EXPL_MAL_MalDoc_TemplateInjection_Jun22

Rule Info

Name
EXPL_MAL_MalDoc_TemplateInjection_Jun22
Author
Florian Roth, Christian Burkard
Description
Detects Office documents that look as if they were exploiting the Template Injection vulnerability and use an IP address to download and force open the second stage
Score
85
Date
2022-06-03
Minimum Yara
2.2.0
Rule Hash
f2306502540bcdc0ef34d9dbea753b9b
Tags
['T1221', 'EXPLOIT', 'T1566_001', 'T1203', 'MAL', 'OFFICE']
Required Modules
[]

Antivirus Verdicts

Rating
Number of Samples
Malicious (>= 10 engines)
1
Suspicious (< 10 engines)
2
Clean (0 engines)
0

Rule Matches

Timestamp
Positives
Total
Hash
VT
2024-06-27 14:23:33
4
60
1728f3ed8fd574d5d7ba22ed7e7b2ed04a5f22ac03f502586b90e03816bc6a37
2022-09-08 11:12:26
25
64
14208d9dec0f75a0092f164c510729291c610ceec57169838093133023cc83df
2022-06-05 05:08:08
3
59
253fe2c0c721a5d539f0e3ffbcfb0bfab11ed1d984750eff72a8595f2cd0e079

Rule Matches per Month (last 24 months)