A new version of oledump (small bugfix and updated plugins).
oledump_V0_0_14.zip (https)
MD5: 5ECD8BC3BD1F6C59F57E7C74DACCF017
SHA256: 7EEF509D84F7185C299A17882D3BD71481B7B1E41654F463F58492455FBDBD11

An aggregator for digital forensics blogs
A new version of oledump (small bugfix and updated plugins).
oledump_V0_0_14.zip (https)
MD5: 5ECD8BC3BD1F6C59F57E7C74DACCF017
SHA256: 7EEF509D84F7185C299A17882D3BD71481B7B1E41654F463F58492455FBDBD11
Since a day or two I’m seeing yet another trick used by malware authors in their VBA macros.
The sample I’m looking at is 26B857A0A57B89166584CBB7167CAA19.
The VBA macro downloads base64 encoded scripts from Pastebin:
The scripts are delimited by HTML-like tags like
The URL of the payload comes from another Pastebin entry:
Correct: that trojan is hosted on Dropbox.
Quickpost info
I’m teaching a PDF class at HITB Amsterdam in May. This is one of the many subjects covered in the class.
For about half a year now, I’ve been adding YARA support to several of my analysis tools. Like pdf-parser.
I’ll write some blogposts covering each tool with YARA support. I’ll start with a video for pdf-parser: