Commit ae22ba6437ab9d41d6aa45637c848f38b00f16f7

Authored by decalage2
1 parent cd4b73d9

updated doc for v0.55

oletools/README.html
... ... @@ -23,6 +23,25 @@
23 23 <p>Note: python-oletools is not related to OLETools published by BeCubed Software.</p>
24 24 <h2 id="news">News</h2>
25 25 <ul>
  26 +<li><strong>2019-12-03 v0.55</strong>:
  27 +<ul>
  28 +<li>olevba:
  29 +<ul>
  30 +<li>added support for SLK files and XLM macro extraction from SLK</li>
  31 +<li>VBA Stomping detection</li>
  32 +<li>integrated pcodedmp to extract and disassemble P-code</li>
  33 +<li>detection of suspicious keywords and IOCs in P-code</li>
  34 +<li>new option --pcode to display P-code disassembly</li>
  35 +<li>improved detection of auto execution triggers</li>
  36 +</ul></li>
  37 +<li>rtfobj: added URL carver for CVE-2017-0199</li>
  38 +<li>better handling of unicode for systems with locale that does not support UTF-8, e.g. LANG=C (PR #365)</li>
  39 +<li>tests:
  40 +<ul>
  41 +<li>test files can now be encrypted, to avoid antivirus alerts (PR #217, issue #215)</li>
  42 +<li>tests that trigger antivirus alerts have been temporarily disabled (issue #215)</li>
  43 +</ul></li>
  44 +</ul></li>
26 45 <li><strong>2019-05-22 v0.54.2</strong>:
27 46 <ul>
28 47 <li>bugfix release: fixed several issues related to encrypted documents and XLM/XLF Excel 4 macros</li>
... ... @@ -56,14 +75,6 @@
56 75 <li>oleid now detects encrypted OpenXML files</li>
57 76 <li>fixed bugs in oleobj, rtfobj, oleid, olevba</li>
58 77 </ul></li>
59   -<li>2018-02-18 v0.52:
60   -<ul>
61   -<li>New tool <a href="https://github.com/decalage2/oletools/wiki/msodde">msodde</a> to detect and extract DDE links from MS Office files, RTF and CSV;</li>
62   -<li>Fixed bugs in olevba, rtfobj and olefile, to better handle malformed/obfuscated files;</li>
63   -<li>Performance improvements in olevba and rtfobj;</li>
64   -<li>VBA form parsing in olevba;</li>
65   -<li>Office 2007+ support in oleobj.</li>
66   -</ul></li>
67 78 </ul>
68 79 <p>See the <a href="https://github.com/decalage2/oletools/wiki/Changelog">full changelog</a> for more information.</p>
69 80 <h2 id="tools">Tools:</h2>
... ... @@ -86,7 +97,7 @@
86 97 <li><a href="https://github.com/decalage2/oletools/wiki/olemap">olemap</a>: to display a map of all the sectors in an OLE file.</li>
87 98 </ul>
88 99 <h2 id="projects-using-oletools">Projects using oletools:</h2>
89   -<p>oletools are used by a number of projects and online malware analysis services, including <a href="http://viper.li/">Viper</a>, <a href="https://remnux.org/">REMnux</a>, <a href="https://github.com/fireeye/flare-vm">FLARE-VM</a>, <a href="https://certsocietegenerale.github.io/fame/">FAME</a>, <a href="https://www.hybrid-analysis.com/">Hybrid-analysis.com</a>, <a href="https://www.document-analyzer.net/">Joe Sandbox</a>, <a href="https://sandbox.deepviz.com/">Deepviz</a>, <a href="https://github.com/lmco/laikaboss">Laika BOSS</a>, <a href="https://github.com/cuckoosandbox/cuckoo">Cuckoo Sandbox</a>, <a href="https://sandbox.anlyz.io/">Anlyz.io</a>, <a href="https://github.com/decalage2/ViperMonkey">ViperMonkey</a>, <a href="https://github.com/bontchev/pcodedmp">pcodedmp</a>, <a href="https://dridex.malwareconfig.com">dridex.malwareconfig.com</a>, <a href="https://github.com/countercept/snake">Snake</a>, <a href="https://github.com/cryps1s/DARKSURGEON">DARKSURGEON</a>, <a href="https://github.com/ctxis/CAPE">CAPE</a>, <a href="https://www.cse-cst.gc.ca/en/assemblyline">AssemblyLine</a>, <a href="https://malshare.io">malshare.io</a>, <a href="https://www.adlice.com/download/mrf/">Malware Repository Framework (MRF)</a>, <a href="https://github.com/Tigzy/malware-repo">malware-repo</a>, <a href="https://github.com/MalwareCantFly/Vba2Graph">Vba2Graph</a>, <a href="https://github.com/target/strelka">Strelka</a>, <a href="https://stoq.punchcyber.com/">stoQ</a>, <a href="https://yomi.yoroi.company">YOMI</a>, and probably <a href="https://www.virustotal.com">VirusTotal</a>. And quite a few <a href="https://github.com/search?q=oletools&amp;type=Repositories">other projects on GitHub</a>. (Please <a href="(http://decalage.info/contact)">contact me</a> if you have or know a project using oletools)</p>
  100 +<p>oletools are used by a number of projects and online malware analysis services, including <a href="https://github.com/IntegralDefense/ACE">ACE</a>, <a href="https://sandbox.anlyz.io/">Anlyz.io</a>, <a href="https://www.cse-cst.gc.ca/en/assemblyline">AssemblyLine</a>, <a href="https://github.com/ctxis/CAPE">CAPE</a>, <a href="https://github.com/cuckoosandbox/cuckoo">Cuckoo Sandbox</a>, <a href="https://github.com/cryps1s/DARKSURGEON">DARKSURGEON</a>, <a href="https://sandbox.deepviz.com/">Deepviz</a>, <a href="https://dridex.malwareconfig.com">dridex.malwareconfig.com</a>, <a href="https://certsocietegenerale.github.io/fame/">FAME</a>, <a href="https://github.com/fireeye/flare-vm">FLARE-VM</a>, <a href="https://www.hybrid-analysis.com/">Hybrid-analysis.com</a>, <a href="https://www.document-analyzer.net/">Joe Sandbox</a>, <a href="https://github.com/lmco/laikaboss">Laika BOSS</a>, <a href="https://github.com/sbidy/MacroMilter">MacroMilter</a>, <a href="https://mailcow.email/">mailcow</a>, <a href="https://malshare.io">malshare.io</a>, <a href="https://github.com/Tigzy/malware-repo">malware-repo</a>, <a href="https://www.adlice.com/download/mrf/">Malware Repository Framework (MRF)</a>, <a href="https://github.com/HeinleinSupport/olefy">olefy</a>, <a href="https://github.com/scVENUS/PeekabooAV">PeekabooAV</a>, <a href="https://github.com/bontchev/pcodedmp">pcodedmp</a>, <a href="https://github.com/CIRCL/PyCIRCLean">PyCIRCLean</a>, <a href="https://remnux.org/">REMnux</a>, <a href="https://github.com/countercept/snake">Snake</a>, <a href="https://app.sndbox.com">SNDBOX</a>, <a href="https://github.com/target/strelka">Strelka</a>, <a href="https://stoq.punchcyber.com/">stoQ</a>, <a href="https://github.com/TheHive-Project/Cortex-Analyzers">TheHive/Cortex</a>, <a href="https://tsurugi-linux.org/">TSUGURI Linux</a>, <a href="https://github.com/MalwareCantFly/Vba2Graph">Vba2Graph</a>, <a href="http://viper.li/">Viper</a>, <a href="https://github.com/decalage2/ViperMonkey">ViperMonkey</a>, <a href="https://yomi.yoroi.company">YOMI</a>, and probably <a href="https://www.virustotal.com">VirusTotal</a>. And quite a few <a href="https://github.com/search?q=oletools&amp;type=Repositories">other projects on GitHub</a>. (Please <a href="(http://decalage.info/contact)">contact me</a> if you have or know a project using oletools)</p>
90 101 <h2 id="download-and-install">Download and Install:</h2>
91 102 <p>The recommended way to download and install/update the <strong>latest stable release</strong> of oletools is to use <a href="https://pip.pypa.io/en/stable/installing/">pip</a>:</p>
92 103 <ul>
... ...
oletools/README.rst
... ... @@ -29,6 +29,27 @@ Software.
29 29 News
30 30 ----
31 31  
  32 +- **2019-12-03 v0.55**:
  33 +
  34 + - olevba:
  35 +
  36 + - added support for SLK files and XLM macro extraction from SLK
  37 + - VBA Stomping detection
  38 + - integrated pcodedmp to extract and disassemble P-code
  39 + - detection of suspicious keywords and IOCs in P-code
  40 + - new option --pcode to display P-code disassembly
  41 + - improved detection of auto execution triggers
  42 +
  43 + - rtfobj: added URL carver for CVE-2017-0199
  44 + - better handling of unicode for systems with locale that does not
  45 + support UTF-8, e.g. LANG=C (PR #365)
  46 + - tests:
  47 +
  48 + - test files can now be encrypted, to avoid antivirus alerts (PR
  49 + #217, issue #215)
  50 + - tests that trigger antivirus alerts have been temporarily
  51 + disabled (issue #215)
  52 +
32 53 - **2019-05-22 v0.54.2**:
33 54  
34 55 - bugfix release: fixed several issues related to encrypted
... ... @@ -79,17 +100,6 @@ News
79 100 - oleid now detects encrypted OpenXML files
80 101 - fixed bugs in oleobj, rtfobj, oleid, olevba
81 102  
82   -- 2018-02-18 v0.52:
83   -
84   - - New tool
85   - `msodde <https://github.com/decalage2/oletools/wiki/msodde>`__ to
86   - detect and extract DDE links from MS Office files, RTF and CSV;
87   - - Fixed bugs in olevba, rtfobj and olefile, to better handle
88   - malformed/obfuscated files;
89   - - Performance improvements in olevba and rtfobj;
90   - - VBA form parsing in olevba;
91   - - Office 2007+ support in oleobj.
92   -
93 103 See the `full
94 104 changelog <https://github.com/decalage2/oletools/wiki/Changelog>`__ for
95 105 more information.
... ... @@ -141,29 +151,38 @@ Projects using oletools:
141 151 ------------------------
142 152  
143 153 oletools are used by a number of projects and online malware analysis
144   -services, including `Viper <http://viper.li/>`__,
145   -`REMnux <https://remnux.org/>`__,
146   -`FLARE-VM <https://github.com/fireeye/flare-vm>`__,
  154 +services, including `ACE <https://github.com/IntegralDefense/ACE>`__,
  155 +`Anlyz.io <https://sandbox.anlyz.io/>`__,
  156 +`AssemblyLine <https://www.cse-cst.gc.ca/en/assemblyline>`__,
  157 +`CAPE <https://github.com/ctxis/CAPE>`__, `Cuckoo
  158 +Sandbox <https://github.com/cuckoosandbox/cuckoo>`__,
  159 +`DARKSURGEON <https://github.com/cryps1s/DARKSURGEON>`__,
  160 +`Deepviz <https://sandbox.deepviz.com/>`__,
  161 +`dridex.malwareconfig.com <https://dridex.malwareconfig.com>`__,
147 162 `FAME <https://certsocietegenerale.github.io/fame/>`__,
  163 +`FLARE-VM <https://github.com/fireeye/flare-vm>`__,
148 164 `Hybrid-analysis.com <https://www.hybrid-analysis.com/>`__, `Joe
149   -Sandbox <https://www.document-analyzer.net/>`__,
150   -`Deepviz <https://sandbox.deepviz.com/>`__, `Laika
151   -BOSS <https://github.com/lmco/laikaboss>`__, `Cuckoo
152   -Sandbox <https://github.com/cuckoosandbox/cuckoo>`__,
153   -`Anlyz.io <https://sandbox.anlyz.io/>`__,
154   -`ViperMonkey <https://github.com/decalage2/ViperMonkey>`__,
  165 +Sandbox <https://www.document-analyzer.net/>`__, `Laika
  166 +BOSS <https://github.com/lmco/laikaboss>`__,
  167 +`MacroMilter <https://github.com/sbidy/MacroMilter>`__,
  168 +`mailcow <https://mailcow.email/>`__,
  169 +`malshare.io <https://malshare.io>`__,
  170 +`malware-repo <https://github.com/Tigzy/malware-repo>`__, `Malware
  171 +Repository Framework (MRF) <https://www.adlice.com/download/mrf/>`__,
  172 +`olefy <https://github.com/HeinleinSupport/olefy>`__,
  173 +`PeekabooAV <https://github.com/scVENUS/PeekabooAV>`__,
155 174 `pcodedmp <https://github.com/bontchev/pcodedmp>`__,
156   -`dridex.malwareconfig.com <https://dridex.malwareconfig.com>`__,
  175 +`PyCIRCLean <https://github.com/CIRCL/PyCIRCLean>`__,
  176 +`REMnux <https://remnux.org/>`__,
157 177 `Snake <https://github.com/countercept/snake>`__,
158   -`DARKSURGEON <https://github.com/cryps1s/DARKSURGEON>`__,
159   -`CAPE <https://github.com/ctxis/CAPE>`__,
160   -`AssemblyLine <https://www.cse-cst.gc.ca/en/assemblyline>`__,
161   -`malshare.io <https://malshare.io>`__, `Malware Repository Framework
162   -(MRF) <https://www.adlice.com/download/mrf/>`__,
163   -`malware-repo <https://github.com/Tigzy/malware-repo>`__,
164   -`Vba2Graph <https://github.com/MalwareCantFly/Vba2Graph>`__,
  178 +`SNDBOX <https://app.sndbox.com>`__,
165 179 `Strelka <https://github.com/target/strelka>`__,
166 180 `stoQ <https://stoq.punchcyber.com/>`__,
  181 +`TheHive/Cortex <https://github.com/TheHive-Project/Cortex-Analyzers>`__,
  182 +`TSUGURI Linux <https://tsurugi-linux.org/>`__,
  183 +`Vba2Graph <https://github.com/MalwareCantFly/Vba2Graph>`__,
  184 +`Viper <http://viper.li/>`__,
  185 +`ViperMonkey <https://github.com/decalage2/ViperMonkey>`__,
167 186 `YOMI <https://yomi.yoroi.company>`__, and probably
168 187 `VirusTotal <https://www.virustotal.com>`__. And quite a few `other
169 188 projects on
... ...
oletools/doc/Home.html
... ... @@ -16,7 +16,7 @@
16 16 <![endif]-->
17 17 </head>
18 18 <body>
19   -<h1 id="python-oletools-v0.54-documentation">python-oletools v0.54 documentation</h1>
  19 +<h1 id="python-oletools-v0.55-documentation">python-oletools v0.55 documentation</h1>
20 20 <p>This is the home page of the documentation for python-oletools. The latest version can be found <a href="https://github.com/decalage2/oletools/wiki">online</a>, otherwise a copy is provided in the doc subfolder of the package.</p>
21 21 <p><a href="http://www.decalage.info/python/oletools">python-oletools</a> is a package of python tools to analyze <a href="http://en.wikipedia.org/wiki/Compound_File_Binary_Format">Microsoft OLE2 files</a> (also called Structured Storage, Compound File Binary Format or Compound Document File Format), such as Microsoft Office documents or Outlook messages, mainly for malware analysis, forensics and debugging. It is based on the <a href="http://www.decalage.info/olefile">olefile</a> parser. See <a href="http://www.decalage.info/python/oletools" class="uri">http://www.decalage.info/python/oletools</a> for more info.</p>
22 22 <p><strong>Quick links:</strong> <a href="http://www.decalage.info/python/oletools">Home page</a> - <a href="https://github.com/decalage2/oletools/wiki/Install">Download/Install</a> - <a href="https://github.com/decalage2/oletools/wiki">Documentation</a> - <a href="https://github.com/decalage2/oletools/issues">Report Issues/Suggestions/Questions</a> - <a href="http://decalage.info/contact">Contact the Author</a> - <a href="https://github.com/decalage2/oletools">Repository</a> - <a href="https://twitter.com/decalage2">Updates on Twitter</a></p>
... ...
oletools/doc/Home.md
1   -python-oletools v0.54 documentation
  1 +python-oletools v0.55 documentation
2 2 ===================================
3 3  
4 4 This is the home page of the documentation for python-oletools. The latest version can be found
... ...