I hereby claim:
- I am psrok1 on github.
- I am psrok1 (https://keybase.io/psrok1) on keybase.
- I have a public key whose fingerprint is FBBF CC0A 2749 2E61 3563 C205 9B05 0575 6942 E53C
To claim this, I am signing this object:
""" | |
IDAPython (py2), tested on IDA 7.3. | |
malduck.idamem is pretty beta thing, but should work in most cases. | |
""" | |
import string | |
from malduck import idamem, utf16z | |
def decrypt_strings(addr): |
""" | |
Py3 version of IcedID custom steganographic loader (PNG parser & PE reconstructor) | |
Inspired by https://github.com/hasherezade/funky_malware_formats/tree/master/iced_id_parser | |
Authored by @nazywam and @psrok1. | |
pip3 install malduck lief | |
""" | |
import sys | |
import malduck |
I hereby claim:
To claim this, I am signing this object:
# pip install malduck | |
import malduck | |
import sys | |
p = malduck.procmem.from_file(sys.argv[1]) | |
# Recover magic | |
p.patchp(0, b"MZ") | |
p.patchp(p.uint32p(0x3c), b"PE") |
""" | |
Needs oledump.py in the same directory (download from https://raw.githubusercontent.com/DidierStevens/DidierStevensSuite/master/oledump.py) | |
and olefile (pip install olefile) | |
Usage: python2 emotet-doc.py [doc path] | |
""" | |
import base64 | |
import re | |
import sys |
try { | |
WmiObject = GetObject("winmgmts:{impersonationLevel=impersonate}!\\\\.\\root\\cimv2"); | |
win32ProcessList = new Enumerator(WmiObject["ExecQuery"]("Select * from Win32_Process")); | |
win32OperatingSystem = new Enumerator(Wmi["ExecQuery"]("Select * from Win32_OperatingSystem")); | |
while (!win32OperatingSystem["atEnd"]()) { | |
if (i == 5) break; | |
osInfo = osInfo + win32OperatingSystem["item"]()["Caption"] + | |
win32OperatingSystem["item"]()["Version"]; | |
i++; | |
win32OperatingSystem["moveNext"](); |
try { | |
WmiObject = GetObject("winmgmts:{impersonationLevel=impersonate}!\\\\.\\root\\cimv2"); | |
win32ProcessList = new Enumerator(WmiObject["ExecQuery"]("Select * from Win32_Process")); | |
win32OperatingSystem = new Enumerator(Wmi["ExecQuery"]("Select * from Win32_OperatingSystem")); | |
while (!win32OperatingSystem["atEnd"]()) { | |
if (i == 5) break; | |
osInfo = osInfo + win32OperatingSystem["item"]()["Caption"] + | |
win32OperatingSystem["item"]()["Version"]; | |
i++; | |
win32OperatingSystem["moveNext"](); |
"This one is global".global_func(); | |
(function(){ | |
"This one is scoped".scoped_func(); | |
function String.prototype.scoped_func(arg_a, arg_b) { | |
String.nested_func2("This one", " is nested"); | |
function String.prototype.nested_func(arg_a, arg_b) { | |
WScript.echo(this); | |
} | |
this.nested_func(); | |
while(0) |
box-js 1.8.2, sample f3b3a5fc30ecbab403b27dd853ad7f6b
Using a 10 seconds timeout, pass --timeout to specify another timeout in seconds
[info] Rewriting code...
[info] Replacing `function A.prototype.B()` (use --no-rewrite-prototype to skip)...
[error] Couldn't parse with Acorn:
[error] SyntaxError: Unexpected token (1:716)
[error]
[error] This doesn't seem to be a JavaScript/WScript file.