Jamf Blog

1952 more articles are waiting for you.

In this blog post, we’ll detail how analyze a Word document that we suspect contains malicious logic. Specifically we’ll detail: How to extract & analyze the malicious macros embedded in the document. How to decode & analyze the embedded 1st-stage payload (downloader). Retrieve & identify the 2nd-stage downloader.

December 5 2018 by

Patrick Wardle

Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.