34 lines
1.1 KiB
Text
34 lines
1.1 KiB
Text
![]() |
rule exploit_Office_Badwinmail {
|
||
|
meta:
|
||
|
author = "David Cannings"
|
||
|
description = "Specific rule to detect files containing SWF objects, e.g. Badwinmail"
|
||
|
ref = "https://cansecwest.com/slides/2016/CSW2016_Li-Xu_BadWinmail_and_EmailSecurityOutlook_final.pdf"
|
||
|
|
||
|
strings:
|
||
|
$header_tnef = { 78 9F 3E 22 }
|
||
|
$header_docf = { D0 CF 11 E0 }
|
||
|
|
||
|
// Reduce FPs on other DOCF documents by requiring Outlook specific properties
|
||
|
// Could be improved by taking further items from MS-OXMSG specs.
|
||
|
$msg_recip = "__recip_version1.0" wide
|
||
|
$msg_attach = "__attach_version1.0" wide
|
||
|
$msg_props = "__properties_version" wide
|
||
|
|
||
|
// TODO: Is there any requirement to signature RFC822 emails?
|
||
|
|
||
|
// SWF class identifiers, as embedded in the document
|
||
|
$embedded_clsid_hex = "D27CDB6E-AE6D-11cf-96B8-444553540000" nocase wide ascii
|
||
|
$embedded_class = "objclass ShockwaveFlash."
|
||
|
$embedded_clsid = { 6e db 7c d2 6d ae cf 11 96 b8 44 45 53 54 00 00 }
|
||
|
|
||
|
condition:
|
||
|
(
|
||
|
$header_tnef at 0 or
|
||
|
(
|
||
|
$header_docf at 0 and
|
||
|
2 of ($msg_*)
|
||
|
)
|
||
|
) and
|
||
|
1 of ($embedded*)
|
||
|
}
|