Saltar al contenido principal

Tutorial CyberChef

Base 64

Base64 CodeMnemonic AidDecoded*Description
JAB🗣 Jabber$.Variable declaration (UTF-16)
TVq📺 TelevisionMZMZ header
SUVY🚙 SUVIEXPowerShell Invoke Expression
SQBFAF🐣 Squab favoriteI.E.PowerShell Invoke Expression (UTF-16)
SQBuAH🐣 Squab uahhhI.n.PowerShell Invoke string (UTF-16) e.g. Invoke-Mimikatz
PAA💪 "Pah!"<.Often used by Emotet (UTF-16)
cwBhA🦁 Chewbakas.a.Often used in malicious droppers (UTF-16) 'sal' instead of 'var'
aWV4😲 Awe version 4iexPowerShell Invoke Expression
aQBlA💦 Aqua Blah (aquaplaning)i.e.PowerShell Invoke Expression (UTF-16)
R2V0🤖 R2D2 but version 0GetOften used to obfuscate imports like GetCurrentThreadId
dmFy👹 defy / demonifyvarVariable declaration
dgBhAdebugger + high availabilityv.a.Variable declaration (UTF-16)
dXNpbmDixon problemusinOften found in compile after delivery attacks
H4sIA🚁 HForce (Helicopter Force) I agreegzip magic bytes (0x1f8b), e.g. echo 'test' \| gzip -cf \| base64
Y21k🎆 Year 21k bugcmdAs used in cmd.exe /c wscript.exe or the like
IAB🥱 I am boredswide lower case s, often something like sEt-iTem
cABhAH🕋 Kaabap.a.wide formatted param
Qzpc🖥 Quiz PCC:\Root of Windows partition (upper case)
Yzpc🖥 Yes PCc:\Root of Windows partition (lower case)
UEs🏬 Upper East SidePKZIP, Office documents
ey🗣 Hey{Indicates JSON data

* the . stands for 0x00 found in UTF-16 encoded text

Often found patterns

Base64 CodeDecodedDescription
AAAAAAAAAAAA\x00\x00\x00\x00\x00\x00\x00\x00\x00Sequence of binary zeros
////////////\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFFSequence of 0xFF bytes
ICAgICAgICAg``Sequence of space characters

JAB

https://www.hybrid-analysis.com/sample/ce0415b6661ef66bbedb69896ad1ece9ee4e6dfde9925e9612aec7bbf1cb7bc5?environmentId=100

PAA

Emotet process command line https://app.any.run/tasks/dfba6d53-7a93-4d8b-86ba-4e737ad06b06/

cwBha

Explanation https://threat.tevora.com/5-minute-forensics-decoding-powershell-payloads/

Sample https://www.hybrid-analysis.com/sample/b744129bfe54de8b36d7556ddfcc55d0be213129041aacf52b7d2f57012caa60?environmentId=100

Recursos