Skip to content

Commit e88b473

Browse files
[PR #3831] added rule: Attachment: Employment contract update with suspicious file naming
1 parent aa5f5ce commit e88b473

File tree

1 file changed

+29
-0
lines changed

1 file changed

+29
-0
lines changed
Lines changed: 29 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,29 @@
1+
name: "Attachment: Employment contract update with suspicious file naming"
2+
description: "Detects messages containing two attachments where one is a PowerPoint file with suspicious character substitution in the filename ('Empl0yment' using zero instead of 'o') and body text claiming an employment contract has been updated."
3+
type: "rule"
4+
severity: "high"
5+
source: |
6+
type.inbound
7+
// two attachments, one png and one pptx
8+
and length(attachments) == 2
9+
// the pptx has Empl0yment in name
10+
and length(filter(attachments,
11+
.content_type == "application/octet-stream"
12+
and strings.contains(.file_name, "Empl0yment")
13+
)
14+
) == 1
15+
and strings.icontains(body.current_thread.text,
16+
"Your Employment Contract has being updated"
17+
)
18+
attack_types:
19+
- "Malware/Ransomware"
20+
tactics_and_techniques:
21+
- "Evasion"
22+
- "Social engineering"
23+
detection_methods:
24+
- "Content analysis"
25+
- "File analysis"
26+
id: "08d2b71c-c57d-5c99-8e63-db14be829f07"
27+
og_id: "8bdcd2da-c970-5b55-81f8-1b95d3d9dce0"
28+
testing_pr: 3831
29+
testing_sha: 709c37fe527995775b293cbb967afb5c9eee8291

0 commit comments

Comments
 (0)