Commit 017f6458 by donguk

Add Maldoc_Suspicious_OLE_target.yar

parent b496aadd
rule Maldoc_Suspicious_OLE_target {
meta:
description = "Detects maldoc With Tartgeting Suspicuios OLE"
author = "Donguk Seo"
reference = "https://blog.malwarebytes.com/threat-analysis/2017/10/decoy-microsoft-word-document-delivers-malware-through-rat/"
date = "2018-06-13"
strings:
$env1 = /oleObject".*Target=.*.http.*.doc"/
$env2 = /oleObject".*Target=.*.http.*.ppt"/
$env3 = /oleObject".*Target=.*.http.*.xlx"/
condition:
any of them
}
...@@ -18,3 +18,4 @@ include "./Malicious_Documents/Maldoc_VBA_macro_code.yar" ...@@ -18,3 +18,4 @@ include "./Malicious_Documents/Maldoc_VBA_macro_code.yar"
include "./Malicious_Documents/Maldoc_Word_2007_XML_Flat_OPC.yar" include "./Malicious_Documents/Maldoc_Word_2007_XML_Flat_OPC.yar"
include "./Malicious_Documents/Maldoc_malrtf_ole2link.yar" include "./Malicious_Documents/Maldoc_malrtf_ole2link.yar"
include "./Malicious_Documents/maldoc_somerules.yar" include "./Malicious_Documents/maldoc_somerules.yar"
include "./Malicious_Documents/Maldoc_Suspicious_OLE_target.yar"
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment