Attachment: Emotet heavily padded doc in zip file

Detects a potential Emotet delivery method using padded .doc files that compress into small zip files. Contents may include Red Dawn templates exceeding 500MB.

Sublime rule (View on GitHub)

 1name: "Attachment: Emotet heavily padded doc in zip file"
 2description: |
 3  Detects a potential Emotet delivery method using padded .doc files that compress into small zip files. 
 4  Contents may include Red Dawn templates exceeding 500MB.  
 5references:
 6  - "https://twitter.com/Cryptolaemus1/status/1633099154623803394"
 7type: "rule"
 8severity: "high"
 9source: |
10  type.inbound
11  and any(attachments,
12          .file_extension == "zip"
13          and any(file.explode(.),
14                  .depth == 0
15                  and .size < 1000000
16                  and not .depth > 0
17                  and strings.ends_with(.scan.exiftool.zip_file_name, ".doc")
18                  and .scan.exiftool.zip_uncompressed_size > 500000000
19          )
20  )
21  and (
22    (
23      sender.email.domain.root_domain in $free_email_providers
24      and sender.email.email not in $sender_emails
25    )
26    or (
27      sender.email.domain.root_domain not in $free_email_providers
28      and sender.email.domain.domain not in $sender_domains
29    )
30  )  
31tags:
32  - "Malfam: Emotet"
33attack_types:
34  - "Malware/Ransomware"
35tactics_and_techniques:
36  - "Evasion"
37detection_methods:
38  - "Archive analysis"
39  - "Content analysis"
40  - "Exif analysis"
41  - "File analysis"
42  - "Sender analysis"
43id: "9a5332ed-0023-5d6e-89d3-bd789c3bde6f"

Related rules

to-top