Medijski sadržaj
- Tweetovi
- Tweetovi i odgovori
- Medijski sadržaj, trenutna stranica.
-
BTW this trick seems to be undetected by most antivirus engines for now (see VT):pic.twitter.com/Ya5SMja2MW
-
olevba and mraptor now detect the new "_OnConnecting" trigger used in some recent malware, thanks to
@matte_lodi#oletools https://twitter.com/joe4security/status/1221765460502421504 …pic.twitter.com/6GebSQZWkt
-
Final slides of my presentation yesterday at Black Hat Europe 2019, about malicious VBA macros and recent advances in the attack & defence sides: https://www.decalage.info/bheu2019 Featuring
#oletools/olevba, ViperMonkey, MacroRaptor, EvilClippy#BHEU#BHEU2019pic.twitter.com/iT8iqvIM8E
-
#oletools 0.55 is finally out, just in time for#BHEU! Main changes: olevba += SLK file parser and XLM macro extraction, VBA stomping detection More info: https://github.com/decalage2/oletools/releases/tag/v0.55 … How to install/update: pip install -U oletoolspic.twitter.com/zGEJqoQRUy
-
Those URLs are also detected when using oleobj from oletools:pic.twitter.com/PpbNBXoM84
Prikaži ovu nit -
2) Once decrypted, oleobj (from oletools) can find the external OLE link: oleobj "Revised invoice decrypted.xlsx"pic.twitter.com/6d0KY2PqC4
-
Quite an interesting macro: - InkeditX_GotFocus to autoexecute - Word Document Variables to store/hide payload - VirtualProtect+SetTimer to run payload from a buffer => I added SetTimer to olevba suspicious keywordspic.twitter.com/xIgy8PI11i
-
7 years of
#oletools development summarized in a strange 7 minutes video found on youtube by accident... Thanks to all the contributors who are helping me on this project! https://www.youtube.com/watch?v=561QFmv9msU … -
@bigmacjpg and@haroldogden, what are your macro settings? AFAIK here is the default:pic.twitter.com/sauxcDo88Q
-
I forgot to mention that you also need to add option -v so that msoffcrypto-tool displays results: msoffcrypto-tool --test -v <file>pic.twitter.com/4Pfr9SSzWT
Prikaži ovu nit -
From your screenshot it seems you are using quite an old version of oletools :-). The new olevba 0.55 (dev version) uses pcodedmp to detect VBA stomping and display the p-code:pic.twitter.com/GsCJz1GmyU
-
anti-EvilClippy: olevba 0.55.dev2 is now able to detect VBA Stomping, and to find suspicious keywords/IOCs in P-code! \o/ How to install the dev version: https://github.com/decalage2/oletools/wiki/Install#how-to-install-the-latest-development-version … cc
@StanHacked@VessOnSecurity@OrOneEqualsOne@bigmacjpg@haroldogdenpic.twitter.com/fCWjKNNCko
Prikaži ovu nit -
The new
#oletools 0.55.dev1 integrates with pcodedmp to display VBA P-code when using the option --pcode. The next step will be to detect VBA stomping to counter EvilClippy and adb! cc@StanHacked@VessOnSecurity@haroldogden@OrOneEqualsOne Install: https://github.com/decalage2/oletools/wiki/Install#how-to-install-the-latest-development-version …pic.twitter.com/xytDTKKWNM
-
The new
#oletools 0.54 is out! += encrypted maldocs decryption, XLM/Excel4 macros detection, colorized output, backspace detection, full python 3 support and many other improvements/bugfixes. See https://github.com/decalage2/oletools/releases/tag/v0.54 …#DFIR#malwarepic.twitter.com/2Uc6xmejwv
Prikaži ovu nit -
EvilClippy by
@StanHacked: A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro analysis tools. Runs on Linux, OSX and Windows. https://github.com/outflanknl/EvilClippy …pic.twitter.com/nhM7AL4Mxz
-
You can do the same in Firefox, using a bookmark with a keyword and a URL containing %s. For example for my malware search engine, I use the URL http:// decalage . info/mwsearch#gsc.tab=0&gsc.q=%s&gsc.sort=date (remove the blanks) - then you can type "mw" followed by a hash/keywpic.twitter.com/qchezJuHGU
-
olevba (dev version) can now detect XLM/XLF macros in xls files, both on Python 2 and 3. The result is returned like a VBA macro using VBA comments, so it should work with any app integrating olevba (no API change). https://github.com/decalage2/oletools/wiki/Install#how-to-install-the-latest-development-version …
#oletoolspic.twitter.com/zCGNsmtXkF
-
#oletools 0.54dev9: olevba can now detect XLM/XLF macros in XLS files, thanks to the integration of plugin_biff from@DidierStevens's oledump. For now it only works on Python 2, will be fixed for Python 3 soon. https://github.com/decalage2/oletools/wiki/Install#how-to-install-the-latest-development-version …pic.twitter.com/qugoomlMwp
-
-
Sample: https://app.any.run/tasks/313f544b-0aa4-4e20-ab44-8fab415279a9 … It uses an Excel 4 macro to run msiexec. Can be found with oledump -p plugin_biff --pluginoptions "-o FORMULA" and "-o BOUNDSHEET": https://blog.didierstevens.com/2018/12/19/updateoledump-py-version-0-0-40/ … cc
@DidierStevenspic.twitter.com/kpzLo59o4l
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.