PyOLEScanner
Jump to navigation
Jump to search
Description
pyOLEScanner 1.3 is a python based script written by Giuseppe 'Evilcry' Bonfa and inspired from OfficeMalScanner. It scans Office documents to attempt to assess if they could be malicious.
Installation
$ wget https://github.com/Evilcry/PythonScripts/raw/master/pyOLEScanner.zip
Usage
Usage: python pyOLEScanner.py <document>
Examples
Example #1
$ python pyOLEScanner.py /data/tmp/Olimpikge.xls +-------------------------------+ | OLE Scanner v. 1.2 | by Giuseppe 'Evilcry' Bonfa +-------------------------------+ [-] OLE File Seems Valid [+] Hash Informations MD5: 146a5751fc3af131dc1772682fb17d87 SHA-1: 5e51188e7c9cf9a3c1dd0fd4a7b85232a5d28a5f [+] Scanning for Embedded OLE in Clean Revealed presence of Embedded OLE [+] Scanning for API presence in Clean No Embedded API Found [+] Scanning for Embedded Executables - Clean Case No Embedded Executables Found [+] Scanning for Shellcode Presence FS:[30h] Shellcode at offset:0x13406 ========================================== Warning File is Potentially INFECTED!!!! [+] Scanning for MACROs ========================================== No MACROs Revealed
Example #2
$ python pyOLEScanner.py /data/tmp/TestYourMind.ppt +-------------------------------+ | OLE Scanner v. 1.2 | by Giuseppe 'Evilcry' Bonfa +-------------------------------+ [-] OLE File Seems Valid [+] Hash Informations MD5: 5c57d0475290975533abd166faee6f02 SHA-1: 099fab479e955711309a0a6ac3ac84817ebea26b [+] Scanning for Embedded OLE in Clean No Embeddd OLE Found [+] Scanning for API presence in Clean Revealed presence of GetProcAddress at offset:0x273a Revealed presence of LoadLibraryA at offset:10060 Revealed presence of GetSystemDirectoryA at offset:0x1bdd Revealed presence of UrlDownloadToFile at offset:0x34d8 Revealed presence of UrlDownloadToFile at offset:0x37a1 ========================================== Warning File is Potentially INFECTED!!!! [+] Scanning for Embedded Executables - Clean Case ('Embedded Executable discovered at offset :', '0x1ea6', '\n') ========================================== Warning File is Potentially INFECTED!!!! [+] Scanning for Shellcode Presence FS:[00] Shellcode at offset:0x1800 FS:[30h] Shellcode at offset:0xfed Call Prolog at offset:0x90c59 NOP Slide:0x14b9 Call Pop Signature:0xf51 Call Pop Signature:0x90c53 ========================================== Warning File is Potentially INFECTED!!!! [+] Scanning for MACROs ========================================== No MACROs Revealed