Skip to content

Commit 44619ce

Browse files
[Test Rules] [PR #4355] added rule: Attachment: PDF with base64 JavaScript and eval functions
1 parent 166f8af commit 44619ce

1 file changed

Lines changed: 27 additions & 0 deletions

File tree

Lines changed: 27 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,27 @@
1+
name: "Attachment: PDF with base64 JavaScript and eval functions"
2+
description: "PDF attachment contains base64-encoded JavaScript variables with eval functions, indicating potential code obfuscation and execution techniques commonly used in malicious documents."
3+
type: "rule"
4+
severity: "medium"
5+
source: |
6+
type.inbound
7+
and any(filter(attachments, .file_type == "pdf"),
8+
any(file.explode(.),
9+
.depth == 0
10+
and any(.scan.yara.matches,
11+
.name in ("pdf_b64_js_var_eval", "pdf_acro_js_functions", )
12+
)
13+
)
14+
)
15+
attack_types:
16+
- "Malware/Ransomware"
17+
tactics_and_techniques:
18+
- "Evasion"
19+
- "PDF"
20+
detection_methods:
21+
- "File analysis"
22+
- "Javascript analysis"
23+
- "YARA"
24+
id: "9919f39e-6e3f-5508-b383-a787214953e6"
25+
og_id: "1b1b9c12-5473-546e-ae4e-038e372a02a8"
26+
testing_pr: 4355
27+
testing_sha: ddd53df04a890b7d32f95b1cfaecb514fcfcee8f

0 commit comments

Comments
 (0)