<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<oembed>
  <author_name>Zarat</author_name>
  <author_url>https://blog.hatena.ne.jp/Zarat/</author_url>
  <blog_title>4ensiX</blog_title>
  <blog_url>https://zarat.hatenablog.com/</blog_url>
  <categories>
    <anon>LetsDefend</anon>
    <anon>Malware</anon>
  </categories>
  <description>LetsDefend Challenge Malware Analysis: Malicious VBA The document initiates the download of a payload after the execution, can you tell what website is hosting it? What is the filename of the payload (include the extension)? What method is it using to establish an HTTP connection between files on th…</description>
  <height>190</height>
  <html>&lt;iframe src=&quot;https://hatenablog-parts.com/embed?url=https%3A%2F%2Fzarat.hatenablog.com%2Fentry%2F2023%2F02%2F18%2F100000&quot; title=&quot;LetsDefend Challenge Malware Analysis: Malicious VBA - 4ensiX&quot; class=&quot;embed-card embed-blogcard&quot; scrolling=&quot;no&quot; frameborder=&quot;0&quot; style=&quot;display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;&quot;&gt;&lt;/iframe&gt;</html>
  <image_url>https://cdn-ak.f.st-hatena.com/images/fotolife/Z/Zarat/20230217/20230217181357.png</image_url>
  <provider_name>Hatena Blog</provider_name>
  <provider_url>https://hatena.blog</provider_url>
  <published>2023-02-18 10:00:00</published>
  <title>LetsDefend Challenge Malware Analysis: Malicious VBA</title>
  <type>rich</type>
  <url>https://zarat.hatenablog.com/entry/2023/02/18/100000</url>
  <version>1.0</version>
  <width>100%</width>
</oembed>
