heroui logo

Attachment: PDF with JSFck obfuscation

Sublime Rules

View Source
Summary
This rule detects inbound PDF attachments that attempt to obfuscate JavaScript using JSFck encoding. It targets PDFs in inbound contexts, filtering for attachments with a file type of pdf. The detection logic expands the attachment content (file.explode) and evaluates only the top-level (depth == 0) content for matching YARA rules named pdf_jsfck_strings or pdf_jsfck_ratio. If either YARA rule matches, the alert is raised as high severity, aligned with Malware/Ransomware intent and evasion techniques typical of PDF-based payloads. Detection methods include File analysis and YARA scanning. The rule is designed to catch stealthy JSFck-encoded JavaScript embedded in PDFs, a known technique to bypass standard defenses by hiding malicious code in document structures.
Categories
  • Endpoint
Data Sources
  • File
Created: 2026-04-23