Rule Info
Name
SUSP_Doc_RTF_OLE2Link_EMAIL_Jun22
Author
Christian Burkard
Description
Detects a suspicious pattern in RTF files which downloads external resources inside e-mail attachments
Score
75
Reference
Internal Research
Date
2022-06-01
Minimum Yara
1.7
Rule Hash
f9222ea38e3fd3e18d4ec45aad4e1f42
Tags
['DEMO', 'SUSP']
Required Modules
[]
Antivirus Verdicts
Rating
Number of Samples
Malicious (>= 10 engines)
37
Suspicious (< 10 engines)
2
Clean (0 engines)
1
Rule Matches
Timestamp
Positives
Total
Hash
VT