Attachment: .csproj with suspicious commands
Attached .csproj file contains suspicious commands.
Sublime rule (View on GitHub)
1name: "Attachment: .csproj with suspicious commands"
2description: |
3 Attached .csproj file contains suspicious commands.
4references:
5 - "https://delivr.to/payloads?id=9d80cf8d-fb68-40fb-8969-4b11f3a29c9f"
6type: "rule"
7severity: "high"
8source: |
9 type.inbound
10 and any(attachments,
11 .file_extension == "csproj"
12 and any(file.explode(.),
13 (
14 (any(.scan.strings.strings, strings.contains(., 'DllImport')))
15 and (
16 any(.scan.strings.strings,
17 strings.icontains(., 'CreateProcess')
18 )
19 )
20 )
21 )
22 )
23tags:
24 - "Suspicious attachment"
25attack_types:
26 - "Malware/Ransomware"
27tactics_and_techniques:
28 - "Evasion"
29 - "Scripting"
30detection_methods:
31 - "File analysis"
32id: "fe45b81d-43df-52fc-9bf8-79824819fb51"