Skip to content

Commit 5717a3b

Browse files
authored
Add detection rule for CMD file attachments
Detects messages containing CMD files as attachments or within archives, highlighting potential malware risks.
1 parent 1398cf9 commit 5717a3b

File tree

1 file changed

+22
-0
lines changed

1 file changed

+22
-0
lines changed
Lines changed: 22 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,22 @@
1+
name: "Attachment: CMD file"
2+
description: "Detects messages containing CMD (Command Prompt) batch files, either as direct attachments or within compressed archives. CMD files can execute arbitrary system commands and are commonly used to deliver malware or perform unauthorized system modifications."
3+
type: "rule"
4+
severity: "high"
5+
source: |
6+
type.inbound
7+
and length(attachments) > 0
8+
and any(attachments,
9+
.file_extension =~ "cmd"
10+
or (
11+
.file_extension in~ $file_extensions_common_archives
12+
and any(file.explode(.), .file_extension =~ "cmd")
13+
)
14+
)
15+
16+
attack_types:
17+
- "Malware/Ransomware"
18+
tactics_and_techniques:
19+
- "Scripting"
20+
detection_methods:
21+
- "Archive analysis"
22+
- "File analysis"

0 commit comments

Comments
 (0)