Attachment: .csproj with suspicious commands

Attached .csproj file contains suspicious commands.

Sublime rule (View on GitHub)

 1name: "Attachment: .csproj with suspicious commands"
 2description: |
 3    Attached .csproj file contains suspicious commands.
 4references:
 5  - "https://delivr.to/payloads?id=9d80cf8d-fb68-40fb-8969-4b11f3a29c9f"
 6type: "rule"
 7severity: "high"
 8source: |
 9  type.inbound
10  and any(attachments,
11          .file_extension == "csproj"
12          and any(file.explode(.),
13                  (
14                    (any(.scan.strings.strings, strings.contains(., 'DllImport')))
15                    and (any(.scan.strings.strings, strings.icontains(., 'CreateProcess')))
16                  )
17          )
18  )  
19tags: 
20  - "Suspicious attachment"
21attack_types:
22  - "Malware/Ransomware"
23tactics_and_techniques:
24  - "Evasion"
25  - "Scripting"
26detection_methods:
27  - "File analysis"
28id: "fe45b81d-43df-52fc-9bf8-79824819fb51"
to-top