Blog for hpHosts, and whatever else I feel like writing about ....

Wednesday 1 July 2009

ISC: Getting the EXE out of the RTF

Recently, when the targeted attack with malicious RTF attachments was making the rounds, I wondered how to best get the embedded EXE extracted from the RTF for further analysis. On a Windows system, you would most likely simply copy/paste the embedded object from within RTF to an Explorer window, and end up with the original file. Since I do my malware analysis on Unix, this wasn't an option. Looking at the file, it appeared as if RTF was using some sort of hexadecimal encoding:


Read more
http://isc.sans.org/diary.html?storyid=6703

No comments: