GET PDF

GET PDF Writeup

Malware Analysis Category :

Get PDF

Note about PDF :

1.Each PDF File has its header.

2.Each PDF File can have Meta Data (It can be removed as well).

3.Data is stored in Objects and Streams (Investigation Points).

Using pdfid tool to show the object in pdf

Export file on wireshark -> notice about the success transfer packer : 200., application/file_name.

pdf-parser -> analysze obj stream

cmd no know the localtion file to config tool : which commands , example : which pdf-parser

dump obj filter :

pdf-parser --raw -o 7 -f fcexploit.pdf -d obj7 do same with obj 3,9,5,10

Dump obj3 note the refering to some other obj

Dump obj 8 and 6 :

Some ofuscate code in obj5 :

Beautiful code with JavaScript beautifier , Cipher cheff πŸ‘

Data Processing obj10 :

Obj 7 and 9 contain shellcode after processing the code :

Config libemu to instal pylibemu lib in python :

git clone https://github.com/buffer/libemu.git

-> checking the README.md file to know how to install and build

File ShellCodeExtract :

Reference : https://github.com/forensicskween/CyberDefenders/blob/main/GetPDF/ShellCodeExtract.py

add obj 7 and 9 -> to 1 file πŸ‘

cat obj7 obj9 > file.out

Running the script with this file -> check log to know the result .

Last 2 question -> checking file malware on file pcap and research have 5 CVE contain in PDF file.

Last updated