Skip to main content
10 events
when toggle format what by license comment
Sep 23, 2018 at 5:54 comment added Mojtaba Tajik The code is obfuscated and encrypted. you can run it inside an sandbox like Sandboxie or in VM or run it in online VBA interpreters like rextester.com/l/vb
Sep 21, 2018 at 14:48 vote accept Steven Woods
Sep 21, 2018 at 14:18 comment added halfer It looks like it relies on global vars too - kRRCNwn is not defined inside the func, but it is used at the start.
Sep 21, 2018 at 14:16 comment added halfer Sure, but once BfXNd() is running, I can't see it do anything other than create strings using string manipulation funcs. It'd need to do some eval in order to do something malicious. As Terry suggests, maybe you'd need to peek at one of the long values, such as kRRCNwn, in a safe environment.
Sep 21, 2018 at 14:07 comment added Terry Carmen @halfer : Yeah, it's definitely missing an eval. Somewhere, something is calling BfXNd().
Sep 21, 2018 at 13:56 answer added Terry Carmen timeline score: 1
Sep 21, 2018 at 13:29 comment added halfer As far as I can tell, what you have there are just string operations, so this part is probably harmless. Try running it in a VM (that you can destroy or roll back afterwards). Was there an "eval" piece of code elsewhere to actually run something?
Sep 21, 2018 at 13:27 history edited halfer CC BY-SA 4.0
Trim chat
Sep 21, 2018 at 13:10 review First posts
Sep 21, 2018 at 13:21
Sep 21, 2018 at 13:05 history asked Steven Woods CC BY-SA 4.0