Attachment: JavaScript file with suspicious base64-encoded executable

JavaScript attachment or compressed JavaScript file containing a base64 encoded executable.

Sublime rule (View on GitHub)

 1name: "Attachment: JavaScript file with suspicious base64-encoded executable"
 2description: "JavaScript attachment or compressed JavaScript file containing a base64 encoded executable."
 3type: "rule"
 4severity: "high"
 5source: |
 6  type.inbound
 7  and any(attachments,
 8          (
 9            .file_extension in~ $file_extensions_common_archives
10            or .file_extension in ("js", "jar")
11          )
12          and any(file.explode(.),
13                  (
14                    (
15                      .file_extension in ("js", "jar")
16                      or any(.flavors.yara, . == "javascript_file")
17                    )
18                    and any(.flavors.yara, . == 'base64_pe')
19                  )
20          )
21  )  
22
23attack_types:
24  - "Malware/Ransomware"
25tactics_and_techniques:
26  - "Evasion"
27  - "Scripting"
28detection_methods:
29  - "Archive analysis"
30  - "File analysis"
31  - "YARA"
32
33id: "b8db0cf3-1708-5fd0-b0f3-ee23a06505ca"
to-top