Malware
Last updated
Last updated
OLE2 is the format for Microsoft Office files. Use oletools to find macros and other things inside OLE files:
For detecting/reversing malware try these online sandboxes:
For hiding your executable from AV, shellter is better than msfvenom. Also you can use Veil along with iexpress.exe
You can use PS2EXE to convert a powershell script to an executable - makes it easy to download a payload from the internet and execute it.
Meta-twin is a tool that copies the metadata (including the signature, though it will no longer be valid) from an application to your payload. For example, before using this tool, 95% of antiviruses detected the PS2EXE executable as malware. After using this tool, the number dropped significantly (for example windows defender couldnt detect anymore)
Invoke-obfuscation is a powershell command obfuscator.
To have persistence on a machine, you could use WMI-persistence from github. It uses WMI events for fileless persistence
June 2018 - getting a victim to download and execute a Windows Settings Shortcut file leads to RCE. This can be placed in an Office file, as it’s new and thus not in the blacklist (it is, however, blocked from Microsoft office365 since 11. July 2018).