heroui logo

Attachment: RTF with embedded content

Sublime Rules

View Source
Summary
This detection rule targets RTF (Rich Text Format) files that can embed malicious content, similar to OLE (Object Linking and Embedding) files used in Microsoft Office documents. The rule is designed to identify incoming attachments that are RTF files and analyze their contents for potential threats. Specifically, it checks for the presence of executable or scripting file types within the RTF document, which could indicate an attempt to deliver malware such as ransomware. The rule employs file analysis techniques alongside YARA for signature-based detection of known malicious patterns. It operates under the assumption that attackers may use embedded RTF files to evade standard detection measures by disguising harmful payloads, thus triggering alerts for further investigation.
Categories
  • Endpoint
  • Web
  • Application
Data Sources
  • File
  • Sensor Health
Created: 2023-05-04