#olevba 검색 결과
@decalage2 i have found something funny with #olevba I use it on an html file with a script part and the result is not bad You can add to your documentation : "Can deobfuscate JS" 😁
#olevba -a sufactura_gracias.doc --json | jq -c .[].analysis[] | ag '^{"type' | ag -v 'Base64' |tr -d '#' |jq -c [.type,.keyword,.description] | ag -v null | tr -d '[]"' | awk 'BEGIN{print "digraph \"G\"{node[style=filled;fillcolor=orange;fontname=verdana];\"Suspicious....
Trasteando con #Wireshark #binwalk -e 89623_3247.php #olevba --deobf --decode AMA_3729629070291091.vbs
#tcpxtract lo fecheros extraídos y volcados && #olevba dir -1 | xargs -I% file % | ag text | cut -f1 -d' ' | sed 's/\://3'| xargs -I{} olevba -a --decode --reveal {}
Nice find! I've added this use-case to a new tool I'll be releasing soon: vba2graph. This tool accepts the output of @decalage2's awesome #olevba, and generates a call graph, with suspicious keywords highlighted. This should make the analysis of big scary macros, a bit easier. 🙂
#bas64dump && #olevba XLS. olevba -a file00067.xls --reveal | ~/tools/dsuit/base64dump.py -s3 -n10 -z -S
Graficando #olevba/#VBS/@GraphViz #olevba -a extraido.vbs --json | jq -c .[].analysis[] | ag '^{"type' | jq -c [.type,.keyword,.description] | ag -v null | tr -d '[]"' | awk 'BEGIN{print "digraph \"G\"{node[style=filled;fillcolor==orange];\"Suspicious\"[fillcolor=red];edge[...
Graficando #olevba/#VBS/@GraphViz olevba -a Hancitor.doc --json |jq -c .[].analysis[] |ag '^{"type' | ag -v 'Base64'|tr -d '#' |jq -c [.type,.keyword,.description]|ag -v null|tr -d '[]"' |awk 'BEGIN{print "digraph \"G\"{node[style=filled;fillcolor=orange;fontname=verdana];...
#sufactura_gracias / #olevba && GraphViz/Dot. Arreglando la gráfica... #olevba -a vbaProject.bin --json | ag -v XLMMacroDeobfuscator|jq -c .[].analysis[] | ag '^{"type' | ag -v 'Base64' |tr -d '#' |jq -c [.type,.keyword,.description]
Amazing techniques to circumvent static (#olevba, #pcodedmp) and dynamic (#amsi) detection of #macros embedded in #office docs by Stan Hegt and Pieter Ceelen #TR19 #troopers19 - Thanks guys for the dirty tricks! ..Wow!!
Graficando oletools/#olevba binwalk -e SHIPMENT.xlsm olevba --deobf --decode --reveal vbaProject.bin olevba -a vbaProject.bin --json |jq -c .[].analysis[] |ag '^{"type' | ag -v 'Base64' |tr -d '#' |jq -c [.type,.keyword,.description]|ag -v null | tr -d '[]"' |awk 'BEGIN{print
La macro gaditana Sub killo() #olevba y #ViperMonkey 1.- #olevba -a --decode --reveal --deobf file007Hancitor.doc 2,3.- #vmonkey -l warning --strip -e file007Hancitor.doc | colout '.*killo.*' blue | colout '.*\.exe' red
#olevba && #GraphViz/Dot. Arreglando la gráfica... #olevba -a Project.bin --json | ag -v XLMMacroDeobfuscator|jq -c .[].analysis[] | ag '^{"type' | ag -v 'Base64' |tr -d '#' |jq -c [.type,.keyword,.description]
sufactura_gracias #binwalk -e sufactura_gracias.doc #olevba --deobf --decode vbaProject.bin #floss activeX1.bin #CyberChef save file download.dat && #ssma analyzer
#olevba / #GraphViz. Graficando "Composite Document File V2 Document, Little Endian, Os: Windows Microsoft Excel" . #olevba -a 50b610.xls.bin --json |ag -v XLMMacroDeobfuscator|jq -c .[].analysis[] | ag '^{"type' | ag -v 'Base64' |tr -d '#' |jq -c [.type,.keyword,.description]
#oledump, #olevba y SU_factura .. gracias. oledump.py SU_factura.xls -s 7 -p plugin_http_heuristics.py SU_factura.xls #olevba SU_factura.xls
I made a mistake, it does contain #vba macro. I was in a hurry so when used #olevba and manually I analyzed sample with similar md5. Howerver the document variable is correct
#Zeek_IDS #Zeekurity básico. ag CE8vgo4cOz343lxbuc http.log --nonumber | jq . ag CYMLpO2OEXMzfovA54 files.log --nonumber | jq . cat extract_files/extract-1641914625.727687-HTTP-F9FELo4CUg6mKM6Akh #olevba extract_files/HTTP-FXr1VC35SXNVSRzLsa.doc
#binlex #olevba -a bin --reveal --decode #binwalk --dd='.*' bin s=$(sha256sum bin|cut -d' ' -f1) malwoverview.py -v12 -V s #binlex -m auto -p -c malware -g malware:MalwareDownloader -g malware:Hancitor -g malware:FickerStealer -i bin|jq 'select(.size >... capa -vv bin
#bas64dump && #olevba XLS. olevba -a file00067.xls --reveal | ~/tools/dsuit/base64dump.py -s3 -n10 -z -S
Con este me voy a llevar bien, que es de #Cádiz. [ El Sub #Killo ] #olevba -a ../file00067.xls --reveal -j > data.data #vmonkey.py -l warning --strip --iocs --jit -e file00067.xls
#Suricata_IDS / #olevba / #binwalk & diagram-721.doc & #GraphViz / #dot. ag '\.zip' eve.json --nonumber | jq . | less binwalk -e 14c6dd1c37fb6b6b312065273c579731d20c2e579b9fbe55968390ef46224aa7 olevba -a diagram-721.doc --deobf --decode --reveal
#sufactura_gracias / #olevba && GraphViz/Dot. Arreglando la gráfica... #olevba -a vbaProject.bin --json | ag -v XLMMacroDeobfuscator|jq -c .[].analysis[] | ag '^{"type' | ag -v 'Base64' |tr -d '#' |jq -c [.type,.keyword,.description]
Graficando oletools/#olevba binwalk -e SHIPMENT.xlsm olevba --deobf --decode --reveal vbaProject.bin olevba -a vbaProject.bin --json |jq -c .[].analysis[] |ag '^{"type' | ag -v 'Base64' |tr -d '#' |jq -c [.type,.keyword,.description]|ag -v null | tr -d '[]"' |awk 'BEGIN{print
Trasteando con #Wireshark #binwalk -e 89623_3247.php #olevba --deobf --decode AMA_3729629070291091.vbs
#olevba -a sufactura_gracias.doc --json | jq -c .[].analysis[] | ag '^{"type' | ag -v 'Base64' |tr -d '#' |jq -c [.type,.keyword,.description] | ag -v null | tr -d '[]"' | awk 'BEGIN{print "digraph \"G\"{node[style=filled;fillcolor=orange;fontname=verdana];\"Suspicious....
sufactura_gracias #binwalk -e sufactura_gracias.doc #olevba --deobf --decode vbaProject.bin #floss activeX1.bin #CyberChef save file download.dat && #ssma analyzer
#oledump, #olevba y SU_factura .. gracias. oledump.py SU_factura.xls -s 7 -p plugin_http_heuristics.py SU_factura.xls #olevba SU_factura.xls
Graficando #olevba/#VBS/@GraphViz olevba -a Hancitor.doc --json |jq -c .[].analysis[] |ag '^{"type' | ag -v 'Base64'|tr -d '#' |jq -c [.type,.keyword,.description]|ag -v null|tr -d '[]"' |awk 'BEGIN{print "digraph \"G\"{node[style=filled;fillcolor=orange;fontname=verdana];...
Graficando #olevba/#VBS/@GraphViz #olevba -a extraido.vbs --json | jq -c .[].analysis[] | ag '^{"type' | jq -c [.type,.keyword,.description] | ag -v null | tr -d '[]"' | awk 'BEGIN{print "digraph \"G\"{node[style=filled;fillcolor==orange];\"Suspicious\"[fillcolor=red];edge[...
Well, this might be useless, but i wrote a tool to decompile VBA pcode based on @VessOnSecurity 's pcodedmp. Might check if it should be included in #olevba. -> github.com/Big5-sec/pcode…
github.com
GitHub - Big5-sec/pcode2code: a vba pcode decompiler based on pcodedmp
a vba pcode decompiler based on pcodedmp. Contribute to Big5-sec/pcode2code development by creating an account on GitHub.
#Emotet, an Analysis of TTP’s: Part II For the Watch. Con #Olevba, #Cyberchef, #Sigma rule && #Wazuh.
#tcpxtract lo fecheros extraídos y volcados && #olevba dir -1 | xargs -I% file % | ag text | cut -f1 -d' ' | sed 's/\://3'| xargs -I{} olevba -a --decode --reveal {}
La macro gaditana Sub killo() #olevba y #ViperMonkey 1.- #olevba -a --decode --reveal --deobf file007Hancitor.doc 2,3.- #vmonkey -l warning --strip -e file007Hancitor.doc | colout '.*killo.*' blue | colout '.*\.exe' red
@decalage2 i have found something funny with #olevba I use it on an html file with a script part and the result is not bad You can add to your documentation : "Can deobfuscate JS" 😁
Nice find! I've added this use-case to a new tool I'll be releasing soon: vba2graph. This tool accepts the output of @decalage2's awesome #olevba, and generates a call graph, with suspicious keywords highlighted. This should make the analysis of big scary macros, a bit easier. 🙂
Trasteando con #Wireshark #binwalk -e 89623_3247.php #olevba --deobf --decode AMA_3729629070291091.vbs
Graficando #olevba/#VBS/@GraphViz #olevba -a extraido.vbs --json | jq -c .[].analysis[] | ag '^{"type' | jq -c [.type,.keyword,.description] | ag -v null | tr -d '[]"' | awk 'BEGIN{print "digraph \"G\"{node[style=filled;fillcolor==orange];\"Suspicious\"[fillcolor=red];edge[...
#bas64dump && #olevba XLS. olevba -a file00067.xls --reveal | ~/tools/dsuit/base64dump.py -s3 -n10 -z -S
#tcpxtract lo fecheros extraídos y volcados && #olevba dir -1 | xargs -I% file % | ag text | cut -f1 -d' ' | sed 's/\://3'| xargs -I{} olevba -a --decode --reveal {}
#olevba -a sufactura_gracias.doc --json | jq -c .[].analysis[] | ag '^{"type' | ag -v 'Base64' |tr -d '#' |jq -c [.type,.keyword,.description] | ag -v null | tr -d '[]"' | awk 'BEGIN{print "digraph \"G\"{node[style=filled;fillcolor=orange;fontname=verdana];\"Suspicious....
Graficando #olevba/#VBS/@GraphViz olevba -a Hancitor.doc --json |jq -c .[].analysis[] |ag '^{"type' | ag -v 'Base64'|tr -d '#' |jq -c [.type,.keyword,.description]|ag -v null|tr -d '[]"' |awk 'BEGIN{print "digraph \"G\"{node[style=filled;fillcolor=orange;fontname=verdana];...
Amazing techniques to circumvent static (#olevba, #pcodedmp) and dynamic (#amsi) detection of #macros embedded in #office docs by Stan Hegt and Pieter Ceelen #TR19 #troopers19 - Thanks guys for the dirty tricks! ..Wow!!
#sufactura_gracias / #olevba && GraphViz/Dot. Arreglando la gráfica... #olevba -a vbaProject.bin --json | ag -v XLMMacroDeobfuscator|jq -c .[].analysis[] | ag '^{"type' | ag -v 'Base64' |tr -d '#' |jq -c [.type,.keyword,.description]
La macro gaditana Sub killo() #olevba y #ViperMonkey 1.- #olevba -a --decode --reveal --deobf file007Hancitor.doc 2,3.- #vmonkey -l warning --strip -e file007Hancitor.doc | colout '.*killo.*' blue | colout '.*\.exe' red
Graficando oletools/#olevba binwalk -e SHIPMENT.xlsm olevba --deobf --decode --reveal vbaProject.bin olevba -a vbaProject.bin --json |jq -c .[].analysis[] |ag '^{"type' | ag -v 'Base64' |tr -d '#' |jq -c [.type,.keyword,.description]|ag -v null | tr -d '[]"' |awk 'BEGIN{print
sufactura_gracias #binwalk -e sufactura_gracias.doc #olevba --deobf --decode vbaProject.bin #floss activeX1.bin #CyberChef save file download.dat && #ssma analyzer
I made a mistake, it does contain #vba macro. I was in a hurry so when used #olevba and manually I analyzed sample with similar md5. Howerver the document variable is correct
#olevba && #GraphViz/Dot. Arreglando la gráfica... #olevba -a Project.bin --json | ag -v XLMMacroDeobfuscator|jq -c .[].analysis[] | ag '^{"type' | ag -v 'Base64' |tr -d '#' |jq -c [.type,.keyword,.description]
#binlex #olevba -a bin --reveal --decode #binwalk --dd='.*' bin s=$(sha256sum bin|cut -d' ' -f1) malwoverview.py -v12 -V s #binlex -m auto -p -c malware -g malware:MalwareDownloader -g malware:Hancitor -g malware:FickerStealer -i bin|jq 'select(.size >... capa -vv bin
#olevba / #GraphViz. Graficando "Composite Document File V2 Document, Little Endian, Os: Windows Microsoft Excel" . #olevba -a 50b610.xls.bin --json |ag -v XLMMacroDeobfuscator|jq -c .[].analysis[] | ag '^{"type' | ag -v 'Base64' |tr -d '#' |jq -c [.type,.keyword,.description]
07d64fdebb3250f8916dbdc99902bcbb (Sample_5ac66385900f99357ba1b1f2) I cannot see how it is executed as there is no #vba macro (I checked manually and with #olevba). But I was able to decode the #embedded document variable -> hxxp://arshexports.com/Henox.exe. Same server
#oledump, #olevba y SU_factura .. gracias. oledump.py SU_factura.xls -s 7 -p plugin_http_heuristics.py SU_factura.xls #olevba SU_factura.xls
#Zeek_IDS #Zeekurity básico. ag CE8vgo4cOz343lxbuc http.log --nonumber | jq . ag CYMLpO2OEXMzfovA54 files.log --nonumber | jq . cat extract_files/extract-1641914625.727687-HTTP-F9FELo4CUg6mKM6Akh #olevba extract_files/HTTP-FXr1VC35SXNVSRzLsa.doc
Something went wrong.
Something went wrong.
United States Trends
- 1. Luka 90.4K posts
- 2. Dodgers 121K posts
- 3. Blue Jays 79.3K posts
- 4. #WorldSeries 102K posts
- 5. #LakeShow 3,218 posts
- 6. Mavs 12.9K posts
- 7. Snell 14.2K posts
- 8. Marcus Smart 3,310 posts
- 9. #TheLastDriveIn 4,122 posts
- 10. #SmackDown 33.3K posts
- 11. Kyshawn George 3,975 posts
- 12. Vando 2,504 posts
- 13. Addison Barger 17.2K posts
- 14. Halo 159K posts
- 15. #BostonBlue 5,453 posts
- 16. Nico Harrison 2,339 posts
- 17. Blazers 10.8K posts
- 18. Reaves 8,639 posts
- 19. Wizards 10.2K posts
- 20. Wolves 23.1K posts