![State of the Hack artwork](https://is3-ssl.mzstatic.com/image/thumb/Podcasts113/v4/b2/98/76/b2987639-0b55-4033-c9a5-13201350b7b4/mza_5391035443482684245.jpg/100x100bb.jpg)
S4E02: Weaponizing Office Documents with VBA Purging
State of the Hack
English - November 19, 2020 20:35 - 56 minutes - 42.9 MB - ★★★★★ - 28 ratingsTechnology News Tech News fireeye mandiant cybersecurity malware hacker Homepage Download Apple Podcasts Google Podcasts Overcast Castro Pocket Casts RSS feed
Previous Episode: S4E01: KEGTAP-ing Out: Don't be a One Trickbot Pony
Next Episode: S4E03: Azure Got Run Over by a Refresh Token
Malicious Office document’s module streams that contain source code,
but no P-code are more likely to evade YARA rules and AV detection.
This evasion technique is called VBA purging; which is different than
the observed VBA stomping technique. In this episode we will discuss
what VBA purging is, the difference between purging and stomping, the
consequences of this technique, and a new tool created by Mandiant’s
Red Team called OfficePurge.