Commit ae22ba6437ab9d41d6aa45637c848f38b00f16f7

Authored by decalage2
1 parent cd4b73d9

updated doc for v0.55

oletools/README.html
@@ -23,6 +23,25 @@ @@ -23,6 +23,25 @@
23 <p>Note: python-oletools is not related to OLETools published by BeCubed Software.</p> 23 <p>Note: python-oletools is not related to OLETools published by BeCubed Software.</p>
24 <h2 id="news">News</h2> 24 <h2 id="news">News</h2>
25 <ul> 25 <ul>
  26 +<li><strong>2019-12-03 v0.55</strong>:
  27 +<ul>
  28 +<li>olevba:
  29 +<ul>
  30 +<li>added support for SLK files and XLM macro extraction from SLK</li>
  31 +<li>VBA Stomping detection</li>
  32 +<li>integrated pcodedmp to extract and disassemble P-code</li>
  33 +<li>detection of suspicious keywords and IOCs in P-code</li>
  34 +<li>new option --pcode to display P-code disassembly</li>
  35 +<li>improved detection of auto execution triggers</li>
  36 +</ul></li>
  37 +<li>rtfobj: added URL carver for CVE-2017-0199</li>
  38 +<li>better handling of unicode for systems with locale that does not support UTF-8, e.g. LANG=C (PR #365)</li>
  39 +<li>tests:
  40 +<ul>
  41 +<li>test files can now be encrypted, to avoid antivirus alerts (PR #217, issue #215)</li>
  42 +<li>tests that trigger antivirus alerts have been temporarily disabled (issue #215)</li>
  43 +</ul></li>
  44 +</ul></li>
26 <li><strong>2019-05-22 v0.54.2</strong>: 45 <li><strong>2019-05-22 v0.54.2</strong>:
27 <ul> 46 <ul>
28 <li>bugfix release: fixed several issues related to encrypted documents and XLM/XLF Excel 4 macros</li> 47 <li>bugfix release: fixed several issues related to encrypted documents and XLM/XLF Excel 4 macros</li>
@@ -56,14 +75,6 @@ @@ -56,14 +75,6 @@
56 <li>oleid now detects encrypted OpenXML files</li> 75 <li>oleid now detects encrypted OpenXML files</li>
57 <li>fixed bugs in oleobj, rtfobj, oleid, olevba</li> 76 <li>fixed bugs in oleobj, rtfobj, oleid, olevba</li>
58 </ul></li> 77 </ul></li>
59 -<li>2018-02-18 v0.52:  
60 -<ul>  
61 -<li>New tool <a href="https://github.com/decalage2/oletools/wiki/msodde">msodde</a> to detect and extract DDE links from MS Office files, RTF and CSV;</li>  
62 -<li>Fixed bugs in olevba, rtfobj and olefile, to better handle malformed/obfuscated files;</li>  
63 -<li>Performance improvements in olevba and rtfobj;</li>  
64 -<li>VBA form parsing in olevba;</li>  
65 -<li>Office 2007+ support in oleobj.</li>  
66 -</ul></li>  
67 </ul> 78 </ul>
68 <p>See the <a href="https://github.com/decalage2/oletools/wiki/Changelog">full changelog</a> for more information.</p> 79 <p>See the <a href="https://github.com/decalage2/oletools/wiki/Changelog">full changelog</a> for more information.</p>
69 <h2 id="tools">Tools:</h2> 80 <h2 id="tools">Tools:</h2>
@@ -86,7 +97,7 @@ @@ -86,7 +97,7 @@
86 <li><a href="https://github.com/decalage2/oletools/wiki/olemap">olemap</a>: to display a map of all the sectors in an OLE file.</li> 97 <li><a href="https://github.com/decalage2/oletools/wiki/olemap">olemap</a>: to display a map of all the sectors in an OLE file.</li>
87 </ul> 98 </ul>
88 <h2 id="projects-using-oletools">Projects using oletools:</h2> 99 <h2 id="projects-using-oletools">Projects using oletools:</h2>
89 -<p>oletools are used by a number of projects and online malware analysis services, including <a href="http://viper.li/">Viper</a>, <a href="https://remnux.org/">REMnux</a>, <a href="https://github.com/fireeye/flare-vm">FLARE-VM</a>, <a href="https://certsocietegenerale.github.io/fame/">FAME</a>, <a href="https://www.hybrid-analysis.com/">Hybrid-analysis.com</a>, <a href="https://www.document-analyzer.net/">Joe Sandbox</a>, <a href="https://sandbox.deepviz.com/">Deepviz</a>, <a href="https://github.com/lmco/laikaboss">Laika BOSS</a>, <a href="https://github.com/cuckoosandbox/cuckoo">Cuckoo Sandbox</a>, <a href="https://sandbox.anlyz.io/">Anlyz.io</a>, <a href="https://github.com/decalage2/ViperMonkey">ViperMonkey</a>, <a href="https://github.com/bontchev/pcodedmp">pcodedmp</a>, <a href="https://dridex.malwareconfig.com">dridex.malwareconfig.com</a>, <a href="https://github.com/countercept/snake">Snake</a>, <a href="https://github.com/cryps1s/DARKSURGEON">DARKSURGEON</a>, <a href="https://github.com/ctxis/CAPE">CAPE</a>, <a href="https://www.cse-cst.gc.ca/en/assemblyline">AssemblyLine</a>, <a href="https://malshare.io">malshare.io</a>, <a href="https://www.adlice.com/download/mrf/">Malware Repository Framework (MRF)</a>, <a href="https://github.com/Tigzy/malware-repo">malware-repo</a>, <a href="https://github.com/MalwareCantFly/Vba2Graph">Vba2Graph</a>, <a href="https://github.com/target/strelka">Strelka</a>, <a href="https://stoq.punchcyber.com/">stoQ</a>, <a href="https://yomi.yoroi.company">YOMI</a>, and probably <a href="https://www.virustotal.com">VirusTotal</a>. And quite a few <a href="https://github.com/search?q=oletools&amp;type=Repositories">other projects on GitHub</a>. (Please <a href="(http://decalage.info/contact)">contact me</a> if you have or know a project using oletools)</p> 100 +<p>oletools are used by a number of projects and online malware analysis services, including <a href="https://github.com/IntegralDefense/ACE">ACE</a>, <a href="https://sandbox.anlyz.io/">Anlyz.io</a>, <a href="https://www.cse-cst.gc.ca/en/assemblyline">AssemblyLine</a>, <a href="https://github.com/ctxis/CAPE">CAPE</a>, <a href="https://github.com/cuckoosandbox/cuckoo">Cuckoo Sandbox</a>, <a href="https://github.com/cryps1s/DARKSURGEON">DARKSURGEON</a>, <a href="https://sandbox.deepviz.com/">Deepviz</a>, <a href="https://dridex.malwareconfig.com">dridex.malwareconfig.com</a>, <a href="https://certsocietegenerale.github.io/fame/">FAME</a>, <a href="https://github.com/fireeye/flare-vm">FLARE-VM</a>, <a href="https://www.hybrid-analysis.com/">Hybrid-analysis.com</a>, <a href="https://www.document-analyzer.net/">Joe Sandbox</a>, <a href="https://github.com/lmco/laikaboss">Laika BOSS</a>, <a href="https://github.com/sbidy/MacroMilter">MacroMilter</a>, <a href="https://mailcow.email/">mailcow</a>, <a href="https://malshare.io">malshare.io</a>, <a href="https://github.com/Tigzy/malware-repo">malware-repo</a>, <a href="https://www.adlice.com/download/mrf/">Malware Repository Framework (MRF)</a>, <a href="https://github.com/HeinleinSupport/olefy">olefy</a>, <a href="https://github.com/scVENUS/PeekabooAV">PeekabooAV</a>, <a href="https://github.com/bontchev/pcodedmp">pcodedmp</a>, <a href="https://github.com/CIRCL/PyCIRCLean">PyCIRCLean</a>, <a href="https://remnux.org/">REMnux</a>, <a href="https://github.com/countercept/snake">Snake</a>, <a href="https://app.sndbox.com">SNDBOX</a>, <a href="https://github.com/target/strelka">Strelka</a>, <a href="https://stoq.punchcyber.com/">stoQ</a>, <a href="https://github.com/TheHive-Project/Cortex-Analyzers">TheHive/Cortex</a>, <a href="https://tsurugi-linux.org/">TSUGURI Linux</a>, <a href="https://github.com/MalwareCantFly/Vba2Graph">Vba2Graph</a>, <a href="http://viper.li/">Viper</a>, <a href="https://github.com/decalage2/ViperMonkey">ViperMonkey</a>, <a href="https://yomi.yoroi.company">YOMI</a>, and probably <a href="https://www.virustotal.com">VirusTotal</a>. And quite a few <a href="https://github.com/search?q=oletools&amp;type=Repositories">other projects on GitHub</a>. (Please <a href="(http://decalage.info/contact)">contact me</a> if you have or know a project using oletools)</p>
90 <h2 id="download-and-install">Download and Install:</h2> 101 <h2 id="download-and-install">Download and Install:</h2>
91 <p>The recommended way to download and install/update the <strong>latest stable release</strong> of oletools is to use <a href="https://pip.pypa.io/en/stable/installing/">pip</a>:</p> 102 <p>The recommended way to download and install/update the <strong>latest stable release</strong> of oletools is to use <a href="https://pip.pypa.io/en/stable/installing/">pip</a>:</p>
92 <ul> 103 <ul>
oletools/README.rst
@@ -29,6 +29,27 @@ Software. @@ -29,6 +29,27 @@ Software.
29 News 29 News
30 ---- 30 ----
31 31
  32 +- **2019-12-03 v0.55**:
  33 +
  34 + - olevba:
  35 +
  36 + - added support for SLK files and XLM macro extraction from SLK
  37 + - VBA Stomping detection
  38 + - integrated pcodedmp to extract and disassemble P-code
  39 + - detection of suspicious keywords and IOCs in P-code
  40 + - new option --pcode to display P-code disassembly
  41 + - improved detection of auto execution triggers
  42 +
  43 + - rtfobj: added URL carver for CVE-2017-0199
  44 + - better handling of unicode for systems with locale that does not
  45 + support UTF-8, e.g. LANG=C (PR #365)
  46 + - tests:
  47 +
  48 + - test files can now be encrypted, to avoid antivirus alerts (PR
  49 + #217, issue #215)
  50 + - tests that trigger antivirus alerts have been temporarily
  51 + disabled (issue #215)
  52 +
32 - **2019-05-22 v0.54.2**: 53 - **2019-05-22 v0.54.2**:
33 54
34 - bugfix release: fixed several issues related to encrypted 55 - bugfix release: fixed several issues related to encrypted
@@ -79,17 +100,6 @@ News @@ -79,17 +100,6 @@ News
79 - oleid now detects encrypted OpenXML files 100 - oleid now detects encrypted OpenXML files
80 - fixed bugs in oleobj, rtfobj, oleid, olevba 101 - fixed bugs in oleobj, rtfobj, oleid, olevba
81 102
82 -- 2018-02-18 v0.52:  
83 -  
84 - - New tool  
85 - `msodde <https://github.com/decalage2/oletools/wiki/msodde>`__ to  
86 - detect and extract DDE links from MS Office files, RTF and CSV;  
87 - - Fixed bugs in olevba, rtfobj and olefile, to better handle  
88 - malformed/obfuscated files;  
89 - - Performance improvements in olevba and rtfobj;  
90 - - VBA form parsing in olevba;  
91 - - Office 2007+ support in oleobj.  
92 -  
93 See the `full 103 See the `full
94 changelog <https://github.com/decalage2/oletools/wiki/Changelog>`__ for 104 changelog <https://github.com/decalage2/oletools/wiki/Changelog>`__ for
95 more information. 105 more information.
@@ -141,29 +151,38 @@ Projects using oletools: @@ -141,29 +151,38 @@ Projects using oletools:
141 ------------------------ 151 ------------------------
142 152
143 oletools are used by a number of projects and online malware analysis 153 oletools are used by a number of projects and online malware analysis
144 -services, including `Viper <http://viper.li/>`__,  
145 -`REMnux <https://remnux.org/>`__,  
146 -`FLARE-VM <https://github.com/fireeye/flare-vm>`__, 154 +services, including `ACE <https://github.com/IntegralDefense/ACE>`__,
  155 +`Anlyz.io <https://sandbox.anlyz.io/>`__,
  156 +`AssemblyLine <https://www.cse-cst.gc.ca/en/assemblyline>`__,
  157 +`CAPE <https://github.com/ctxis/CAPE>`__, `Cuckoo
  158 +Sandbox <https://github.com/cuckoosandbox/cuckoo>`__,
  159 +`DARKSURGEON <https://github.com/cryps1s/DARKSURGEON>`__,
  160 +`Deepviz <https://sandbox.deepviz.com/>`__,
  161 +`dridex.malwareconfig.com <https://dridex.malwareconfig.com>`__,
147 `FAME <https://certsocietegenerale.github.io/fame/>`__, 162 `FAME <https://certsocietegenerale.github.io/fame/>`__,
  163 +`FLARE-VM <https://github.com/fireeye/flare-vm>`__,
148 `Hybrid-analysis.com <https://www.hybrid-analysis.com/>`__, `Joe 164 `Hybrid-analysis.com <https://www.hybrid-analysis.com/>`__, `Joe
149 -Sandbox <https://www.document-analyzer.net/>`__,  
150 -`Deepviz <https://sandbox.deepviz.com/>`__, `Laika  
151 -BOSS <https://github.com/lmco/laikaboss>`__, `Cuckoo  
152 -Sandbox <https://github.com/cuckoosandbox/cuckoo>`__,  
153 -`Anlyz.io <https://sandbox.anlyz.io/>`__,  
154 -`ViperMonkey <https://github.com/decalage2/ViperMonkey>`__, 165 +Sandbox <https://www.document-analyzer.net/>`__, `Laika
  166 +BOSS <https://github.com/lmco/laikaboss>`__,
  167 +`MacroMilter <https://github.com/sbidy/MacroMilter>`__,
  168 +`mailcow <https://mailcow.email/>`__,
  169 +`malshare.io <https://malshare.io>`__,
  170 +`malware-repo <https://github.com/Tigzy/malware-repo>`__, `Malware
  171 +Repository Framework (MRF) <https://www.adlice.com/download/mrf/>`__,
  172 +`olefy <https://github.com/HeinleinSupport/olefy>`__,
  173 +`PeekabooAV <https://github.com/scVENUS/PeekabooAV>`__,
155 `pcodedmp <https://github.com/bontchev/pcodedmp>`__, 174 `pcodedmp <https://github.com/bontchev/pcodedmp>`__,
156 -`dridex.malwareconfig.com <https://dridex.malwareconfig.com>`__, 175 +`PyCIRCLean <https://github.com/CIRCL/PyCIRCLean>`__,
  176 +`REMnux <https://remnux.org/>`__,
157 `Snake <https://github.com/countercept/snake>`__, 177 `Snake <https://github.com/countercept/snake>`__,
158 -`DARKSURGEON <https://github.com/cryps1s/DARKSURGEON>`__,  
159 -`CAPE <https://github.com/ctxis/CAPE>`__,  
160 -`AssemblyLine <https://www.cse-cst.gc.ca/en/assemblyline>`__,  
161 -`malshare.io <https://malshare.io>`__, `Malware Repository Framework  
162 -(MRF) <https://www.adlice.com/download/mrf/>`__,  
163 -`malware-repo <https://github.com/Tigzy/malware-repo>`__,  
164 -`Vba2Graph <https://github.com/MalwareCantFly/Vba2Graph>`__, 178 +`SNDBOX <https://app.sndbox.com>`__,
165 `Strelka <https://github.com/target/strelka>`__, 179 `Strelka <https://github.com/target/strelka>`__,
166 `stoQ <https://stoq.punchcyber.com/>`__, 180 `stoQ <https://stoq.punchcyber.com/>`__,
  181 +`TheHive/Cortex <https://github.com/TheHive-Project/Cortex-Analyzers>`__,
  182 +`TSUGURI Linux <https://tsurugi-linux.org/>`__,
  183 +`Vba2Graph <https://github.com/MalwareCantFly/Vba2Graph>`__,
  184 +`Viper <http://viper.li/>`__,
  185 +`ViperMonkey <https://github.com/decalage2/ViperMonkey>`__,
167 `YOMI <https://yomi.yoroi.company>`__, and probably 186 `YOMI <https://yomi.yoroi.company>`__, and probably
168 `VirusTotal <https://www.virustotal.com>`__. And quite a few `other 187 `VirusTotal <https://www.virustotal.com>`__. And quite a few `other
169 projects on 188 projects on
oletools/doc/Home.html
@@ -16,7 +16,7 @@ @@ -16,7 +16,7 @@
16 <![endif]--> 16 <![endif]-->
17 </head> 17 </head>
18 <body> 18 <body>
19 -<h1 id="python-oletools-v0.54-documentation">python-oletools v0.54 documentation</h1> 19 +<h1 id="python-oletools-v0.55-documentation">python-oletools v0.55 documentation</h1>
20 <p>This is the home page of the documentation for python-oletools. The latest version can be found <a href="https://github.com/decalage2/oletools/wiki">online</a>, otherwise a copy is provided in the doc subfolder of the package.</p> 20 <p>This is the home page of the documentation for python-oletools. The latest version can be found <a href="https://github.com/decalage2/oletools/wiki">online</a>, otherwise a copy is provided in the doc subfolder of the package.</p>
21 <p><a href="http://www.decalage.info/python/oletools">python-oletools</a> is a package of python tools to analyze <a href="http://en.wikipedia.org/wiki/Compound_File_Binary_Format">Microsoft OLE2 files</a> (also called Structured Storage, Compound File Binary Format or Compound Document File Format), such as Microsoft Office documents or Outlook messages, mainly for malware analysis, forensics and debugging. It is based on the <a href="http://www.decalage.info/olefile">olefile</a> parser. See <a href="http://www.decalage.info/python/oletools" class="uri">http://www.decalage.info/python/oletools</a> for more info.</p> 21 <p><a href="http://www.decalage.info/python/oletools">python-oletools</a> is a package of python tools to analyze <a href="http://en.wikipedia.org/wiki/Compound_File_Binary_Format">Microsoft OLE2 files</a> (also called Structured Storage, Compound File Binary Format or Compound Document File Format), such as Microsoft Office documents or Outlook messages, mainly for malware analysis, forensics and debugging. It is based on the <a href="http://www.decalage.info/olefile">olefile</a> parser. See <a href="http://www.decalage.info/python/oletools" class="uri">http://www.decalage.info/python/oletools</a> for more info.</p>
22 <p><strong>Quick links:</strong> <a href="http://www.decalage.info/python/oletools">Home page</a> - <a href="https://github.com/decalage2/oletools/wiki/Install">Download/Install</a> - <a href="https://github.com/decalage2/oletools/wiki">Documentation</a> - <a href="https://github.com/decalage2/oletools/issues">Report Issues/Suggestions/Questions</a> - <a href="http://decalage.info/contact">Contact the Author</a> - <a href="https://github.com/decalage2/oletools">Repository</a> - <a href="https://twitter.com/decalage2">Updates on Twitter</a></p> 22 <p><strong>Quick links:</strong> <a href="http://www.decalage.info/python/oletools">Home page</a> - <a href="https://github.com/decalage2/oletools/wiki/Install">Download/Install</a> - <a href="https://github.com/decalage2/oletools/wiki">Documentation</a> - <a href="https://github.com/decalage2/oletools/issues">Report Issues/Suggestions/Questions</a> - <a href="http://decalage.info/contact">Contact the Author</a> - <a href="https://github.com/decalage2/oletools">Repository</a> - <a href="https://twitter.com/decalage2">Updates on Twitter</a></p>
oletools/doc/Home.md
1 -python-oletools v0.54 documentation 1 +python-oletools v0.55 documentation
2 =================================== 2 ===================================
3 3
4 This is the home page of the documentation for python-oletools. The latest version can be found 4 This is the home page of the documentation for python-oletools. The latest version can be found