organized crime. Before joining the national police, he served in the special operations and counterterrorism group of the Royal Netherlands Marine Corps.","sameAs":["https:\/\/www.linkedin.com\/in\/john-fokker-95b614107\/","https:\/\/x.com\/john_fokker"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/john-fokker\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/95824","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/1008"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=95824"}],"version-history":[{"count":2,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/95824\/revisions"}],"predecessor-version":[{"id":214945,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/95824\/revisions\/214945"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/93648"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=95824"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=95824"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=95824"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=95824"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}