heroui logo

Spam: SMTP & Proxy Communications in Email Body

Sublime Rules

View Source
Summary
This rule detects the presence of spam emails that contain specific command and control (C2) information related to the Simple Mail Transfer Protocol (SMTP) and proxy communications (socks5). The rule is triggered when an inbound email has no attachments, contains a limited number of links (between 2 and 5), and its body text includes certain keywords associated with socks5 proxy configurations. The regex pattern checks for common indicators that could signify a spam message attempting to exploit local proxy settings for data exfiltration or communication with remote servers. By analyzing the content of the email, this rule aids in identifying potentially malicious messages that could compromise network security.
Categories
  • Network
  • Endpoint
  • Cloud
  • Web
Data Sources
  • Process
  • Application Log
  • Network Traffic
Created: 2025-10-30