Skip navigation.
Home

Looking for additional samples

I am trying to compile a list and set of samples of file types that allow the infection of a host by design, using some sort of built in method. Whether through command execution or some built in function. It's okay if the file type shows windows or requires user interaction or is program specific, but they have to use some sort of built in functionality, not an exploit. Thus far I have samples of the following file types and I am looking for any more that anyone has seen.

  • bat
  • chm
  • cmd
  • com
  • cpl
  • exe
  • hlp
  • hta
  • js
  • jse
  • lnk
  • msc
  • msi
  • pdf
  • pif
  • scr
  • shs
  • url
  • vbe
  • vbs
  • wsf

Yes. MP3 Not sure if it's

Yes.

MP3

Not sure if it's an exploit or not, but MP3's were able to execute commands to load malicious webpages.

Are you talking about the

Are you talking about the asf URLANDEXIT thing? If not do you have a sample of an mp3 like that?

MS Office

What about MS Office documents that contain macro's

---
C.