Attachment: .csproj with suspicious commands
Attached .csproj file contains suspicious commands.
Sublime rule (View on GitHub)
1name: "Attachment: .csproj with suspicious commands"
2description: |
3 Attached .csproj file contains suspicious commands.
4references:
5 - "https://delivr.to/payloads?id=9d80cf8d-fb68-40fb-8969-4b11f3a29c9f"
6type: "rule"
7severity: "high"
8source: |
9 type.inbound
10 and any(attachments,
11 .file_extension == "csproj"
12 and any(file.explode(.),
13 (
14 (any(.scan.strings.strings, strings.contains(., 'DllImport')))
15 and (any(.scan.strings.strings, strings.icontains(., 'CreateProcess')))
16 )
17 )
18 )
19tags:
20 - "Suspicious attachment"
21attack_types:
22 - "Malware/Ransomware"
23tactics_and_techniques:
24 - "Evasion"
25 - "Scripting"
26detection_methods:
27 - "File analysis"
28id: "fe45b81d-43df-52fc-9bf8-79824819fb51"