LinuxCommandLibrary

mraptor

TLDR

Scan document for macros

$ mraptor [document.doc]
copy
Scan multiple files
$ mraptor [*.doc]
copy
Scan directory recursively
$ mraptor -r [directory/]
copy
Output as JSON
$ mraptor -j [document.xlsm]
copy
Match specific patterns
$ mraptor -m [pattern] [document.doc]
copy

SYNOPSIS

mraptor [options] files...

DESCRIPTION

mraptor (Macro Raptor) detects malicious VBA macros in Microsoft Office documents. It analyzes macro code to identify suspicious patterns typically found in malware.
Part of the oletools suite, mraptor provides rapid triage of potentially dangerous documents.

PARAMETERS

-r, --recursive

Scan directories recursively.
-j, --json
JSON output.
-m pattern
Match specific pattern.
-l level
Log level.
-z password
ZIP password.

DETECTION FLAGS

$ A - AutoExec (auto-run)
W - Write file
X - Execute
S - Suspicious keywords
copy

RISK LEVELS

$ SAFE      - No macros or no suspicious code
LOW       - Macros but no execution
MEDIUM    - Some suspicious patterns
HIGH/VERY HIGH - Strong malware indicators
copy

CAVEATS

Heuristic-based; may have false positives. Cannot detect all malware. Part of oletools package.

HISTORY

mraptor was developed by Philippe Lagadec as part of oletools, a collection of Python tools for analyzing Microsoft Office documents.

SEE ALSO

olevba(1), oleid(1), oletools(1), yara(1)

Copied to clipboard