Quickie: Mass BASE64 Decoding

Published: 2024-11-29. Last Updated: 2024-11-29 05:38:37 UTC
by Didier Stevens (Version: 1)
0 comment(s)

I was asked how one can decode a bunch of BASE64 encoded IOCs with my tools.

I'm going to illustrate my method using the phishing SVG samples I found on VirusTotal (see "Increase In Phishing SVG Attachments").

In these phishing SVG files, the victim's email address is encoded in BASE64:

With grep, I can select all these lines with BASE64 encoded email addresses:

Then I can pipe this into base64dump.py, my tool to handle BASE64 (and other encodings):

You can see the email address in the "Decoded" column (they are redacted to protect the victims).

To get just this info (decoded email addresses), you can use option -s a to select all decoded items, and option -d to dump the decoded values to stdout, like this:

The problem now is that all email addresses are concatenated together. To add a newline (or carriage return - newline in Windows) after each email address, use option -s A (uppercase a):

 

Didier Stevens
Senior handler
blog.DidierStevens.com

Keywords:
0 comment(s)

Comments


Diary Archives