I published the following diary on isc.sans.org: “A VBScript with Obfuscated Base64 Data“.
A few months ago, I posted a diary to explain how to search for (malicious) PE files in Base64 data. Base64 is indeed a common way to distribute binary content in an ASCII form. There are plenty of scripts based on this technique. On my Macbook, I’m using a small service created via Automator to automatically decode highlighted Base64 data and submit them to my Viper instance for further analysis… [Read more]
[The post [SANS ISC] A VBScript with Obfuscated Base64 Data has been first published on /dev/random]
from Xavier
No comments:
Post a Comment