Home Webinars Decoding Malicious .vbs Scripts

Decoding Malicious .vbs Scripts

5
0
3,191

Guys from Open Analysis have published a video of walking through manually decoding a malicious vbs script that was submitted to them by a viewer. These scripts were being delivered via phishing campaigns and were bundled within encrypted word (docx) documents.

Tools used:

oletools – github.com/decalage2/oletools
oledump – blog.didierstevens.com/2017/03/07/update-oledump-py-version-0-0-27/
psparser – github.com/phishme/malware_analysis/blob/master/scripts/psparser.py
VBCode indenter – vbindent.com/
Windows RE & Internals Lookup – cse.google.com/cse/publicurl?cx=007295992698080651277:dwdifwshwp0
malware-jail – github.com/HynekPetrak/malware-jail

Load More Related Articles
Load More In Webinars

5 Comments

  1. 2accords

    December 30, 2021 at 10:01 pm

    2strawberry

  2. 2carnival

    January 13, 2022 at 12:27 am

    1attachments

  3. free gay web cam chat rooms

    January 14, 2022 at 11:28 am

  4. gay dating cites

    January 14, 2022 at 1:39 pm

    gay male 65 dating https://gaypridee.com/

  5. chat muscle gay

    January 14, 2022 at 7:01 pm

    gay chat roullette https://gaytgpost.com/