EXPL_MAL_MalDoc_TemplateInjection_Jun22

Rule Info

Tags
['T1193', 'T1221', 'EXPLOIT', 'T1203', 'OFFICE', 'MAL']
Description
Detects Office documents that look as if they were exploiting the Template Injection vulnerability and use an IP address to download and force open the second stage
Required Modules
[]
Date
2022-06-03
Score
85
Author
Florian Roth, Christian Burkard
Name
EXPL_MAL_MalDoc_TemplateInjection_Jun22
Rule Hash
f2306502540bcdc0ef34d9dbea753b9b
Minimum Yara
2.2.0

Antivirus Verdicts

Rating
Number of Samples
Malicious (>= 10 engines)
1
Suspicious (< 10 engines)
1
Clean (0 engines)
0

Rule Matches

Total
Positives
Timestamp
Hash
VT
64
25
2022-09-08 11:12:26
14208d9dec0f75a0092f164c510729291c610ceec57169838093133023cc83df
59
3
2022-06-05 05:08:08
253fe2c0c721a5d539f0e3ffbcfb0bfab11ed1d984750eff72a8595f2cd0e079

Rule Matches per Month (last 24 months)