Rule Info
Name
MAL_Access_Accdr_Dropper_Feb26
Author
MalGamy
Description
Detects suspicious Microsoft Access runtime database file dropper that utilizes Base64-encoded PDF payloads, XML DOM manipulation, and environment variable usage for file operations
Score
75
Date
2026-02-05
Minimum Yara
4.0.0
Rule Hash
b350c72f10a13b7f67cb04fb03bfc357
Tags
['T1132_001', 'MAL', 'T1053_005']
Required Modules
[]
Antivirus Verdicts
Rating
Number of Samples
Malicious (>= 10 engines)
0
Suspicious (< 10 engines)
5
Clean (0 engines)
13
Rule Matches
Timestamp
Positives
Total
Hash
VT
