There are Office maldocs out there with some complex payload decoding algorithms. Sometimes I don’t have the time to convert the decoding routines to Python, and then I will use the VBA interpreter in Excel. But I have to be careful not to execute the payload, just decode it. In the following video, I show how I do this.
Tools: oledump.py, decoder.xls
Sample: 2f918f49c3f926bb1538eaad6e8e6883
[…] Analyzing Office Maldocs With Decoder.xls […]
Pingback by Overview of Content Published In October | Didier Stevens — Monday 14 November 2016 @ 0:01