I can’t help feeling some kind of satisfaction when a friend uses my tools to analyze malware, and hacks his way to a solution when my tool falls short 🙂
In this nice blogpost, @bluejay00 analyzes RTF malware with my rtfdump.py tool. But because of obfuscation, rtfdump.py is not able to extract the object. @bluejay00 understands this, deobfuscates the RTF sample with an editor, and is then able to get my tool to work correctly.
I’ll just show how I would have used my translate.py tool to remove the obfuscation:
[…] at Furoner.Cat analyses a maldoc.Didier Stevens then responds by showing how he would have achieved the same result. Analysis of “new” RTF […]
Pingback by Week 27 – 2017 – This Week In 4n6 — Sunday 9 July 2017 @ 13:07
[…] I Will Follow (no, not talking about social media) […]
Pingback by Overview of Content Published In July | Didier Stevens — Tuesday 1 August 2017 @ 21:52