Potential File Extension Spoofing Using Right-to-Left Override
Detects suspicious filenames that contain a right-to-left override character and a potentially spoofed file extensions.
Sigma rule (View on GitHub)
1title: Potential File Extension Spoofing Using Right-to-Left Override
2id: 979baf41-ca44-4540-9d0c-4fcef3b5a3a4
3related:
4 - id: ad691d92-15f2-4181-9aa4-723c74f9ddc3
5 type: derived
6status: test
7description: |
8 Detects suspicious filenames that contain a right-to-left override character and a potentially spoofed file extensions.
9references:
10 - https://redcanary.com/blog/right-to-left-override/
11 - https://www.malwarebytes.com/blog/news/2014/01/the-rtlo-method
12 - https://tria.ge/241015-l98snsyeje/behavioral2
13 - https://www.unicode.org/versions/Unicode5.2.0/ch02.pdf
14author: Jonathan Peters (Nextron Systems), Florian Roth (Nextron Systems), Swachchhanda Shrawan Poudel (Nextron Systems)
15date: 2024-11-17
16modified: 2025-02-06
17tags:
18 - attack.execution
19 - attack.defense-evasion
20 - attack.t1036.002
21logsource:
22 category: file_event
23 product: windows
24detection:
25 selection_rtlo_unicode:
26 TargetFilename|contains:
27 - '\u202e' # Unicode RTLO character
28 - '[U+202E]'
29 selection_extensions:
30 TargetFilename|contains:
31 - '3pm.' # Reversed `.mp3`
32 - '4pm.' # Reversed `.mp4`
33 - 'cod.' # Reversed `.doc`
34 - 'fdp.' # Reversed `.pdf`
35 - 'ftr.' # Reversed `.rtf`
36 - 'gepj.' # Reversed `.jpeg`
37 - 'gnp.' # Reversed `.png`
38 - 'gpj.' # Reversed `.jpg`
39 - 'ism.' # Reversed `.msi`
40 - 'lmth.' # Reversed `.html`
41 - 'nls.' # Reversed `.sln`
42 - 'piz.' # Reversed `.zip`
43 - 'slx.' # Reversed `.xls`
44 - 'tdo.' # Reversed `.odt`
45 - 'vsc.' # Reversed `.csv`
46 - 'vwm.' # Reversed `.wmv`
47 - 'xcod.' # Reversed `.docx`
48 - 'xslx.' # Reversed `.xlsx`
49 - 'xtpp.' # Reversed `.pptx`
50 condition: all of selection_*
51falsepositives:
52 - Filenames that contains scriptures such as arabic or hebrew might make use of this character
53level: high
References
Related rules
- MMC Executing Files with Reversed Extensions Using RTLO Abuse
- MMC Loading Script Engines DLLs
- Potential Defense Evasion Via Right-to-Left Override
- UNC4841 - Barracuda ESG Exploitation Indicators
- Potential Arbitrary Command Execution Via FTP.EXE