GET PDF
GET PDF Writeup
Malware Analysis Category :
Get PDF
Note about PDF :
1.Each PDF File has its header.
2.Each PDF File can have Meta Data (It can be removed as well).
3.Data is stored in Objects and Streams (Investigation Points).
Using pdfid tool to show the object in pdf
Export file on wireshark -> notice about the success transfer packer : 200., application/file_name.
pdf-parser -> analysze obj stream
cmd no know the localtion file to config tool : which commands , example : which pdf-parser
dump obj filter :
pdf-parser --raw -o 7 -f fcexploit.pdf -d obj7 do same with obj 3,9,5,10

Dump obj 8 and 6 :

Some ofuscate code in obj5 :

Beautiful code with JavaScript beautifier , Cipher cheff π

Data Processing obj10 :

Obj 7 and 9 contain shellcode after processing the code :


Config libemu to instal pylibemu lib in python :
git clone https://github.com/buffer/libemu.git
-> checking the README.md file to know how to install and build
File ShellCodeExtract :
Reference : https://github.com/forensicskween/CyberDefenders/blob/main/GetPDF/ShellCodeExtract.py
add obj 7 and 9 -> to 1 file π
cat obj7 obj9 > file.out
Running the script with this file -> check log to know the result .
Last 2 question -> checking file malware on file pcap and research have 5 CVE contain in PDF file.
Last updated