Rule Info
Name
EXPL_MAL_MalDoc_TemplateInjection_Jun22
Author
Florian Roth, Christian Burkard
Description
Detects Office documents that look as if they were exploiting the Template Injection vulnerability and use an IP address to download and force open the second stage
Score
85
Date
2022-06-03
Minimum Yara
2.2.0
Rule Hash
f2306502540bcdc0ef34d9dbea753b9b
Tags
['T1221', 'EXPLOIT', 'T1566_001', 'T1203', 'MAL', 'OFFICE']
Required Modules
[]
Antivirus Verdicts
Rating
Number of Samples
Malicious (>= 10 engines)
1
Suspicious (< 10 engines)
2
Clean (0 engines)
0
Rule Matches
Timestamp
Positives
Total
Hash
VT