Olevba macro microsoft word malicious doc analysis tool installation steps and basic commands to execute
python -m pip install --upgrade pip
sudo -H pip install -U https://github.com/decalage2/oletools/archive/master.zip
Performing the above two tasks, the olevba tool will be installed. Now just type ole and hit tab, you should see so many ole tools there.
olevba invite.docm (here invite.docm is malicious document with macro)
olevba --decode --deobf invite.docm
olevba --decode --deobf --reveal invite.docm
if you see 'b' then it means python3 is used. Activate to python 2 to remove 'b'
source_pyenv2 (you can make a alias like this to activate python 2)
you can use ViperMonkey instead to decode macro code. Then run the decoded command in windows powershell (in commando vm). Then type Get-Variable to see the flag generally.
python ViperMonkey/vipermonkey/vmonkey.py invite.docm
Avi
Comments
Post a Comment