From be1d483055898fc16720dec82e18e310cfe318dc Mon Sep 17 00:00:00 2001 From: Philippe Lagadec Date: Sat, 17 Jan 2015 23:40:26 +0100 Subject: [PATCH] olevba: removed .application from the list of executable extensions, scan reversed hex strings --- oletools/olevba.py | 12 +++++++----- 1 file changed, 7 insertions(+), 5 deletions(-) diff --git a/oletools/olevba.py b/oletools/olevba.py index 28e832c..ea1e21a 100644 --- a/oletools/olevba.py +++ b/oletools/olevba.py @@ -104,7 +104,7 @@ https://github.com/unixfreak0037/officeparser # - added option -i to analyze VBA source code directly # 2015-01-17 v0.17 PL: - removed .com from the list of executable extensions # - added scan_vba to run all detection algorithms -# - decoded hex strings are now also scanned +# - decoded hex strings are now also scanned + reversed __version__ = '0.17' @@ -114,7 +114,6 @@ __version__ = '0.17' # + setup logging (common with other oletools) # TODO later: -# + append decoded hex strings to VBA code, in order to detect IOCs and suspicious keywords # + do not show hex strings by default (add option --hex) # + performance improvement: instead of searching each keyword separately, # first split vba code into a list of words (per line), then check each @@ -251,8 +250,8 @@ RE_PATTERNS = ( ('IPv4 address', re.compile(r"\b(([0-9]|[1-9][0-9]|1[0-9]{2}|2[0-4][0-9]|25[0-5])\.){3}([0-9]|[1-9][0-9]|1[0-9]{2}|2[0-4][0-9]|25[0-5])\b")), ('E-mail address', re.compile(r'(?i)\b[A-Z0-9._%+-]+@(?:[A-Z0-9-]+\.)+(?:[A-Z]{2,12}|XN--[A-Z0-9]{4,18})\b')), # ('Domain name', re.compile(r'(?=^.{1,254}$)(^(?:(?!\d+\.|-)[a-zA-Z0-9_\-]{1,63}(?